Tesla is using over the air updates to patch vulnerabilities and add new features to its keyless entry system in Tesla Model X vehicles. However, according to a specialist at…
Group-IB discovered that QakBot (aka Qbot) operators have abandoned ProLock for Egregor ransomware. ProLock = Egregor The analysis of attacks where Egregor has been deployed revealed that the TTPs used…
The malware encryption service run by a Romanian based in Craiova and Bucharest duo helped hackers embed malicious code in legit software to bypass antivirus tools. The pair ran online…
Trying to make predictions about the future is a tricky business. As per the researchers what they predicted and what is happened.. and what going to happen they elobrated The…
The Egregor ransomware uses a novel approach to get a victim's attention after an attack - shoot ransom notes from all available printers. Ransomware gangs know that many businesses would…
The increase in usage of remote conference also brings the question of security and data privacy. Researchers at IBM analysed one such popular offering, Cisco’s Webex, and discovered three vulnerabilities…
Google has released today version 87 of its Chrome browser, a release that comes with a security fix for the NAT Slipstream attack technique and a broader deprecation of the…
In June, Microsoft released Microsoft Defender Advanced Threat Protection (ATP) for Linux for general use. Now, Microsoft has improved the Linux version of Defender, by adding a public preview of EDR…