Apple Issues Urgent Updates to Fix New Zero-Day Linked to Pegasus Spyware – Tempemail

Apple has released iOS 14.8, iPadOS 14.8, watchOS 7.6.2, macOS Big Sur 11.6, and Safari 14.1.2 to fix two actively exploited vulnerabilities, one of which defeated extra security protections built into the operating system. The list of two flaws is as follows – CVE-2021-30858 (WebKit) – A use after free Continue Reading

ICS threat report for H1 2021 – key statistics- Tempemail

The H1 2021 ICS threat report at a glance Percentage of ICS computers attacked During the first half of 2021 (H1 2021), the percentage of attacked ICS computers was 8%, which was 0.4 percentage points (p.p.) higher than that for H2 2020. Percentage of ICS computers on which malicious objects Continue Reading

Experts Uncover Mobile Spyware Attacks Targeting Kurdish Ethnic Group – Tempemail

Cybersecurity researchers on Tuesday released new findings that reveal a year-long mobile espionage campaign against the Kurdish ethnic group to deploy two Android backdoors that masquerade as legitimate apps. Active since at least March 2020, the attacks leveraged as many as six dedicated Facebook profiles that claimed to provide news, Continue Reading

New Chinese Spyware Being Used in Widespread Cyber Espionage Attacks – Tempemail

A threat actor presumed to be of Chinese origin has been linked to a series of 10 attacks targeting Mongolia, Russia, Belarus, Canada, and the U.S. from January to July 2021 that involve the deployment of a remote access trojan (RAT) on infected systems, according to new research. The intrusions Continue Reading

New Leak Reveals Abuse of Pegasus Spyware to Target Journalists Globally – Tempemail

A sweeping probe into a data leak of more than 50,000 phone numbers has revealed an extensive misuse of Israeli company NSO Group’s Pegasus “military-grade spyware” to facilitate human rights violations by surveilling heads of state, activists, journalists, and lawyers around the world. Dubbed the “Pegasus Project,” the investigation is Continue Reading

Israeli Firm Helped Governments Target Journalists, Activists with 0-Days and Spyware – Tempemail

Two of the zero-day Windows flaws patched by Microsoft as part of its Patch Tuesday update earlier this week were weaponized by an Israel-based company called Candiru in a series of “precision attacks” to hack more than 100 journalists, academics, activists, and political dissidents globally. The spyware vendor was also Continue Reading

A New Spyware is Targeting Telegram and Psiphon VPN Users in Iran – Tempemail

Threat actors with suspected ties to Iran have been found to leverage instant messaging and VPN apps like Telegram and Psiphon to install a Windows remote access trojan (RAT) capable of stealing sensitive information from targets’ devices since at least 2015. Russian cybersecurity firm Kaspersky, which pieced together the activity, Continue Reading

APT trends report Q1 2021- Tempemail

For four years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private Continue Reading

Facebook Busts Palestinian Hackers’ Operation Spreading Mobile Spyware – Tempemail

Facebook on Wednesday said it took steps to dismantle malicious activities perpetrated by two state-sponsored hacking groups operating out of Palestine that abused its platform to distribute malware. The social media giant attributed the attacks to a network connected to the Preventive Security Service (PSS), the security apparatus of the Continue Reading

Watch Out! That Android System Update May Contain A Powerful Spyware – Tempemail

Researchers have discovered a new information-stealing trojan, which targets Android devices with an onslaught of data-exfiltration capabilities — from collecting browser searches to recording audio and phone calls. While malware on Android has previously taken the guise of copycat apps, which go under names similar to legitimate pieces of software, Continue Reading