Three WordPress plugins were found to contain backdoors by the security team Wordfence. Learn about the plugins involved and how they were used for SEO spam. St
Explore the Tethr vulnerability that bypasses the tethering service provisioning check in pre-7.1.2 Android versions. Learn about the technical details and how
Explore how Nhash malware spreads through free software downloads and the impact on user computers. Learn about its operation and the financial gains for cyberc
Learn about the Catelites Bot, a new Android malware that mimics over 2200 financial institutions' apps. Understand how it uses social engineering techniques to
Discover how domain delegation can be exploited to gain domain admin privileges and learn about its various applications in large networks. Understand the impor
Explore the detailed cost structure behind cybercrime operations, from malware acquisition to money laundering services. Understand the complex ecosystem of dar