Windows 10 Flaw Lets Hackers Create Booby-Trapped Documents on Your PC | Tempemail

Sourced from Tech Advisor Hackers are now exploiting a pair of previously unknown vulnerabilities in Microsoft Windows, that can be used to create and plant documents booby-trapped with malware, to help them take over your computer, reports PC Mag. On Monday Microsoft said via a security advisory that it is Continue Reading

Unpatched Zoom App Bug Lets Hackers Steal Your Windows Password – Tempemail

Zoom has been there for nine years, but the immediate requirement of an easy-to-use video conferencing app during the coronavirus pandemic made it overnight a favorite tool for millions of people. Though Zoom is an efficient online video meeting solution, it’s still not the best choice in terms of privacy Continue Reading

Hackers Install Secret Backdoor on Thousands of Microsoft SQL Servers – Tempemail

Cybersecurity researchers today uncovered a sustained malicious campaign dating back to May 2018 that targets Windows machines running MS-SQL servers to deploy backdoors and other kinds of malware, including multi-functional remote access tools (RATs) and cryptominers. Named “Vollgar” after the Vollar cryptocurrency it mines and its offensive “vulgar” modus operandi, Continue Reading

Hackers Begin Exploiting Zoom’s Overnight Success to Spread Malware – Tempemail

As people increasingly work from home and online communication platforms such as Zoom explode in popularity in the wake of coronavirus outbreak, cybercriminals are taking advantage of the spike in usage by registering new fake “Zoom” domains and malicious “Zoom” executable files in an attempt to trick people into downloading Continue Reading

Hackers Exploit Zero-Day Bugs in Draytek Devices to Target Enterprise Networks – Tempemail

Cybersecurity researchers with Qihoo 360’s NetLab today unveiled details of two recently spotted zero-day cyberattack campaigns in the wild targeting enterprise-grade networking devices manufactured by Taiwan-based DrayTek. According to the report, at least two separate groups of hackers exploited two critical remote command injection vulnerabilities (CVE-2020-8515) affecting DrayTek Vigor enterprise Continue Reading

Hackers Used Local News Sites to Install Spyware On iPhones – Tempemail

A newly discovered watering-hole campaign is targeting Apple iPhone users in Hong Kong by using malicious website links as a lure to install spyware on the devices. According to research published by Trend Micro and Kaspersky, the “Operation Poisoned News” attack leverages a remote iOS exploit chain to deploy a Continue Reading

Elite hackers target WHO as coronavirus cyberattacks spike – Networking – Software- Tempemail

Elite hackers tried to break into the World Health Organization earlier this month, sources told Reuters, part of what a senior agency official said was a more than two-fold increase in cyberattacks. WHO Chief Information Security Officer Flavio Aggio said the identity of the hackers was unclear and the effort Continue Reading

Mass move to work from home in coronavirus crisis creates opening for hackers: cyber experts – Security- Tempemail

As people disperse to their homes to work and study because of the coronavirus pandemic, taking their laptops and company data with them, cyber security experts say hackers will follow, seeking to take advantage and infiltrate corporations. Government officials in the United States, Britain and elsewhere have issued warnings about Continue Reading

Hackers Created Thousands of Coronavirus (COVID-19) Related Sites As Bait – Tempemail

As the world comes to grips with the coronavirus pandemic, the situation has proven to be a blessing in disguise for threat actors, who’ve taken advantage of the opportunity to target victims with scams or malware campaigns. Now, according to a new report published by Check Point Research today and Continue Reading

Researchers Uncover a Nigerian Hacker’s Pursuit of his Million Dollar Dream – Tempemail

Social engineering-driven malware threats continue to be a big threat, but new research details how cybercriminals profit off such schemes to launder hundreds of thousands of dollars from stolen credit cards of unsuspecting victims. Cybersecurity firm Check Point Research, in a report published today and shared with The Hacker news, Continue Reading