🦞🌯 Lobster Roll

Thread

Buckeye (cyber espionage group linked to China) was using NSA hacking tools at least a year before the Shadow Brokers leak (symantec.com)

Stories related to "Buckeye (cyber espionage group linked to China) was using NSA hacking tools at least a year before the Shadow Brokers leak" across the full archive.

Buckeye (cyber espionage group linked to China) was using NSA hacking tools at least a year before the Shadow Brokers leak (symantec.com)
Equation Group: The Crown Creator of Cyber-Espionage (kaspersky.com)
FAQ: https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf
Iran-linked group claims responsibility for Stryker (medical) cyberattack (detroitnews.com)
iSIGHT discovers zero-day vulnerability CVE-2014-4114 used in Russian cyber-espionage campaign (isightpartners.com)
ProjectSauron: top level cyber-espionage platform covertly extracts encrypted government comms (securelist.com)
Lobsters LinkedIn Group for Jobs
Hey folks, I've created a LinkedIn group for Lobsters users to help make connections, post about their availability for employment, and find interesting coworkers: https://www.linkedin.com/groups/8646069 If you have an account, you are welcome to join and post. Please do kibitz my first dra...
Dark Caracal - Cyber-espionage at a Global Scale (info.lookout.com)
NSO Group Infrastructure Linked to Targeting of Amnesty International and Saudi Dissident (citizenlab.ca)
Finland is preparing to defend itself against a mysterious activist group threatening to carry out cyberattacks – unless it gets some Bitcoin (thenextweb.com)
“Habsburg Jaw” Facial Deformity in Royal Dynasty Linked to Inbreeding (scitechdaily.com)
First study to indicate a direct relationship between inbreeding and facial morphology. The “Habsburg jaw,” a facial condition of the Habsburg dynasty of Spanish and Austrian kings and their wives, can be attributed to inbreeding, according to new results published in the Annals of Human...
Your Car May Be Vulnerable to Cyberattacks – Even the Smartest of Smart Cars Have Issues (scitechdaily.com)
The emergence of smart cars has opened the door to limitless possibilities for technology and innovation – but also to threats beyond the car itself. New research from Michigan State University is the first to apply criminal justice theory to smart vehicles, revealing cracks in the current system le...
World’s Most Popular Websites’ Inconsistent and Misleading Password Advice Could Increase Risk of Cyber Attacks (scitechdaily.com)
Password meters are frequently made available to help users secure their personal data against the threats posed by cybercriminals. However, the ‘inconsistent and misleading’ advice offered on some of the world’s most popular websites could actually be doing more harm than good, ac...
Organized Cybercrime – Hacker Networks Are Not Your Average Mafia (scitechdaily.com)
Does the common stereotype for “organized crime” hold up for organizations of hackers? Research from Michigan State University is one of the first to identify common attributes of cybercrime networks, revealing how these groups function and work together to cause an estimated $445-600 billion of har...
New South Wales government was the target of major cyber attack operation linked to China
Research Group Warns: Talc-Based Cosmetics Test Positive for Asbestos (scitechdaily.com)
Laboratory tests of talc-based cosmetics products, commissioned by the Environmental Working Group, found asbestos — a deadly human carcinogen for which there is no safe level of exposure — in almost 15 percent of samples. The analysis, published today in the journal Environmental Health Insights, c...
New Cyberattack Can Trick Scientists Into Making Dangerous Toxins or Viruses (scitechdaily.com)
An end-to-end cyber-biological attack, in which unwitting biologists may be tricked into generating dangerous toxins in their labs, has been discovered by Ben-Gurion University of the Negev cyber-researchers. According to a new paper just published in Nature Biotechnology, it is currently believed t...
Finland's parliament approved a bill designed to protect its networks against cyber threats and espionage – may be used to exclude China's Huawei and ZTE (bloomberg.com)
Deterrence With Imperfect Attribution: A Better Kind of Cybersecurity Strategy (scitechdaily.com)
New model shows why countries that retaliate too much against online attacks make things worse for themselves. During the opening ceremonies of the 2018 Winter Olympics, held in PyeongChang, South Korea, Russian hackers launched a cyberattack that disrupted television and internet systems at the gam...
