Welcome

Critical VMware Cloud Director Flaw Lets Hackers Take Over Corporate Servers – Tempemail – Blog – Emails

Cybersecurity researchers today disclosed details for a new vulnerability in VMware’s Cloud Director platform that could potentially allow an attacker to gain access to sensitive information and control private clouds within an entire infrastructure. Tracked as CVE-2020-3956, the code injection flaw stems from an improper input handling that could be abused by an authenticated attacker […]

How to Create a Culture of Kick-Ass DevSecOps Engineers – Tempemail – Blog – Emails

Much like technology itself, the tools, techniques, and optimum processes for developing code evolve quickly. We humans have an insatiable need for more software, more features, more functionality… and we want it faster than ever before, more qualitative, and on top of that: Secure. With an estimated 68% of organizations experiencing zero-day attacks from undisclosed/unknown […]

Joomla Resources Directory (JRD) Portal Suffers Data Breach – Tempemail – Blog – Emails

Joomla, one of the most popular Open-source content management systems (CMS), last week announced a new data breach impacting 2,700 users who have an account with its resources directory (JRD) website, i.e., resources.joomla.org. The breach exposed affected users’ personal information, such as full names, business addresses, email addresses, phone numbers, and encrypted passwords. The company […]

New Noise-Resilient Attack On Intel and AMD CPUs Makes Flush-based Attacks Effective – Tempemail – Blog – Emails

Modern Intel and AMD processors are susceptible to a new form of side-channel attack that makes flush-based cache attacks resilient to system noise, newly published research shared with The Hacker News has revealed. The findings are from a paper “DABANGG: Time for Fearless Flush based Cache Attacks” published by a pair of researchers, Biswabandan Panda and […]

Exclusive – Any Mitron (Viral TikTok Clone) Profile Can Be Hacked in Seconds – Tempemail – Blog – Emails

Mitron (means “friends” in Hindi), you have been fooled again! Mitron is not really a ‘Made in India’ product, and the viral app contains a highly critical, unpatched vulnerability that could allow anyone to hack into any user account without requiring interaction from the targeted users or their passwords. I am sure many of you […]

A New Free Monitoring Tool to Measure Your Dark Web Exposure – Tempemail – Blog – Emails

Last week, application security company ImmuniWeb released a new free tool to monitor and measure an organization’s exposure on the Dark Web. To improve the decision-making process for cybersecurity professionals, the free tool crawls Dark Web marketplaces, hacking forums, and Surface Web resources such as Pastebin or GitHub to provide you with a classified schema of […]

Researchers Uncover Brazilian Hacktivist’s Identity Who Defaced Over 4800 Sites – Tempemail – Blog – Emails

It’s one thing for hackers to target websites and proudly announce it on social media platforms for all to see. It’s, however, an entirely different thing to leave a digital trail that leads cybersecurity researchers right to their doorsteps. That’s exactly what happened in the case of a hacktivist under the name of VandaTheGod, who […]

Chinese Researchers Disrupt Malware Attack That Infected Thousands of PCs – Tempemail – Blog – Emails

Chinese security firm Qihoo 360 Netlab said it partnered with tech giant Baidu to disrupt a malware botnet infecting over hundreds of thousands of systems. The botnet was traced back to a group it calls ShuangQiang (also called Double Gun), which has been behind several attacks since 2017 aimed at compromising Windows computers with MBR […]

New Android Flaw Affecting Over 1 Billion Phones Let Attackers Hijack Apps – Tempemail – Blog – Emails

Remember Strandhogg? A security vulnerability affecting Android that malicious apps can exploit to masquerade as any other app installed on a targeted device to display fake interfaces to the users, tricking them into giving away sensitive information. Late last year, at the time of its public disclosure, researchers also confirmed that some attackers were already […]