Aggregator
CVE-2022-37882 | Aruba ClearPass Policy Manager up to 6.9.11/6.10.6 Web-based Management Interface privilege escalation (ARUBA-PSA-2022-013)
CVE-2022-38955 | Netgear WPN824EXT 1.1.1_1.1.9 Firmware Image cryptographic issues
CVE-2022-33735 | Huawei WS7200-10 11.0.2.13 Password Verification excessive authentication (sa-20220628-01)
CVE-2021-46834 | Huawei JAD-AL50 102.0.0.225 Cross Device Task Management permission (huawei-sa-20220819-01)
CVE-2020-36602 | Huawei 576up005 HOTA-CM-H-Shark-BD Headset out-of-bounds write (huawei-sa-20220826-01)
CVE-2021-46835 | Huawei WS7200-10 11.0.2.13 privilege escalation (huawei-sa-20220831-01)
CVE-2022-37395 | Huawei CV81-WDM 01.70.49.29.46 denial of service (huawei-sa-20220810-01)
CVE-2022-30579 | TIBCO Spotfire Analytics Platform for AWS Marketplace 12.0.0 Web Player server-side request forgery
UDRL -> Set Eaf_Bypass "true"
java反序列化之yso中的spring链子分析及利用
Botnet hacks 9,000+ ASUS routers to add persistent SSH backdoor
Alleged sale of 1 Million Credit Card Data
Dark Partners cybercrime gang fuels large-scale crypto heists
Worldwide Operation Shuts Down Hundreds of Ransomware Servers and Domains, Ending Key Attack Infrastructure
Law enforcement and judicial officials, working together with Europol and Eurojust, have dealt a devastating blow to the worldwide ransomware ecosystem in a historic international operation. From May 19 to 22, 2025, Operation Endgame targeted the critical infrastructure behind ransomware attacks, dismantling approximately 300 servers and neutralizing 650 malicious domains worldwide. This operation not only […]
The post Worldwide Operation Shuts Down Hundreds of Ransomware Servers and Domains, Ending Key Attack Infrastructure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
FTC Orders GoDaddy to Bolster its Security After Years of Attacks
Web hosting giant GoDaddy for years has mislead customers about the strength of its security program, but after a series of data breaches, the FTC is ordering the company to implements robust defenses and stop lying about its cybersecurity capabilities.
The post FTC Orders GoDaddy to Bolster its Security After Years of Attacks appeared first on Security Boulevard.
$1300 — и ты отличник. Полиция разоблачила аферистов, превративших экзамены в бизнес
Your Mobile Apps May Not Be as Secure as You Think… – FireTail Blog
May 28, 2025 - Lina Romero - Your Mobile Apps May Not Be as Secure as You Think…
Excerpt:
Cybersecurity risks are too close for comfort. Recent data from the Global Mobile Threat Report reveals that our mobile phone applications are most likely exposing our data due to insecure practices such as API key hardcoding.
Summary:
In 2025, most of us are reliant on our mobile devices for everything from communication to transportation and commerce. But the applications that are powering these functions are leaving users open to risk…
Blog Text:
It is no secret that many of us would be helpless without our mobile devices. Similarly, our mobile devices would be helpless without APIs. APIs are what allow mobile applications to communicate with one another, and send and receive requests between platforms, such as between your phone and the mobile application's cloud platform. If these APIs aren’t secure, the information you are putting into your mobile applications- which can include location data, banking details, and other PII- isn’t secure, either. A recent report from Zimperium revealed that mobile applications often fail to follow best practices around authentication and authorization, which leads to critical vulnerabilities for the user. A secure application should use placeholder tokens instead of direct access through a login. Best practices around authentication such as session-based authentication and header-based authentication can also help ensure only authenticated users are gaining access. Session-based authentication uses sessions to track authenticated user activity and stores information about the usage, creating a unique identifier to store information about the user. This information is kept in a cookie that can be sent to each server where a request is made, and these servers can in turn check if the session ID matches the authenticated user. Header-based authentication uses HTTP headers to authenticate the user on a separate server externally, sometimes a web gateway or proxy server. However, some developers use hard-coded API keys as a shortcut, meaning the token is the same for each user of the app. This is a bad practice when it comes to cybersecurity, because it means that if one user is compromised, they effectively all are. Even AI systems will not let you hardcode API keys, as they have been programmed against it for security reasons. As we see in the tables below (source: Zimperium), both Android and ios applications have a whole host of vulnerabilities, however Android seems to be significantly worse, particularly in regards to the Hardcoded API keys. The numbers are staggering- between 5 and 9 percent of Android applications use Hardcoded API keys. This percentage is alarmingly highest (8.7%) for lifestyle apps, which include journaling, meditation, planning apps, and some social media. For iOS applications, this number is slightly lower, between 1.6-3.6%, however, when you think about the sheer number of applications and installations of those applications out there, this is still too high. In addition to these applications that use Hardcoded API keys, there are many other glaring vulnerabilities brought to light in the Zimperium report. For example, large percentages of Android applications and smaller but still significant percentages of iOS applications are still using vulnerable encryption algorithms. And on the whole, both iOS and Android applications have a startlingly large percentage that leak sensitive data. For iOS, the biggest culprit are travel applications, of which around 59% leak sensitive data, which is more than half, and financial applications follow closely behind at 54%. This is even more worrying considering the types of PII these apps handle. For Android, entertainment apps such as social media have the highest percentage of data leakage, around 42.8%, which is close to half, and travel and lifestyle apps are close behind. Overall, our mobile applications are not nearly as secure as we would hope, especially given how reliant most of us are on these apps day to day. Many of them still use outdated practices such as Hardcoded API Keys which can compromise authentication for many users at once. In 2025, it is a travesty that these applications have not addressed these critical vulnerabilities. Individual users have little control over their data and the average consumer is not adequately prepared for a PII breach. The best things we can do in this current cyber landscape are…
Staying vigilant
Changing passwords frequently
Installing 2-factor authentication whenever possible
Updating applications frequently to ensure you are using the most recent and secure version. If you want to take control of your organization’s cybersecurity posture, see how FireTail can help you today. Schedule a demo or join our free tier to learn more.
The post Your Mobile Apps May Not Be as Secure as You Think… – FireTail Blog appeared first on Security Boulevard.
xAI 支付 3 亿美元让 Telegram 集成 Grok
Apple Blocked 2 million Malicious App & $9 Billion in Fraudulent Transactions
Apple has strengthened the App Store as a bulwark of confidence, a remarkable testament to its commitment to customer safety. According to the company’s annual fraud analysis, over the past five years, Apple has thwarted more than $9 billion in fraudulent transactions, with a staggering $2 billion prevented in 2024 alone. This achievement underscores Apple’s […]
The post Apple Blocked 2 million Malicious App & $9 Billion in Fraudulent Transactions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.