Cybersecurity Research

Hackers Leveraging Compiled V8 JavaScript In Wild To Deploy Malware

Hackers exploit compiled V8 JavaScript to obfuscate their malicious code, as the compiled bytecode effectively hides the malware's original source…

8 months ago

Hackers Abuse Windows Search Functionality To Deploy Malware

Hackers use Windows Search's vulnerability to penetrate different layers and rooms in the client's systems and execute unauthorized code by…

9 months ago

AI-Based Webshell Detection Model – Detailed Overview

While injection vulnerabilities are on the rise, Webshells have become a serious concern. They allow attackers to gain unauthorized access…

11 months ago

29 0-days Uncovered : Hackers Earned $1,132,500 Pwn2Own Vancouver 2024

The Pwn2Own Vancouver 2024 has come to an end, with researchers receiving a total of $1,132,500 for uncovering 29 distinct…

12 months ago