Hackers Using Microsoft MSHTML Flaw to Spy on Targeted PCs with Malware – Tempemail

A new Iranian threat actor has been discovered exploiting a now-addressed critical flaw in the Microsoft Windows MSHTML platform to target Farsi-speaking victims with a new PowerShell-based information stealer designed to harvest extensive details from infected machines. “[T]he stealer is a PowerShell script, short with powerful collection capabilities — in Continue Reading

I got a camera to spy on my cat – and it made me question everything about myself | Life and style- Tempemail

This summer I bought two in-home security cameras. I told people I got them because my cat was sick, and I required on-demand proof he was still alive. But the truth is, I just wanted to spy on him. There’s something about a cat sitting by itself on a couch, Continue Reading

Spy drops, submarine secrets and peanut butter sandwiches: What we know about alleged Navy espionage case- Tempemail

A US Navy nuclear engineer and his wife face espionage-related charges after allegedly trying to sell closely held US submarine secrets with other countries for thousands of dollars in cryptocurrency, according to the US Department of Justice. In the case presented by federal prosecutors, the FBI posed as foreign officials Continue Reading

Ex-British spy Christopher Steele defends Trump dossier and says kompromat tape ‘probably’ exists- Tempemail

The author of the infamous “Steele Dossier”, a memo containing numerous unverified claims about former President Donald Trump, says in a new interview that he stands by the veracity of the claims and adds that the so-called “kompromat” tape purporting to show Mr Trump involved in a lewd act with Continue Reading

Chinese Hackers Used a New Rootkit to Spy on Targeted Windows 10 Users – Tempemail

A formerly unknown Chinese-speaking threat actor has been linked to a long-standing evasive operation aimed at South East Asian targets as far back as July 2020 to deploy a kernel-mode rootkit on compromised Windows systems. Attacks mounted by the hacking group, dubbed GhostEmperor by Kaspersky, are also said to have Continue Reading

Critical ThroughTek SDK Bug Could Let Attackers Spy On Millions of IoT Devices – Tempemail

A security vulnerability has been found affecting several versions of ThroughTek Kalay P2P Software Development Kit (SDK), which could be abused by a remote attacker to take control of an affected device and potentially lead to remote code execution. Tracked as CVE-2021-28372 (CVSS score: 9.6) and discovered by FireEye Mandiant Continue Reading

Bugs in Managed DNS Services Cloud Let Attackers Spy On DNS Traffic – Tempemail

Cybersecurity researchers have disclosed a new class of vulnerabilities impacting major DNS-as-a-Service (DNSaaS) providers that could allow attackers to exfiltrate sensitive information from corporate networks. “We found a simple loophole that allowed us to intercept a portion of worldwide dynamic DNS traffic going through managed DNS providers like Amazon and Continue Reading

New Android Malware Uses VNC to Spy and Steal Passwords from Victims – Tempemail

A previously undocumented Android-based remote access trojan (RAT) has been found to use screen recording features to steal sensitive information on the device, including banking credentials, and open the door for on-device fraud. Dubbed “Vultur” due to its use of Virtual Network Computing (VNC)’s remote screen-sharing technology to gain full Continue Reading

Trickbot Malware Returns with a new VNC Module to Spy on its Victims – Tempemail

Cybersecurity researchers have opened the lid on the continued resurgence of the insidious TrickBot malware, making it clear that the Russia-based transnational cybercrime group is working behind the scenes to revamp its attack infrastructure in response to recent counter efforts from law enforcement. “The new capabilities discovered are used to Continue Reading

Hackers Can Exploit Samsung Pre-Installed Apps to Spy On Users – Tempemail

Multiple critical security flaws have been disclosed in Samsung’s pre-installed Android apps, which, if successfully exploited, could have allowed adversaries access to personal data without users’ consent and take control of the devices. “The impact of these bugs could have allowed an attacker to access and edit the victim’s contacts, Continue Reading