A New Bug in Microsoft Windows Could Let Hackers Easily Install a Rootkit – Tempemail

Security researchers have disclosed an unpatched weakness in Microsoft Windows Platform Binary Table (WPBT) affecting all Windows-based devices since Windows 8 that could be potentially exploited to install a rootkit and compromise the integrity of devices. “These flaws make every Windows system vulnerable to easily-crafted attacks that install fraudulent vendor-specific Continue Reading

Passwordstate Password Manager Update Hijacked to Install Backdoor on Thousands of PCs – Tempemail

Click Studios, the Australian software company behind the Passwordstate password management application, has notified customers to reset their passwords following a software supply chain attack. The Adelaide-based firm said a bad actor used sophisticated techniques to compromise the software’s update mechanism and used it to drop malware on user computers. Continue Reading

Gigaset Android Update Server Hacked to Install Malware on Users’ Devices – Tempemail

Gigaset has revealed a malware infection discovered in its Android devices was the result of a compromise of a server belonging to an external update service provider. Impacting older smartphone models — GS100, GS160, GS170, GS180, GS270 (plus), and GS370 (plus) series — the malware took the form of multiple Continue Reading

Hackers Exploit Unpatched VPNs to Install Ransomware on Industrial Targets – Tempemail

Unpatched Fortinet VPN devices are being targeted in a series of attacks against industrial enterprises in Europe to deploy a new strain of ransomware called “Cring” inside corporate networks. At least one of the hacking incidents led to the temporary shutdown of a production site, said cybersecurity firm Kaspersky in Continue Reading

A New SolarWinds Flaw Likely Had Let Hackers Install SUPERNOVA Malware – Tempemail

An authentication bypass vulnerability in the SolarWinds Orion software may have been leveraged by adversaries to deploy the SUPERNOVA malware in target environments. According to an advisory published yesterday by the CERT Coordination Center, the SolarWinds Orion API that’s used to interface with all other Orion system monitoring and management Continue Reading

Browsers Bugs Exploited to Install 2 New Backdoors on Targeted Computers – Tempemail

Cybersecurity researchers have disclosed details about a new watering hole attack targeting the Korean diaspora that exploits vulnerabilities in web browsers such as Google Chrome and Internet Explorer to deploy malware for espionage purposes. Dubbed “Operation Earth Kitsune” by Trend Micro, the campaign involves the use of SLUB (for SLack Continue Reading

Amazon Alexa Bugs Allowed Hackers to Install Malicious Skills Remotely – Tempemail

Attention! If you use Amazon’s voice assistant Alexa in you smart speakers, just opening an innocent-looking web-link could let attackers install hacking skills on it and spy on your activities remotely. Cybersecurity researchers today disclosed severe security vulnerabilities in Amazon’s Alexa virtual assistant that could render it vulnerable to a Continue Reading

Zoom to forcibly install 5.0 update with encryption post May 30- Tempemail

Read Article Video meet app Zoom has announced that after May 30, all its clients on older versions would receive a forced 5.0 update when trying to join meetings as GCM encryption would be fully enabled across the platform. After facing several security and privacy issues, Zoom last month released Continue Reading

Pawsey to install quantum-emulator at supercomputing centre – Strategy – Hardware- Tempemail

The Pawsey Supercomputing Centre is taking a stake in the race to develop quantum computing capabilities by partnering with Canberra based company Quantum Brilliance. Pawsey staff will establish an expertise in quantum computing systems through the partnership, before installing and providing access to a quantum emulator at its supercomputing centres. Continue Reading

Hackers Install Secret Backdoor on Thousands of Microsoft SQL Servers – Tempemail

Cybersecurity researchers today uncovered a sustained malicious campaign dating back to May 2018 that targets Windows machines running MS-SQL servers to deploy backdoors and other kinds of malware, including multi-functional remote access tools (RATs) and cryptominers. Named “Vollgar” after the Vollar cryptocurrency it mines and its offensive “vulgar” modus operandi, Continue Reading