433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (727) 493-2351

MoonBounce UEFI implant used by spy group brings firmware security into spotlight

Researchers uncovered a stealthy UEFI rootkit that’s being used in highly targeted campaigns by a notorious Chinese cyberespionage group with suspected government ties. The group is known for using software supply-chain attacks in the past. Dubbed MoonBounce by researchers from Kaspersky Lab, the implant’s goal is to inject a malicious driver into the Windows kernel during the booting stages, providing attackers with a high level of persistence and stealthiness. While MoonBounce is not the first UEFI rootkit found in the wild — LoJax, MosaicRegressor are two examples– these types of implants are not common because they require knowledge of low-level firmware programming. They are typically found in the arsenal of well-resourced and sophisticated attacker groups. To read this article in full, please click here
http://news.poseidon-us.com/SHZLfm

MoonBounce UEFI implant used by spy group brings firmware security into spotlight

Researchers uncovered a stealthy UEFI rootkit that’s being used in highly targeted campaigns by a notorious Chinese cyberespionage group with suspected government ties. The group is known for using software supply-chain attacks in the past. Dubbed MoonBounce by researchers from Kaspersky Lab, the implant’s goal is to inject a malicious driver into the Windows kernel during the booting stages, providing attackers with a high level of persistence and stealthiness. While MoonBounce is not the first UEFI rootkit found in the wild — LoJax, MosaicRegressor are two examples– these types of implants are not common because they require knowledge of low-level firmware programming. They are typically found in the arsenal of well-resourced and sophisticated attacker groups. To read this article in full, please click here
http://news.poseidon-us.com/SHZLfm

Researchers simulate behavior of living ‘minimal cell’ in three dimensions

Scientists report that they have built a living ‘minimal cell’ with a genome stripped down to its barest essentials — and a computer model of the cell that mirrors its behavior. By refining and testing their model, the scientists say they are developing a system for predicting how changes to the genomes, living conditions or physical characteristics of live cells will alter how they function.
http://news.poseidon-us.com/SHW42W

BrandPost: 5 Lessons Learned from Log4j

In December, a critical Log4j vulnerability known as Log4Shell impacted the world of security in ways that few vulnerabilities previously have. It’s clear by now that the potential for damage from this vulnerability is quite high, and will last for a very long time. It’s hard not to compare Log4Shell with the emergence of EternalBlue over five years ago. Both are critical code injection vulnerabilities requiring patching, with severe consequences for those who ignore it. But unlike EternalBlue, which is only found in Windows, Log4Shell is present in a myriad of applications and is notoriously difficult to track. Those infected by EternalBlue were seen as victims, while those infected by Log4Shell are considered much more culpable by regulators. And while EternalBlue was almost immediately abused for the widespread infection of WannaCry, Log4Shell has yet to manifest a high-profile attack. To read this article in full, please click here
http://news.poseidon-us.com/SHW0X2

BrandPost: 5 Lessons Learned from Log4j

In December, a critical Log4j vulnerability known as Log4Shell impacted the world of security in ways that few vulnerabilities previously have. It’s clear by now that the potential for damage from this vulnerability is quite high, and will last for a very long time. It’s hard not to compare Log4Shell with the emergence of EternalBlue over five years ago. Both are critical code injection vulnerabilities requiring patching, with severe consequences for those who ignore it. But unlike EternalBlue, which is only found in Windows, Log4Shell is present in a myriad of applications and is notoriously difficult to track. Those infected by EternalBlue were seen as victims, while those infected by Log4Shell are considered much more culpable by regulators. And while EternalBlue was almost immediately abused for the widespread infection of WannaCry, Log4Shell has yet to manifest a high-profile attack. To read this article in full, please click here
http://news.poseidon-us.com/SHW0X2

BrandPost: 5 Lessons Learned from Log4j

In December, a critical Log4j vulnerability known as Log4Shell impacted the world of security in ways that few vulnerabilities previously have. It’s clear by now that the potential for damage from this vulnerability is quite high, and will last for a very long time. It’s hard not to compare Log4Shell with the emergence of EternalBlue over five years ago. Both are critical code injection vulnerabilities requiring patching, with severe consequences for those who ignore it. But unlike EternalBlue, which is only found in Windows, Log4Shell is present in a myriad of applications and is notoriously difficult to track. Those infected by EternalBlue were seen as victims, while those infected by Log4Shell are considered much more culpable by regulators. And while EternalBlue was almost immediately abused for the widespread infection of WannaCry, Log4Shell has yet to manifest a high-profile attack. To read this article in full, please click here
http://news.poseidon-us.com/SHW0X2