Ukraine is formally pointing fingers at Russian hackers for hacking into one of its government systems and attempting to plant and distribute malicious documents that would install malware on target systems of public authorities. “The purpose of the attack was the mass contamination of information resources of public authorities, as Continue Reading
attack
Charities condemn Facebook for ‘attack on democracy’ in Australia | Facebook
Members of Facebook’s oversight board, which some have likened to an internal “supreme court”, have been called on to speak out or step down after the platform shut down swathes of media and key public information sites during a battle with the Australian government. The social media giant suspended pages Continue Reading
‘No skinny jeans’: Gen Z launch TikTok attack on millennial fashion | TikTok
A generation war has been playing out on TikTok for some time, though anyone older than 24 might be oblivious to the millions of “millennial v Gen Z” videos that have appeared on the social media site in the last year. But now the kids have turned their sights on Continue Reading
Dependency Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies – Tempemail
In what’s a novel supply chain attack, a security researcher managed to breach over 35 major companies’ internal systems, including that of Microsoft, Apple, PayPal, Shopify, Netflix, Yelp, Tesla, and Uber, and achieve remote code execution. The technique, called dependency confusion or a substitution attack, takes advantage of the fact Continue Reading
A New Software Supply‑Chain Attack Targeted Millions With Spyware – Tempemail
Cybersecurity researchers today disclosed a new supply chain attack compromising the update mechanism of NoxPlayer, a free Android emulator for PCs and Macs. Dubbed “Operation NightScout” by Slovak cybersecurity firm ESET, the highly-targeted surveillance campaign involved distributing three different malware families via tailored malicious updates to selected victims based in Continue Reading
New Attack Could Let Remote Hackers Target Devices On Internal Networks – Tempemail
A newly devised variant of the NAT Slipstreaming attack can be leveraged to compromise and expose any device in an internal network, according to the latest research. Detailed by enterprise IoT security firm Armis, the new attack (CVE-2020-16043 and CVE-2021-23961) builds on the previously disclosed technique to bypass routers and Continue Reading
Big tech facilitated QAnon and the Capitol attack. It’s time to hold them accountable | Technology
Donald Trump’s election lies and the 6 January attack on the US Capitol have highlighted how big tech has led our society down a path of conspiracies and radicalism by ignoring the mounting evidence that their products are dangerous. But the spread of deadly misinformation on a global scale was Continue Reading
US lawmakers ask FBI to investigate Parler app’s role in Capitol attack | Parler- Tempemail
American lawmakers have asked the FBI to investigate the role of Parler, the social media website and app popular with the American far right, in the violence at the US Capitol on 6 January. Carolyn Maloney, chair of the House oversight and reform Committee, asked the FBI to review Parler’s Continue Reading
GitHub apologizes for firing employee who warned of Capitol attack Nazi link | Technology
GitHub, a technology firm owned by Microsoft, apologized on Sunday for what its COO, Erica Brescia, called “significant errors in judgment” following outrage that it had fired an employee, who is Jewish, for warning that “Nazis” were among the pro-Donald Trump mob who attacked the US Capitol on 6 January. Continue Reading
Researchers Discover Raindrop — 4th Malware Linked to the SolarWinds Attack – Tempemail
Cybersecurity researchers have unearthed a fourth new malware strain—designed to spread the malware onto other computers in victims’ networks—which was deployed as part of the SolarWinds supply chain attack disclosed late last year. Dubbed “Raindrop” by Broadcom-owned Symantec, the malware joins the likes of other malicious implants such as Sunspot, Continue Reading