Explore how an attacker can bypass Yahoo!View's CORS restrictions by exploiting a vulnerability in its API. Discover the impact of improper CORS configuration a
Explore the Tethr vulnerability that bypasses the tethering service provisioning check in pre-7.1.2 Android versions. Learn about the technical details and how
Learn about the Catelites Bot, a new Android malware that mimics over 2200 financial institutions' apps. Understand how it uses social engineering techniques to