Cybersecurity Research

Google’s Quick Share Vulnerabilities Let Attackers Execute Remote Code

By reverse-engineering Quick Share's proprietary communication protocol, researchers uncovered multiple vulnerabilities, including unauthorized file writes, forced Wi-Fi connections, directory traversal,…

2 months ago

Universal Code Execution Vulnerability In Browsers Puts Millions Of Users At Risk

Hackers remotely execute malicious code on a compromised device or server by exploiting the Universal Code Execution vulnerability. Through this…

4 months ago

Hackers Using Polyglot Files In the Wild, Here Comes PolyConv For Detection

Polyglot files have to fit in several file format specifications and respond differently depending on the calling program. This poses…

4 months ago

HackCar – Attack AND Defense Playground For Automotive System

Modern cars have microcontrollers that use the Controller Area Network (CAN) to perform safety and luxury functions.  However, vehicle hijacking…

6 months ago

FGVulDet – New Vulnerability Detector to Analyze Source Code

Detecting source code vulnerabilities aims to protect software systems from attacks by identifying inherent vulnerabilities.  Prior studies often oversimplify the…

6 months ago