PinnedWhen an App has System Privileges, Can It Really Do Whatever It Wants?BackgroundMar 10, 2023Mar 10, 2023
Subgroup of Blind Eagle? Analysis of Recent Attack Activities from Hagga GroupBackgroundJun 1, 2023Jun 1, 2023
CVE-2023–28252: Analysis of In-the-Wild Exploit Sample of CLFS Privilege Escalation VulnerabilityOverviewJun 1, 2023Jun 1, 2023
Analysis of SideCopy Group’s Recent Attacks Using Indian Ministry of Defense Documents as LuresBackgroundMar 21, 2023Mar 21, 2023
Leaked 21GB of Data! Well-known Security Company was HackedAn anonymous hacker has broken into Swiss security company Acronyis and stolen a large amount of sensitive data. Ironically, on its web…Mar 15, 2023Mar 15, 2023
Overview of Russia’s Cyberspace Security Posture in 2022In 2022, the geopolitical and economic situation will have a significant impact on Russia’s cybersecurity in the context of the…Mar 13, 2023Mar 13, 2023
Gender Diversity in Cybercrime Forums: The Rise of Female UsersThe report shows that 36% of users on the Hackforums forum are female, according to terminology analysis; and 30% of users of the…Mar 13, 2023Mar 13, 2023
Why do Government Officials and Agencies Keep Getting Hacked?If Watergate had happened today, perhaps the Nixon team would not have needed to infiltrate the office for physical eavesdropping. Today’s…Mar 13, 2023Mar 13, 2023
12 Tips for Building a Secure Software Supply ChainSoftware supply chain attacks are becoming a common form of crime to illegally obtain business information. Some research data show that…Mar 10, 2023Mar 10, 2023