The malware framework is still going through its infancy and the malware authors are supposed to improvise and strengthen the attack vector with its final version
WeLeakData is known as a fierce competitor to RaidForums where cybercriminals dump breached data and acts as a marketplace for cybercrime-related solutions
The Thunderspy attacks can be executed even if the target device has Secure Boot, strong BIOS and operating system account passwords, as well as full disk encryption
Researchers found the leaked data comprises confidential business data like financial records, employees information, audit findings conducted by the audit and accounting firm PwC
Twitter has tipped to working on a feature which would analyse the words used in a tweet, and alert the user to rethink over the choice of words if it finds anything offensive