Advanced Protection: Google’s Strongest Security for Mobile Devices
https://security.googleblog.com/2025/05/advanced-protection-mobile-devices.html
https://security.googleblog.com/2025/05/advanced-protection-mobile-devices.html
Google Online Security Blog
Advanced Protection: Google’s Strongest Security for Mobile Devices
Posted by Il-Sung Lee, Group Product Manager, Android Security Protecting users who need heightened security has been a long-standing com...
🤣11💩5🌚2👍1
Hacking My Car, and probably yours— Security Flaws in Volkswagen’s App
https://loopsec.medium.com/hacking-my-car-and-probably-yours-security-flaws-in-volkswagens-app-24b34c47ba89
https://loopsec.medium.com/hacking-my-car-and-probably-yours-security-flaws-in-volkswagens-app-24b34c47ba89
Medium
Hacking My Car, and probably yours— Security Flaws in Volkswagen’s App
This flaw made me the owner of thousands of cars (sort of).
👍14❤4👏3👎1🌚1
I was playing around with new and smaller HackRF PortaPack H4M
In a summary blog, you can find what's new with H4M, how to flash it, copy necessary data, and a couple of use-cases.
https://www.mobile-hacker.com/2025/05/19/hackrf-portapack-h4m-with-mayhem-firmware-a-powerful-handheld-sdr-toolkit/
In a summary blog, you can find what's new with H4M, how to flash it, copy necessary data, and a couple of use-cases.
https://www.mobile-hacker.com/2025/05/19/hackrf-portapack-h4m-with-mayhem-firmware-a-powerful-handheld-sdr-toolkit/
Mobile Hacker
HackRF PortaPack H4M with Mayhem Firmware – A Powerful Handheld SDR Toolkit
In the Q4 of 2024, a new SDR (Software Defined Radio) was released: the HackRF PortaPack H4M, shipping with the Mayhem firmware. Whether you’re a hobbyist, hacker, ham radio enthusiast, or security researcher, this compact device brings a full-featured radio…
👍8👏2
Coding Without a Laptop - Two Weeks with AR Glasses and Linux on Android
https://holdtherobot.com/blog/2025/05/11/linux-on-android-with-ar-glasses/
https://holdtherobot.com/blog/2025/05/11/linux-on-android-with-ar-glasses/
Holdtherobot
Coding Without a Laptop - Two Weeks with AR Glasses and Linux on Android | Hold The Robot
I recently learned something that blew my mind;
👍9🔥2👏2❤1
O2 VoLTE: locating any customer with a phone call
https://mastdatabase.co.uk/blog/2025/05/o2-expose-customer-location-call-4g/
https://mastdatabase.co.uk/blog/2025/05/o2-expose-customer-location-call-4g/
mastdatabase.co.uk
O2 VoLTE: locating any customer with a phone call
Privacy is dead: For multiple months, any O2 customer has had their location exposed to call initiators without their knowledge.
🌚9👍6
The State of iOS Jailbreaking in 2025
[slides] https://github.com/alfiecg24/Presentations/blob/main/The%20State%20of%20iOS%20Jailbreaking%20in%202025.pdf
[slides] https://github.com/alfiecg24/Presentations/blob/main/The%20State%20of%20iOS%20Jailbreaking%20in%202025.pdf
GitHub
Presentations/The State of iOS Jailbreaking in 2025.pdf at main · alfiecg24/Presentations
Contribute to alfiecg24/Presentations development by creating an account on GitHub.
🌚6❤1
This Video Can Exploit Your iPhone (CVE-2025-31200)
https://youtu.be/nTO3TRBW00E
https://youtu.be/nTO3TRBW00E
YouTube
This Video Can Exploit Your iPhone (CVE-2025-31200 #1)
Are you a security researcher or reverse engineer?
