13.02.2026
The AES-GCM-256 key is stored and generated by WhatsApp server and is sent to…
Read more »
Attackers inject malicious code that collects payment data onto a hacked site. Cybercriminals use Google Analytics to steal credit card…
An Australian man was charged in the Perth Magistrate’s Court for attempting to import methamphetamine hidden in a children’s toy.…
The German government passed a draft law that requires employees of private postal services to report packages of drugs to…
By Mark Lechtik, Igor Kuznetsov, Yury Parshin Part II. Technical details (PDF) UEFI (or Unified Extensible Firmware Interface) has become a prominent technology that is embedded within designated chips on modern day computer systems. Replacing the legacy BIOS,…
Behind the scenes of law enforcement in cyber: what do we know about caught cybercriminals?…
LockBitSupp, the individual(s) behind the persona representing the LockBit ransomware service on cybercrime forums such…
By Mark Lechtik, Igor Kuznetsov, Yury Parshin Part II. Technical details (PDF) UEFI (or Unified Extensible Firmware Interface) has become a prominent technology…
Read more »
By Gabor Szathmari One interesting offshoot of researching .gov.au websites running outside Australia was an odd service running from Russia. How the Service…
Read more »