How Uncertainty in the Bitcoin Market Responds to Cyberattacks (scitechdaily.com)
Bitcoin and Ethereum exhibited a significant volatility increase five days post-incident, pointing to delayed risk pricing. These findings reveal inefficiencies in crypto markets and the need for deeper investigation into cyber-related financial risks. A University of Vaasa researcher, Klaus Grobys,...
Cybersecurity Researchers Build a Better “Canary Trap” – Using AI to Generate Fake Documents (scitechdaily.com)
A New Artificial Intelligence System Generates Fake Documents To Fool Adversaries During World War II, British intelligence agents planted false documents on a corpse to fool Nazi Germany into preparing for an assault on Greece. “Operation Mincemeat” was a success, and covered the actual...
National Cyber Defense Is a “Wicked” Problem: Why the Colonial Pipeline Ransomware Attack and the SolarWinds Hack Were All but Inevitable (scitechdaily.com)
Takeaways: There are no easy solutions to shoring up U.S. national cyber defenses. Software supply chains and private sector infrastructure companies are vulnerable to hackers. Many U.S. companies outsource software development because of a talent shortage, and some of that outsourcing goes to compa...
New Technology That Can Block Cyberattacks From Impacting the Nation’s Electric Power Grid (scitechdaily.com)
INL’s Constrained Cyber Communication Device (C3D) filters and blocks cyberattacks targeting power grid relays, offering real-time protection to critical infrastructure. Researchers from Idaho National Laboratory and New Mexico-based Visgence Inc. have designed and demonstrated a technology that can...
New Cyber Protections Against Stealthy “Logic Bombs” Targeting 3D Printed Drones, Prostheses and Medical Devices (scitechdaily.com)
Cyber attackers could target 3D-printed objects in health care, aerospace, and other fields. Cybersecurity researchers at Rutgers University-New Brunswick and the Georgia Institute of Technology have proposed new ways to protect 3D printed objects such as drones, prostheses, and medical devices from...
Protecting Electric Vehicle (EV) Charging Stations From Cyberattacks (scitechdaily.com)
A team of cybersecurity experts has identified significant vulnerabilities in EV charging stations, advocating for enhanced security measures to protect these systems and the connected power grid from cyber threats. As the number of electric cars on the road grows, so does the need for electric vehi...
A Security Technique To Fool Would-Be Cyber Attackers – Method Safeguards a Computer Program’s Secret Information (scitechdaily.com)
Researchers demonstrate a method that safeguards a computer program’s secret information while enabling faster computation. Multiple programs running on the same computer may not be able to directly access each other’s hidden information, but because they share the same memory hardware, their secret...
New Method Can Stop Cyberattacks in Less Than a Second (scitechdaily.com)
Computers, laptops, and other smart gadgets in our homes could be protected by artificial intelligence that can quickly identify and eliminate malware. Cardiff University researchers have developed a new approach for automatically detecting and killing cyberattacks on our laptops, computers, and sma...
Common Group of Viruses Strongly Linked to Type 1 Diabetes (scitechdaily.com)
Individuals with type 1 diabetes are eight times more likely than others to have an enterovirus infection; the findings support ongoing research on vaccines to help prevent the development of type 1 diabetes. A new study recently presented at the annual conference of the European Association for the...
Danish parliament urges lawmakers and employees to remove TikTok on work phones as a cybersecurity measure, saying “there is a risk of espionage” (apnews.com)
Scientists Use Particle Physics To Predict Human Group Sizes (scitechdaily.com)
Predicting Social Group Sizes Through Physics Models The scientists at Complexity Science Hub (CSH) were able to predict the group sizes of people in a computer game by utilizing the average number of friends each person has. They modeled the formation of social groups using an example from physics,...
MIT’s Cybersecurity Metior: A Secret Weapon Against Side-Channel Attacks (scitechdaily.com)
MIT’s new system analyzes the likelihood that an attacker could thwart a certain security scheme to steal secret information. Researchers have created a system to examine how a hacker can circumvent a particular type of cybersecurity method, in an effort to determine how much secret informatio...