PinnedCybersecInfoWhen an App has System Privileges, Can It Really Do Whatever It Wants?BackgroundMar 10, 2023Mar 10, 2023
CybersecInfoAnalysis of the Hidden Backdoor Event in Qualcomm GPS ServiceBackgroundJun 1, 2023Jun 1, 2023
CybersecInfoSubgroup of Blind Eagle? Analysis of Recent Attack Activities from Hagga GroupBackgroundJun 1, 2023Jun 1, 2023
CybersecInfoCVE-2023–28252: Analysis of In-the-Wild Exploit Sample of CLFS Privilege Escalation VulnerabilityOverviewJun 1, 2023Jun 1, 2023
CybersecInfoAnalysis of SideCopy Group’s Recent Attacks Using Indian Ministry of Defense Documents as LuresBackgroundMar 21, 2023Mar 21, 2023
CybersecInfoLeaked 21GB of Data! Well-known Security Company was HackedAn anonymous hacker has broken into Swiss security company Acronyis and stolen a large amount of sensitive data. Ironically, on its web…Mar 15, 2023Mar 15, 2023
CybersecInfoOverview of Russia’s Cyberspace Security Posture in 2022In 2022, the geopolitical and economic situation will have a significant impact on Russia’s cybersecurity in the context of the…Mar 13, 2023Mar 13, 2023
CybersecInfoGender Diversity in Cybercrime Forums: The Rise of Female UsersThe report shows that 36% of users on the Hackforums forum are female, according to terminology analysis; and 30% of users of the…Mar 13, 2023Mar 13, 2023
CybersecInfoWhy do Government Officials and Agencies Keep Getting Hacked?If Watergate had happened today, perhaps the Nixon team would not have needed to infiltrate the office for physical eavesdropping. Today’s…Mar 13, 2023Mar 13, 2023
CybersecInfo12 Tips for Building a Secure Software Supply ChainSoftware supply chain attacks are becoming a common form of crime to illegally obtain business information. Some research data show that…Mar 10, 2023Mar 10, 2023