Inside LinkedIn's Surveillance Engine: 48 Browser Fingerprints, Hidden Iframes, and What Users Should Know

An independent deep-dive analysis of LinkedIn's production JavaScript reveals a multi-layered surveillance infrastructure collecting 48 browser characteristics, hidden iframes from HUMAN Security, RSA-encrypted fingerprint injection on every API request, and deliberate evasion techniques.

Read More
Russian CTRL Toolkit: How Malicious LNK Files Enable RDP Hijacking via Reverse Tunnels

A custom .NET RAT dubbed CTRL uses weaponized Windows shortcuts to hijack RDP sessions via FRP tunnels—here’s the full attack chain and how to defend against it.

Read More
Red Menshen’s Upgraded BPFdoor: How China’s Stealthiest Backdoor Infiltrates Global Telecom Networks

Red Menshen’s upgraded BPFdoor backdoor embeds kernel-level sleeper cells in telecom networks worldwide. Here’s how it works and how to detect it.

Read More
💬 Ask our AI Assistant Kali