For 50% off IDA Products use promo code BILLY50, https://hex-rays.com/pricing *
For 30% off IDA Training use promo code BILLY30, https://hex-rays.com/training **
*License discounts are only valid for individuals…
For 50% off IDA Products use promo code BILLY50, https://hex-rays.com/pricing *
For 30% off IDA Training use promo code BILLY30, https://hex-rays.com/training **
*License discounts are only valid for individuals…
👍15🔥7❤4👎1🌚1
Bypassing MTE with CVE-2025-0072
https://github.blog/security/vulnerability-research/bypassing-mte-with-cve-2025-0072/
Exploit: https://github.com/github/securitylab/tree/main/SecurityExploits/Android/Mali/CVE-2025-0072
https://github.blog/security/vulnerability-research/bypassing-mte-with-cve-2025-0072/
Exploit: https://github.com/github/securitylab/tree/main/SecurityExploits/Android/Mali/CVE-2025-0072
The GitHub Blog
Bypassing MTE with CVE-2025-0072
See how a vulnerability in the Arm Mali GPU can be exploited to gain kernel code execution even when Memory Tagging Extension (MTE) is enabled.
❤11🌚1
Emulating a Bike Sensor
https://eybisi.run/Emulating-a-Bike-Sensor/
https://eybisi.run/Emulating-a-Bike-Sensor/
hedgehog's cave
Emulating a Bike Sensor
As a reverse engineer and someone who enjoys dissecting how systems communicate, my interest was recently piqued by the Bluetooth Low Energy (BLE) cycling sensors that integrate with fitness tracking
🌚6❤2👍2🔥1
A strict iOS app that analyzes link safety like a nutrition label (no AI, offline)
https://github.com/sigfault-byte/LegitURL
https://github.com/sigfault-byte/LegitURL
GitHub
GitHub - sigfault-byte/LegitURL: A strict iOS app that analyzes link safety like a nutrition label (no AI, offline)
A strict iOS app that analyzes link safety like a nutrition label (no AI, offline) - sigfault-byte/LegitURL
🌚6
Boost your Android threat detection capabilities 🤖
Modern mobile threats require dynamic tools for dynamic threats. With ANY.RUN’s Interactive Sandbox now supports Android, you can:
✅ Instantly detect threats with interactive analysis
✅ Understand APK behavior with fast access to threat details
✅ Extract IOCs and generate detailed reports in seconds
🎁 Special offer: Get extra Sandbox licenses to level up your mobile threat hunting.
Hurry up to get #ANYRUN birthday deals, ending May 31 👉 here is the link.
Modern mobile threats require dynamic tools for dynamic threats. With ANY.RUN’s Interactive Sandbox now supports Android, you can:
✅ Instantly detect threats with interactive analysis
✅ Understand APK behavior with fast access to threat details
✅ Extract IOCs and generate detailed reports in seconds
🎁 Special offer: Get extra Sandbox licenses to level up your mobile threat hunting.
Hurry up to get #ANYRUN birthday deals, ending May 31 👉 here is the link.
❤13🔥2👍1
Analysis of GhostSpy Android RAT: Advanced Persistent RAT with Stealthy Remote Control and Uninstall Resistance
https://www.cyfirma.com/research/ghostspy-web-based-android-rat-advanced-persistent-rat-with-stealthy-remote-control-and-uninstall-resistance/
https://www.cyfirma.com/research/ghostspy-web-based-android-rat-advanced-persistent-rat-with-stealthy-remote-control-and-uninstall-resistance/
CYFIRMA
GhostSpy Web-Based Android RAT : Advanced Persistent RAT with Stealthy Remote Control and Uninstall Resistance - CYFIRMA
EXECUTIVE SUMMARY At CYFIRMA, we are committed to delivering timely intelligence on emerging threats and attacker tactics. In this report,...
👍10🌚2❤1
Zanubis: Tracing the active evolution of the Android banking malware
https://securelist.com/evolution-of-zanubis-banking-trojan-for-android/116588/
https://securelist.com/evolution-of-zanubis-banking-trojan-for-android/116588/
Securelist
Evolution of Zanubis, a banking Trojan for Android
A comprehensive historical breakdown of Zanubis' changes, including RC4 and AES encryption, credentials stealing and new targets in Peru, provided by Kaspersky GReAT experts.
