FCW: Zero-Day Bug Hits Naval Research Lab’s Unclassified Network

CyberCrimeKeyboardA Naval Research Laboratory-run unclassified network was a target of hackers who used a zero-day exploit to access the network, FCW reported Thursday.

Sean Lyngaas writes U.S. Navy Capt. Mark Bruington, the NRL’s commanding officer, said the laboratory has worked to mitigate the exploited vulnerability after its discovery of the breach.

“It just shows that everybody can be a target,” Bruington was quoted as saying by FCW.

A 2013 hack on the Navy Marine Corps Intranet‘s unclassified segment prompted the Navy and the NRL to revamp their cybersecurity strategies, the publication reports.

The laboratory collaborates with the 10th Fleet’s network defense and information operations hubs and helps explore network management models for the Navy, the report said.

Check Also

NSA

NSA Warns of Cyber Vulnerability in Email Transfer Software

The National Security Agency has identified a vulnerability that Russian cyber actors take advantage of to attack mail transfer networks. Sandworm Team, a Russian military group, has exploited the CVE-2019-10149 vulnerability found in the Exim software that Linux and Unix systems use as a mail transfer agent, NSA said Thursday.

Leave a Reply

Your email address will not be published. Required fields are marked *