Was this taken from the Crowdstrike repo?
Was this taken from the Crowdstrike repo?
I’m really out of the loop, what are they investigating?
This sounds very similar to the NewPipe app which I use for watching YT. Maybe check out their Github for some inspiration?
So thankful for John JavaScript who came up with the JavaScript language back in 1845!
I’m trying to learn rust and so far this has definitely made it so much more accessible.
Not to mention their super useful “rustlings” training which has these nice little challenges to get you used to language and syntax
I’m also not a fan of MS spyware.
But in defence of the MS authenticator, the 2FA prompts it sends are very convenient, how they pop up and ask for the number displayed on screen, its definitely more secure than just the one time code.
Plus it also shows what phone the user is using when they install and configure the authenticator app, this is also very useful if you suddenly see the user accessing their mail or one drive from another mobile device.
Planning on a holiday later this year, safe to say I’ll be going out of my way to not be on a boeing.
Cooking just isn’t the same without it!!! /s
deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator
deleted by creator
This will almost certainly be a false positive, its a heuristics(I think that’s the correct term) based detection, basically just matches certain characteristics of files that have been related to that trojan.
These days Defender has exceptional real time malware scanning capabilities, it often picks up stuff as you download it or even as it executes. If this was a detection of an existing file, its very likely a false positive.