An analysis of a social spyware that targets personal information on popular mobile social apps. Learn about its remote control, privilege escalation, and data
Explore the challenges faced during mobile card reissues and delve into security concerns with telecom versus mobile verification methods. Discover how identity
Discover how an IDOR vulnerability was exploited to take control of ads on OLX's LetGo platform. Learn about the techniques used for traffic analysis and bypass
Discover why Discord has become the most popular communication app among dark web criminals despite not supporting end-to-end encryption. Learn about the growin
Central Bank expert warns of significant risks posed by Fintech, particularly focusing on liquidity risk. The article discusses the potential impact of large Fi
This report from CNCERT analyzes the security defects in open-source software used by top foreign internet companies such as Google, Facebook, and Twitter. It c