From failed QR payment guesses to reversing a protected Flutter app and exploiting a wallet validation bug.
Deep dive into a malicious Android RAT using a dropper technique, runtime decryption, and dual C2 communication paths.
IoT device exploitation and firmware analysis.
Investigating a malicious Android application shared through WhatsApp groups.