Love Island star Amy Hart says she had online death threat from 13-year-old | Online abuse- Tempemail

Former Love Island contestant Amy Hart has said her online abusers are often married people with children or in jobs like nursing, and that she received a death threat from a 13-year-old child. Hart, who was giving evidence to a committee of MPs investigating influencer culture, said she had 3,000 Continue Reading

ICS threat report for H1 2021 – key statistics- Tempemail

The H1 2021 ICS threat report at a glance Percentage of ICS computers attacked During the first half of 2021 (H1 2021), the percentage of attacked ICS computers was 8%, which was 0.4 percentage points (p.p.) higher than that for H2 2020. Percentage of ICS computers on which malicious objects Continue Reading

IT threat evolution in Q2 2021. Mobile statistics- Tempemail

These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. Quarterly figures In Q2 2021, according to data from Kaspersky Security Network: 14,465,672 malware, adware and riskware attacks were prevented. The largest share of all detected threats accrued to RiskTool programs Continue Reading

IT threat evolution Q2 2021- Tempemail

Targeted attacks The leap of a Cycldek-related threat actor It is quite common for Chinese-speaking threat actors to share tools and methodologies: one such example is the infamous “DLL side-loading triad”: a legitimate executable, a malicious DLL to be side-loaded by it and an encoded payload, generally dropped from a self-extracting archive. Continue Reading

IT threat evolution Q1 2021. Non-mobile statistics- Tempemail

These statistics are based on detection verdicts of Kaspersky products received from users who consented to provide statistical data. Quarterly figures According to Kaspersky Security Network, in Q1 2021: Kaspersky solutions blocked 2,023,556,082 attacks launched from online resources across the globe. 613,968,631 unique URLs were recognized as malicious by Web Continue Reading

IT threat evolution Q1 2021. Mobile statistics- Tempemail

The statistics presented here draw on detection verdicts returned by Kaspersky products as provided by users who consented to share statistical data. Quarterly figures According to Kaspersky Security Network, in the first quarter we saw: 1,451,660 detected mobile installation packages, of which 25,314 packages were related to mobile banking Trojans, Continue Reading

IT threat evolution Q1 2021- Tempemail

Targeted attacks Putting the ‘A’ into APT In December, SolarWinds, a well-known IT managed services provider, fell victim to a sophisticated supply-chain attack. The company’s Orion IT, a solution for monitoring and managing customers’ IT infrastructure, was compromised by threat actors. This resulted in the deployment of a custom backdoor, Continue Reading

The leap of a Cycldek-related threat actor- Tempemail

Introduction In the nebula of Chinese-speaking threat actors, it is quite common to see tools and methodologies being shared. One such example of this is the infamous “DLL side-loading triad”: a legitimate executable, a malicious DLL to be sideloaded by it, and an encoded payload, generally dropped from a self-extracting Continue Reading

Threat landscape for industrial automation systems. Statistics for H2 2020- Tempemail

Figures Indicator H1 2020 H2 2020 2020 Global percentage of attacked ICS computers 32.6% 33.42% 38.55% Percentage of attacked ICS computers by region Northern Europe 10.1% 11.5% 12.3% Western Europe 15.1% 14.8% 17.6% Australia 16.3% 17.0% 18.9% United States and Canada 17.2% 16.5% 19.6% Eastern Europe 26.4% 28.0% 30.5% Southern Continue Reading

Critical Flaws Affecting GE’s Universal Relay Pose Threat to Electric Utilities – Tempemail

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned of critical security shortcomings in GE’s Universal Relay (UR) family of power management devices. “Successful exploitation of these vulnerabilities could allow an attacker to access sensitive information, reboot the UR, gain privileged access, or cause a denial-of-service condition,” the agency Continue Reading