Tesla Model 3 vulnerability: What you need to know about the web browser bug
Introduction In 2020, Jacob Archuleta, a researcher nicknamed Nullze, discovered an important information security vulnerability on the web browser of the Tesla Model 3 automobile. If a user of the... Go on to the site to read the full article ... Read More
Analysis of ransomware used in recent cyberattacks on health care institutions
Introduction In recent years, there has been a steady increase in the number of ransomware attacks on healthcare institutions. The pressure such institutions experienced as a result of the COVID-19... Go on to the site to read the full article ... Read More
PonyFinal malware: What it is, how it works and how to prevent it | Malware spotlight
Introduction to PonyFinal PonyFinal ransomware appeared for the first time in 2020. It is malware that relies on human-operated attacks, i.e., attacks that exploit information security... Go on to the site to read the full article ... Read More
Lessons learned from the Fresenius ransomware cyberattack
Introduction to the Snake ransomware Fresenius is a German company that provides various health care services, including services for dialysis of people with chronic kidney failure. In the United... Go on to the site to read the full article ... Read More
Agent Tesla: What it is, how it works and why it’s targeting energy companies
Introduction to Agent Tesla Agent Tesla appeared for the first time in 2014, but it has been just recently used for attacks on energy companies operating in various fields. These fields include... Go on to the site to read the full article ... Read More
Dark web fraud: How-to guides make cybercrime too easy
Introduction to dark web fraud Dark web fraud constitutes a global information security problem. The widespread availability of how-to guides providing instructions on how to commit such fraud... Go on to the site to read the full article ... Read More
BazarBackdoor malware: What it is, how it works and how to prevent it | Malware spotlight
Introduction to BazarBackdoor BazarBackdoor is a new malware with the ability to install various types of malicious programs on the infected computers. It is believed to be created by the developers... Go on to the site to read the full article ... Read More
Five key lessons from the 2020 U.S. Cyberspace Solarium Commission report
Introduction On March 11, 2020, the Cyberspace Solarium Commission (CSC), a governmental commission aiming to identify “a strategic approach to defending the United States in cyberspace against... Go on to the site to read the full article ... Read More
Starslord 2.0 malware: What it is, how it works and how to prevent it | Malware spotlight
Introduction The sLoad malware was discovered for the first time in 2018. It delivers various Trojans to the infected computers, including but not limited to the banking Trojans Ramnit, Gootkit and... Go on to the site to read the full article ... Read More
Jackpotting malware
Introduction Jackpotting malware is not well known because it exclusively targets automated teller machines (ATMs). This means it usually doesn’t directly affect a large number of people. However,... Go on to the site to read the full article ... Read More