Tag
#android
NLB mKlik Makedonija version 3.3.12 suffers from a remote SQL injection vulnerability.
The Android banking trojan known as SpyNote has been dissected to reveal its diverse information-gathering features. Typically spread via SMS phishing campaigns, attack chains involving the spyware trick potential victims into installing the app by clicking on the embedded link, according to F-Secure. Besides requesting invasive permissions to access call logs, camera, SMS messages, and external
By Waqas If you've downloaded a rocket alert app from a third-party source, ensure it's spyware-free and delete it from your device. This is a post from HackRead.com Read the original post: Hackers Target Israeli Rocket Alert App Users with Spyware
Categories: News A list of topics we covered in the week of October 9 to October 15 of 2023 (Read more...) The post A week in security (October 9 - October 15) appeared first on Malwarebytes Labs.
The mobile application or the affected API suffers from an SQL Injection vulnerability. Input passed to the parameters that are associated to international transfer is not properly sanitised before being returned to the user or used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code and disclose sensitive information.
Cryptocurrency apps were the most high risk for exposing sensitive information, a reverse-engineering study shows.
Today at BlueHat we announced the new Microsoft AI bug bounty program with awards up to $15,000. This new bounty program features the AI-powered Bing experience as the first in scope product. The following products and integrations are eligible for bounty awards: AI-powered Bing experiences on bing.com in Browser (All major vendors are supported, including Bing Chat, Bing Chat for Enterprise, and Bing Image Creator) AI-powered Bing integration in Microsoft Edge (Windows), including Bing Chat for Enterprise AI-powered Bing integration in the Microsoft Start Application (iOS and Android) AI-powered Bing integration in the Skype Mobile Application (iOS and Android) Full details can be found on our bounty program website.
In TBD of TBD, there is a possible way to bypass carrier restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Clone vulnerability in the huks ta module.Successful exploitation of this vulnerability may affect service confidentiality.