IOMobileFrameBuffer vulnerability in iPhone 6s and later (until iOS 15.3) has been actively exploited (CVE-2022-22587)
Impact: A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited
https://support.apple.com/en-us/HT213053
Impact: A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited
https://support.apple.com/en-us/HT213053
Apple Support
About the security content of iOS 15.3 and iPadOS 15.3
This document describes the security content of iOS 15.3 and iPadOS 15.3.
SAMSUNG_LEAK.torrent
1.2 MB
Samsung Electronics Leaked Data (189 GB)
Part 1 contains a dump of source code and related data about Security/Defense/Knox/Bootloader/TrustedApps and various other items.
Part 2 contains a dump of source code and related data about device security and encryption related stuffs.
Part 3 contains various repositorys from Samsung Github. Including Mobile defense engineering, Samsung account backend, Samsung pass backend/frontend, and SES (Bixby, Smartthings, store, etc)
Part 1 and 2 also contain highly confidential data from Qualcomm and various other samsung parters
Part 1 contains a dump of source code and related data about Security/Defense/Knox/Bootloader/TrustedApps and various other items.
Part 2 contains a dump of source code and related data about device security and encryption related stuffs.
Part 3 contains various repositorys from Samsung Github. Including Mobile defense engineering, Samsung account backend, Samsung pass backend/frontend, and SES (Bixby, Smartthings, store, etc)
Part 1 and 2 also contain highly confidential data from Qualcomm and various other samsung parters