Tesla Model 3 vulnerability: What you need to know about the web browser bug

| | Malware Analysis
Introduction In 2020, Jacob Archuleta, a researcher nicknamed Nullze, discovered an important information security vulnerability on the web browser of the Tesla Model 3 automobile. If a user of the... Go on to the site to read the full article ... Read More

Analysis of ransomware used in recent cyberattacks on health care institutions

| | Malware Analysis
Introduction In recent years, there has been a steady increase in the number of ransomware attacks on healthcare institutions. The pressure such institutions experienced as a result of the COVID-19... Go on to the site to read the full article ... Read More

PonyFinal malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction to PonyFinal PonyFinal ransomware appeared for the first time in 2020. It is malware that relies on human-operated attacks, i.e., attacks that exploit information security... Go on to the site to read the full article ... Read More

Lessons learned from the Fresenius ransomware cyberattack

| | General Security
Introduction to the Snake ransomware Fresenius is a German company that provides various health care services, including services for dialysis of people with chronic kidney failure. In the United... Go on to the site to read the full article ... Read More

Agent Tesla: What it is, how it works and why it’s targeting energy companies

| | Malware Analysis
Introduction to Agent Tesla Agent Tesla appeared for the first time in 2014, but it has been just recently used for attacks on energy companies operating in various fields. These fields include... Go on to the site to read the full article ... Read More

Dark web fraud: How-to guides make cybercrime too easy

| | Security Awareness
Introduction to dark web fraud Dark web fraud constitutes a global information security problem. The widespread availability of how-to guides providing instructions on how to commit such fraud... Go on to the site to read the full article ... Read More

BazarBackdoor malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction to BazarBackdoor BazarBackdoor is a new malware with the ability to install various types of malicious programs on the infected computers. It is believed to be created by the developers... Go on to the site to read the full article ... Read More

Five key lessons from the 2020 U.S. Cyberspace Solarium Commission report

| | General Security
Introduction On March 11, 2020, the Cyberspace Solarium Commission (CSC), a governmental commission aiming to identify “a strategic approach to defending the United States in cyberspace against... Go on to the site to read the full article ... Read More

Starslord 2.0 malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction The sLoad malware was discovered for the first time in 2018. It delivers various Trojans to the infected computers, including but not limited to the banking Trojans Ramnit, Gootkit and... Go on to the site to read the full article ... Read More

Jackpotting malware

| | Malware Analysis
Introduction Jackpotting malware is not well known because it exclusively targets automated teller machines (ATMs). This means it usually doesn’t directly affect a large number of people. However,... Go on to the site to read the full article ... Read More
Loading...