Discover how fraudulent apps deceive users with false loan offers and tricks to bypass '青少年模式'. Read about a 50K scam case and the legal action against an app f
Read about the release and deportation of former intelligence agent Cheng Lei after serving her sentence. Discover how a cybercriminal breached a training insti
This article discusses the discovery of a yellow app masquerading as an educational English learning tool in Apple's App Store. It highlights the serious issue
This article analyzes the root detection mechanisms of a Speed accelerator app and provides methods to bypass them using tools like frida and smali code modific
Learn about four types of 'killing' frauds from the Ministry of Public Security. Stay informed and protect yourself online at safety websites like ours.
Discover how the French space and defense supplier Exail suffered a data breach due to an exposed .env file. Learn about the potential impacts on server securit
Discover the new pixel stealing attack that affects major GPU suppliers and how it bypasses same origin policies. Understand the implications for cybersecurity