Knock, knock: Why the recent announcement about mobile spyware leak was fake

- Posted in Threat Analyze by
Background: Recently, a Telegram account announced the publication of source codes related to a mobile spyware. Before drawing any final conclusions, it is important to understand that this [...] Read more

Not the First, Not the Last: Understanding the 16 Billion Infostealer Leak

- Posted in Threat Analyze by
Background: Recently, the media reported on a leak of 16 billion cleartext passwords that were found on an underground platform. As a result, the team behind the discovery noticed that the names of [...] Read more

Hardcoded Hazards: Detecting Secret Leaks in Source Code

- Posted in Other by
Background: Organizations often invest significant resources in research and development (R&D), which can carry substantial risks—especially when sensitive information is inadvertently exposed [...] Read more

The Case for Email Confidentiality in Online Sign-Up Processes

- Posted in Other by
Background: During our daily activities, we leave digital traces of our presence on various platforms that are protected by legal and compliance measures. However, have you ever considered the [...] Read more

Turning Specialized Platform Data Breaches into Defensive Insights

- Posted in Leak by
Background: Since the beginning of the internet, a variety of communities have existed, ranging from hacking and malware development groups to those involved in insider information sales and illegal [...] Read more

The danger of leaked hash password from the perspective of defense in depth

- Posted in Leak by
Background: Before delving into the scope of leaked hashed passwords, it's important to understand the purpose of hashing. At a high level, hashing is a one-way function that transforms any input [...] Read more