Nation-state actors and cybercrime gangs abuse malicious .lnk files for espionage and data theft

11 state-sponsored APTs exploit malicious .lnk files for espionage and data theft, with ZDI uncovering 1,000 such files used in attacks. At least 11 state-sponsored threat groups have been abusing Windows shortcut files for espionage and data theft, according to an analysis by Trend Micro’s Zero Day Initiative (ZDI). Trend ZDI researchers discovered 1,000 malicious […]

Tesla RoboTaxi DOA: Risk Analysis Shows Why They Can Never Work

As Tesla inches closer to launching its late and overhyped robotaxi experiment, a critical vulnerability in their business model looks larger by the minute: removal of a private ownership barrier that currently protects their brand from widespread dest…

Tesla RoboTaxi DOA: Risk Analysis Shows Why They Can Never Work

As Tesla inches closer to launching its late and overhyped robotaxi experiment, a critical vulnerability in their business model looks larger by the minute: removal of a private ownership barrier that currently protects their brand from widespread dest…