PinnedCybersecInfoWhen an App has System Privileges, Can It Really Do Whatever It Wants?Background·11 min read·Mar 10, 2023----
CybersecInfoAnalysis of the Hidden Backdoor Event in Qualcomm GPS ServiceBackground·9 min read·Jun 1, 2023----
CybersecInfoSubgroup of Blind Eagle? Analysis of Recent Attack Activities from Hagga GroupBackground·12 min read·Jun 1, 2023----
CybersecInfoCVE-2023–28252: Analysis of In-the-Wild Exploit Sample of CLFS Privilege Escalation VulnerabilityOverview·19 min read·Jun 1, 2023----
CybersecInfoAnalysis of SideCopy Group’s Recent Attacks Using Indian Ministry of Defense Documents as LuresBackground·7 min read·Mar 21, 2023----
CybersecInfoLeaked 21GB of Data! Well-known Security Company was HackedAn anonymous hacker has broken into Swiss security company Acronyis and stolen a large amount of sensitive data. Ironically, on its web…·6 min read·Mar 15, 2023----
CybersecInfoOverview of Russia’s Cyberspace Security Posture in 2022In 2022, the geopolitical and economic situation will have a significant impact on Russia’s cybersecurity in the context of the…·12 min read·Mar 13, 2023----
CybersecInfoGender Diversity in Cybercrime Forums: The Rise of Female UsersThe report shows that 36% of users on the Hackforums forum are female, according to terminology analysis; and 30% of users of the…·4 min read·Mar 13, 2023----
CybersecInfoWhy do Government Officials and Agencies Keep Getting Hacked?If Watergate had happened today, perhaps the Nixon team would not have needed to infiltrate the office for physical eavesdropping. Today’s…·7 min read·Mar 13, 2023----
CybersecInfo12 Tips for Building a Secure Software Supply ChainSoftware supply chain attacks are becoming a common form of crime to illegally obtain business information. Some research data show that…·5 min read·Mar 10, 2023----