Discover how an IDOR vulnerability was exploited to take control of ads on OLX's LetGo platform. Learn about the techniques used for traffic analysis and bypass
Explore the challenges faced during mobile card reissues and delve into security concerns with telecom versus mobile verification methods. Discover how identity
An analysis of a social spyware that targets personal information on popular mobile social apps. Learn about its remote control, privilege escalation, and data
Discover how two malicious applications disguised as Poloniex have stolen user login details. Learn about the tactics used and protect your accounts by avoiding
Security experts at the NATO-organized CyCon conference were targeted by APT28 with simple fishy attacks and macro viruses. Learn more about Seduploader trojan
Discover the underestimated cyber warfare capabilities of North Korea and how they are silently stealing billions through global financial heists and ransomware
Explore the SSL Stripping attack—a new wireless network threat that can strip away HTTPS encryption—and learn about its defense mechanisms. Understand how HTTP