Thu 11 September 2025
Uncovering bypasses, RCE, SSRF, CSRF, and account-takeover vulnerabilities in WSO2 products.
Mon 01 September 2025
Tracking already-established BLE connections using SDR has its own challenges. With custom firmware and multi-channel listening, the presented approach quickly deduces the hidden hopping parameters needed to follow the connection.
Tue 15 July 2025
The article analyzes the Secp0 ransomware, which emerged in early 2025 and operates as conventional double-extortion ransomware, encrypting data while threatening public disclosure, targeting Linux systems.
Tue 20 May 2025
This article provides an analysis of World Leaks, a new extortion platform that emerged in early 2025, detailing its origins, operational challenges, and collaborations with other threat actors.
Wed 12 March 2025
Exploitation of multiple vulnerabilities in GLPI to gain remote code execution from unauthenticated privileges.
Fri 28 February 2025
An OSINT investigation into the world of forged documents business
Check our offensive & continuous web security assessment service