Stealer logs: How hackers gain access to vehicle functions through stolen login dataTogether with ZDF WISO, we show how criminals can use stolen login data from stealer logs to locate, open and drive away cars.
The Banshee Information Stealer: The New Threat for MacsA new type of malware is spreading and primarily infects macOS devices. The spread of Banshee relies particularly on human factors.