How Cynet’s Response Automation Helps Organizations Mitigate Cyber Threats – Tempemail

One of the determining factors of how much damage a cyber-attack cause is how fast organizations can respond to it. Time to response is critical for security teams, and it is a major hurdle for leaner teams. To help improve this metric and enhance organizations’ ability to respond to attacks Continue Reading

U.S. Cyber Command Warns of Ongoing Attacks Exploiting Atlassian Confluence Flaw – Tempemail

The U.S. Cyber Command on Friday warned of ongoing mass exploitation attempts in the wild targeting a now-patched critical security vulnerability affecting Atlassian Confluence deployments that could be abused by unauthenticated attackers to take control of a vulnerable system. “Mass exploitation of Atlassian Confluence CVE-2021-26084 is ongoing and expected to Continue Reading

Researchers Detail Modus Operandi of ShinyHunters Cyber Crime Group – Tempemail

ShinyHunters, a notorious cybercriminal underground group that’s been on a data breach spree since last year, has been observed searching companies’ GitHub repository source code for vulnerabilities that can be abused to stage larger scale attacks, an analysis of the hackers’ modus operandi has revealed. “Primarily operating on Raid Forums, Continue Reading

A Wide Range of Cyber Attacks Leveraging Prometheus TDS Malware Service – Tempemail

Multiple cybercriminal groups are leveraging a malware-as-a-service (MaaS) solution to distribute a wide range of malicious software distribution campaigns that result in the deployment of payloads such as Campo Loader, Hancitor, IcedID, QBot, Buer Loader, and SocGholish against individuals in Belgium as well as government agencies, companies, and corporations in Continue Reading

New Chinese Spyware Being Used in Widespread Cyber Espionage Attacks – Tempemail

A threat actor presumed to be of Chinese origin has been linked to a series of 10 attacks targeting Mongolia, Russia, Belarus, Canada, and the U.S. from January to July 2021 that involve the deployment of a remote access trojan (RAT) on infected systems, according to new research. The intrusions Continue Reading

Interpol Arrests Moroccan Hacker Engaged in Nefarious Cyber Activities – Tempemail

Law enforcement authorities with Interpol have apprehended a threat actor presumably responsible for multiple attacks on telecom companies, major banks, and multinational corporations in France with the goal of stealing customers’ bank information. The two-year investigation, dubbed Operation Lyrebird by the international, intergovernmental organization, resulted in the arrest of a Continue Reading

New Mirai-Inspired Botnet Could Be Using Your KGUARD DVRs in Cyber Attacks – Tempemail

Cybersecurity researchers on Thursday revealed details about a new Mirai-inspired botnet called “mirai_ptea” that leverages an undisclosed vulnerability in digital video recorders (DVR) provided by KGUARD to propagate and carry out distributed denial-of-service (DDoS) attacks. Chinese security firm Netlab 360 pinned the first probe against the flaw on March 23, Continue Reading

Do cybercriminals play cyber games in quarantine? A look one year later- Tempemail

Last year, we decided to take a look at how the pandemic influenced the gaming industry and what new threats gamers could be facing. What we found was that, with the transition to remote work and remote learning, the number of blocked attempts to visit malicious game-related websites or follow Continue Reading

[Webinar] How Cyber Attack Groups Are Spinning a Larger Ransomware Web – Tempemail

Organizations today already have an overwhelming number of dangers and threats to look out for, from spam to phishing attempts to new infiltration and ransomware tactics. There is no chance to rest, since attack groups are constantly looking for more effective means of infiltrating and infecting systems. Today, there are Continue Reading

Cyber espionage by Chinese hackers in neighbouring nations is on the rise – Tempemail

A string of cyber espionage campaigns dating all the way back to 2014 and focused on gathering military intelligence from neighbouring countries have been linked to a Chinese military-intelligence apparatus. In a wide-ranging report published by Massachusetts-headquartered Recorded Future this week, the cybersecurity firm’s Insikt Group said it identified ties Continue Reading