Tag: mobile application
-
Bulletins: Vulnerability Summary for the Week of June 23, 2025
Source URL: https://www.cisa.gov/news-events/bulletins/sb25-181 Source: Bulletins Title: Vulnerability Summary for the Week of June 23, 2025 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 70mai–M300 A vulnerability was found in 70mai M300 up to 20250611 and classified as critical. Affected by this issue is some unknown functionality of the component Telnet…
-
The Register: Meta pauses mobile port tracking tech on Android after researchers cry foul
Source URL: https://www.theregister.com/2025/06/03/meta_pauses_android_tracking_tech/ Source: The Register Title: Meta pauses mobile port tracking tech on Android after researchers cry foul Feedly Summary: Zuckercorp and Yandex used localhost loophole to tie browser data to app users, say boffins Security researchers say Meta and Yandex used native Android apps to listen on localhost ports, allowing them to link…
-
Slashdot: Meta and Yandex Are De-Anonymizing Android Users’ Web Browsing Identifiers
Source URL: https://yro.slashdot.org/story/25/06/03/205251/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Meta and Yandex Are De-Anonymizing Android Users’ Web Browsing Identifiers Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a newly discovered method used by Meta and Yandex that bypasses existing Android privacy protections, allowing these companies to de-anonymize users by linking their web browsing activities to…
-
Bulletins: Vulnerability Summary for the Week of May 5, 2025
Source URL: https://www.cisa.gov/news-events/bulletins/sb25-132 Source: Bulletins Title: Vulnerability Summary for the Week of May 5, 2025 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1clickmigration–1 Click WordPress Migration Plugin 100% FREE for a limited time The 1 Click WordPress Migration Plugin – 100% FREE for a limited time plugin for WordPress…
-
Cloud Blog: Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/2024-zero-day-trends/ Source: Cloud Blog Title: Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis Feedly Summary: Written by: Casey Charrier, James Sadowski, Clement Lecigne, Vlad Stolyarov Executive Summary Google Threat Intelligence Group (GTIG) tracked 75 zero-day vulnerabilities exploited in the wild in 2024, a decrease from the number we identified in 2023…
-
Cloud Blog: Global startups are building the future of AI on Google Cloud
Source URL: https://cloud.google.com/blog/topics/startups/why-global-startups-are-gathering-at-google-cloud-next25/ Source: Cloud Blog Title: Global startups are building the future of AI on Google Cloud Feedly Summary: The most exciting startups in the world are in Las Vegas this week, as Google Cloud Next kicks off with a major focus on how AI and cloud are powering the next great wave of…
-
Hacker News: Technical Analysis – Improper Use of Private iOS APIs in Vietnamese Banking Apps
Source URL: https://blog.verichains.io/p/technical-analysis-improper-use-of Source: Hacker News Title: Technical Analysis – Improper Use of Private iOS APIs in Vietnamese Banking Apps Feedly Summary: Comments AI Summary and Description: Yes Summary: The text outlines a security analysis of two Vietnamese banking apps, BIDV SmartBanking and Agribank Plus, which reportedly use a hidden iOS API to detect other…
-
Bulletins: Vulnerability Summary for the Week of March 10, 2025
Source URL: https://www.cisa.gov/news-events/bulletins/sb25-076 Source: Bulletins Title: Vulnerability Summary for the Week of March 10, 2025 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1E–1E Client Improper link resolution before file access in the Nomad module of the 1E Client, in versions prior to 25.3, enables an attacker with local unprivileged…
-
Unit 42: Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims
Source URL: https://unit42.paloaltonetworks.com/?p=138627 Source: Unit 42 Title: Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims Feedly Summary: We identified a campaign spreading thousands of sca crypto investment platforms through websites and mobile apps, possibly through a standardized toolkit. The post Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud Victims appeared…
-
Google Online Security Blog: Vulnerability Reward Program: 2024 in Review
Source URL: http://security.googleblog.com/2025/03/vulnerability-reward-program-2024-in.html Source: Google Online Security Blog Title: Vulnerability Reward Program: 2024 in Review Feedly Summary: AI Summary and Description: Yes Summary: The text discusses Google’s Vulnerability Reward Program (VRP) for 2024, highlighting its financial support for security researchers and improvements to the program. Notable enhancements include revamped reward structures for mobile, Chrome, and…