Welcome

Toll Group attackers accessed personal and payroll data of staff – Security- Tempemail – Blog – Emails

Toll Group has confirmed its latest encounter with ransomware enabled attackers to “access” personal and payroll details of current and former staff in several countries, though it says there’s “no evidence” the data was “taken”. In an update late Thursday – its first in over a week – the company said it had established that […]

Google sends 1755 warnings to accounts targeted by state-backed attackers – Security- Tempemail – Blog – Emails

Security experts at Google sent 1755 warnings in April to users whose accounts were targets of government-backed attackers, following a resurgence in hacking and phishing attempts related to the coronavirus outbreak. Google said on Wednesday its Threat Analysis Group saw new activity from “hack-for-hire” firms, many based in India, that have been creating Gmail accounts […]

Toll Group confirms attackers ‘accessed’ personal and payroll data of staff – Security- Tempemail – Blog – Emails

Toll Group has confirmed its latest encounter with ransomware enabled attackers to “access” personal and payroll details of current and former staff in several countries, though it says there’s “no evidence” the data was “taken”. In an update late Thursday – its first in over a week – the company said it had established that […]

New Android Flaw Affecting Over 1 Billion Phones Let Attackers Hijack Apps – Tempemail – Blog – Emails

Remember Strandhogg? A security vulnerability affecting Android that malicious apps can exploit to masquerade as any other app installed on a targeted device to display fake interfaces to the users, tricking them into giving away sensitive information. Late last year, at the time of its public disclosure, researchers also confirmed that some attackers were already […]

The Cyber Attackers’ Playbook – Express Computer- Tempemail – Blog – Emails

Express Computer is one of India’s most respected IT media brands and has been in publication for 24 years running. We cover enterprise technology in all its flavours, including processors, storage, networking, wireless, business applications, cloud computing, analytics, green initiatives and anything that can help companies make the most of their ICT investments. Additionally, we […]

New DNS Vulnerability Lets Attackers Launch Large-Scale DDoS Attacks – Tempemail – Blog – Emails

Israeli cybersecurity researchers have disclosed details about a new flaw impacting DNS protocol that can be exploited to launch amplified, large-scale distributed denial-of-service (DDoS) attacks to takedown targeted websites. Called NXNSAttack, the flaw hinges on the DNS delegation mechanism to force DNS resolvers to generate more DNS queries to authoritative servers of attacker’s choice, potentially […]

Toll Group’s corporate data stolen by attackers – Security- Tempemail – Blog – Emails

Toll Group has revealed attackers behind its latest run-in with ransomware managed to exfiltrate current commercial agreements and employee data from at least one server. The logistics giant confirmed the data loss in a statement late Tuesday. The company was hit with a type of malware known as Nefilim at the start of last week. […]

Citrix ShareFile Flaw Could Let Attackers Steal Corporate Secrets – Tempemail – Blog – Emails

Since the past few weeks, software giant Citrix has privately been rolling out a critical software update to its enterprise customers that patches multiple security vulnerabilities affecting Citrix ShareFile content collaboration platform. The security advisory—about which The Hacker News learned from Dimitri van de Giessen, an ethical hacker and system engineer—is scheduled to be available […]

How An Image Could’ve Let Attackers Hack Microsoft Teams Accounts – Tempemail – Blog – Emails

Microsoft has patched a worm-like vulnerability in its Teams workplace video chat and collaboration platform that could have allowed attackers to take over an organization’s entire roster of Teams accounts just by sending participants a malicious link to an innocent-looking image. The flaw, impacting both desktop and web versions of the app, was discovered by […]