Dual Privilege Escalation Chain: Exploiting Monitoring and Service Mesh Configurations and Privileges in GKE to Gain Unauthorized Access in Kubernetes 6,908 people reacted Dual Privilege Escalation Chain: Exploiting Monitoring and Service Mesh Configurations and Privileges in GKE to Gain Unauthorized Access in Kubernetes By Shaul Ben Hai December 27, 2023 at 6:00 AM 33 11 min. read
Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature 5,371 people reacted Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature By Zohar Zigdon November 30, 2023 at 3:00 PM 19 10 min. read
78,412 people reacted Targeted Attacks in the Middle East Using KASPERAGENT and MICROPSIA By Tomer Bar and Tom Lancaster April 5, 2017 at 5:00 AM 10 10 min. read
48,538 people reacted A New Trend in Android Adware: Abusing Android Plugin Frameworks By Cong Zheng, Wenjun Hu and Zhi Xu March 22, 2017 at 1:00 PM 29 7 min. read
45,658 people reacted PluginPhantom: New Android Trojan Abuses “DroidPlugin” Framework By Cong Zheng and Tongbo Luo November 30, 2016 at 1:00 PM 11 8 min. read
Android Installer Hijacking Vulnerability Could Expose Android Users to Malware By Zhi Xu March 24, 2015 at 5:00 AM 12 7 min. read
Bad Certificate Management in Google Play Store By Zhi Xu and Jen Miller-Osborn August 28, 2014 at 2:00 PM 8 6 min. read