🌚6💩3👎1🥱1
How to load unsigned or fake-signed apps on iOS
https://www.pentestpartners.com/security-blog/how-to-load-unsigned-or-fake-signed-apps-on-ios/
https://www.pentestpartners.com/security-blog/how-to-load-unsigned-or-fake-signed-apps-on-ios/
Pen Test Partners
How to load unsigned or fake-signed apps on iOS | Pen Test Partners
TL;DR Introduction In certain circumstances it can be challenging installing client applications for testing. Situations arise where the application could be provided unsigned or requires self-signing. As a result, the application cannot be directly provisioned…
👍6💩5❤1🌚1
Vulnerabilities Found in Preinstalled apps on Android Smartphones
3rd party app installed on a device could misuse vulnerabilities to:
✅perform factory reset of device
✅exfiltrate PIN code
✅inject an arbitrary intent with system-level privileges
https://www.mobile-hacker.com/2025/06/02/security-issues-found-in-android-smartphones/
3rd party app installed on a device could misuse vulnerabilities to:
✅perform factory reset of device
✅exfiltrate PIN code
✅inject an arbitrary intent with system-level privileges
https://www.mobile-hacker.com/2025/06/02/security-issues-found-in-android-smartphones/
Mobile Hacker
Security Issues Found in preinstalled apps on Android Smartphones
Security researchers have uncovered several critical vulnerabilities in applications preloaded on Ulefone and Krüger&Matz Android smartphones. These flaws, reported by CERT Polska and discovered by Szymon Chadam, expose users to significant risks, including…
🤯17❤4🌚3✍1
Reverse Engineer Android Apps for API Keys
https://pwn.guide/free/forensics/re-android
https://pwn.guide/free/forensics/re-android
💩17🤡8👎3❤1🤮1🌚1🌭1🙉1
Analysis of CoreAudio ITW vulnerability (CVE-2025-31200) patched in iOS 18.4.1
https://blog.noahhw.dev/posts/cve-2025-31200/
https://blog.noahhw.dev/posts/cve-2025-31200/
A Strange Blog
CVE 2025 31200
Background On April 16, 2025, Apple released a patch for a bug in CoreAudio which they said was “Actively exploited in the wild.” This flew under the radar a bit. Epsilon’s blog has a great writeup of the other bug that was presumably exploited in this chain:…
❤9
Crocodilus Mobile Malware: Evolving Fast, Going Global
https://www.threatfabric.com/blogs/crocodilus-mobile-malware-evolving-fast-going-global
https://www.threatfabric.com/blogs/crocodilus-mobile-malware-evolving-fast-going-global
ThreatFabric
Crocodilus Mobile Malware: Evolving Fast, Going Global
Discover the latest developments on Crocodilus, a sophisticated Android Trojan targeting banking apps and crypto wallets across the globe.
🌚11🥱3😴2
Android malware trends: Stealthier, easier-to-use
https://intel471.com/blog/android-malware-trends-stealthier-easier-to-use
https://intel471.com/blog/android-malware-trends-stealthier-easier-to-use
❤9🌚2
Covert Web-to-App Tracking via Localhost on Android
A novel tracking method by Meta and Yandex potentially affecting billions of Android users
https://localmess.github.io/
A novel tracking method by Meta and Yandex potentially affecting billions of Android users
https://localmess.github.io/
🌚9
Analysis of Spyware That Helped to Compromise a Syrian Army from Within
Smartphone espionage doesn’t need expensive exploits. Cheap tools like SpyMax with targeted phishing a social engineering can breach even military targets - no 0-days required
https://www.mobile-hacker.com/2025/06/05/analysis-of-spyware-that-helped-to-compromise-a-syrian-army-from-within/
Smartphone espionage doesn’t need expensive exploits. Cheap tools like SpyMax with targeted phishing a social engineering can breach even military targets - no 0-days required
https://www.mobile-hacker.com/2025/06/05/analysis-of-spyware-that-helped-to-compromise-a-syrian-army-from-within/
Mobile Hacker
Analysis of Spyware That Helped to Compromise a Syrian Army from Within
This case demonstrates that effective smartphone espionage doesn't always require expensive zero-day exploits or the development of sophisticated, custom and undetected spyware. Instead, attackers can achieve significant intelligence gains using older, off…
👍11🌚1