Skip to the content
Hacktive Security Blog
  • Pin Posts
  • Home
  • 2013
  • March

March 2013

0
0
Abusing Ruzzle protocol, privacy violation and more…
Mobile

Abusing Ruzzle protocol, privacy violation and more…

o___o
March 21, 2013June 20, 2021
In the beginning of January 2013 we started a security research project focused on some of the most spreaded mobile applications and considering how popular Ruzzle became...
Read More

Recent Post

CVE-2022-2602: DirtyCred File Exploitation applied on an io_uring UAF

Lock Picking – Part 1

How an Akamai misconfiguration earned us USD 46.000

Workshop: Linux Kernel Exploitation 101 – Part 2

Workshop: Linux Kernel Exploitation 101 – Part 1

Top Category

Application Security

Mobile

Exploitation

  • Pin Posts
Copyright © 2023 Hacktive Security Blog. All rights reserved.
Theme: Masonry Grid By Themeinwp. Powered by WordPress.
To the Top ↑ Up ↑