Octopus Scanner malware: What it is, how it works and how to prevent it | Malware spotlight
IntroductionOctopus Scanner appeared somewhere in 2018. Although its creators are still unknown, the operation of Octopus Scanner has been extensively discussed in numerous information security publications. This type of malware attacks repositories on...
Tesla Model 3 vulnerability: What you need to know about the web browser bug
IntroductionIn 2020, Jacob Archuleta, a researcher nicknamed Nullze, discovered an important information security vulnerability on the web browser of the Tesla Model 3 automobile. If a user of the car’s boarding computer visits a specific website, the...