Tuesday, March 19, 2024

tag:

analysis

Android puzzle game with over one million downloads reveals user information

Fruits Mania, a well-known and trustworthy puzzle game, is one of...

Over 50 Million Passwords Stolen by 30+ Russian Cybercrime Groups Using Stealer Malware

In the first seven months of 2022, up to 34 Russian-speaking...

73% of retail applications have security flaws, yet only a quarter of them have been fixed

Almost three-quarters of apps in the retail and hospitality sectors have...

A Very Powerful Clipboard: Analysis of a Samsung in-the-wild exploit chain

Note: The three vulnerabilities discussed in this blog were all fixed...

Hackers selling access to 576 corporate networks for $4 million

A new report shows that hackers are selling access to 576...

How to Run Threat Intelligence Analysis and Malware Research (Without Spending a Dime)

In this post, I will walk you step-by-step through techniques that...

YTStealer Malware Targets Accounts of YouTube Content Creators

Cybersecurity researchers have documented a new information-stealing malware that targets YouTube...

Meet the Admins of the RSOCKS Proxy Botnet

Authorities in the United States, Germany, the Netherlands and the U.K....

Google Chrome extensions can be easily fingerprinted to track you online

A researcher has created a website that uses your installed Google...