Tesla Model 3 vulnerability: What you need to know about the web browser bug

Introduction In 2020, Jacob Archuleta, a researcher nicknamed Nullze, discovered an important information security vulnerability on the web browser of the Tesla Model 3 automobile. If a user of the…
Go on to the site to read the full article
The post… Continue reading Tesla Model 3 vulnerability: What you need to know about the web browser bug

Agent Tesla: What it is, how it works and why it’s targeting energy companies

Introduction to Agent Tesla Agent Tesla appeared for the first time in 2014, but it has been just recently used for attacks on energy companies operating in various fields. These fields include…
Go on to the site to read the full article
The post Age… Continue reading Agent Tesla: What it is, how it works and why it’s targeting energy companies

BazarBackdoor malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction to BazarBackdoor BazarBackdoor is a new malware with the ability to install various types of malicious programs on the infected computers. It is believed to be created by the developers…
Go on to the site to read the full article
The pos… Continue reading BazarBackdoor malware: What it is, how it works and how to prevent it | Malware spotlight

Five key lessons from the 2020 U.S. Cyberspace Solarium Commission report

Introduction On March 11, 2020, the Cyberspace Solarium Commission (CSC), a governmental commission aiming to identify “a strategic approach to defending the United States in cyberspace against…
Go on to the site to read the full article
The po… Continue reading Five key lessons from the 2020 U.S. Cyberspace Solarium Commission report

Starslord 2.0 malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction The sLoad malware was discovered for the first time in 2018. It delivers various Trojans to the infected computers, including but not limited to the banking Trojans Ramnit, Gootkit and…
Go on to the site to read the full article
The post… Continue reading Starslord 2.0 malware: What it is, how it works and how to prevent it | Malware spotlight