Technical analysis of the popular ransomware Wannacry.| SerHack – Security Research
See how I could perform an XSS Injection with Envato Search Field. SerHack Blog, a blog about security researcher, development and reverse engineering.| SerHack – Security Research
Let’s take a look at the Telugu symbol “jñā” that causes Apple software to crash.| SerHack – Security Research
The MoneroV coin is an impending unofficial fork of the Monero blockchain with many “red flag” characteristics that have alarmed the Monero community. Many users are wondering: could the MoneroV fork be a scam project?| SerHack – Security Research
Online compilers are a handy tool to save time and resources for coders, and are freely available for a variety of programming languages. But what's happen if they aren't built so secure?| SerHack – Security Research
On 4 September at 14:30 UTC, an unknown attacker managed to hack into MEGA's Google Chrome web store account and upload a malicious version 3.39.4 of an extension to the web store, according to a blog post published by the company.| SerHack – Security Research