Google's Threat Analysis Group (TAG) discovered several exploit chains using Android, iOS, and Chrome zero-day and n-day vulnerabilities to install commercial spyware and malicious apps on targets' ...
Last week, I got on the phone with HD Moore to ask him how things have been going since he sold Metasploit to Rapid7, sending the open source security world into a frenzy some six months ago. Rapid7 ...
Android apps digitally signed by China’s third-biggest e-commerce company exploited a zero-day vulnerability that allowed them to surreptitiously take control of millions of end-user devices to steal ...
Following the discovery of a number of high-profile Android exploits, Google has released a new Android 14 security update. The latest version of the operating system is now available on supported ...
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate ...
Google warns that hijackers could get root access to your Android phone from an application using a security flaw that was first discovered two years ago. The flaw is part of the Linux Kernel, which ...
Developers have released a major update to the Metasploit security testing tool designed to run more smoothly on the Windows operating system. Metasploit 3.0, released early Tuesday morning, has been ...
Apple’s Find My network can turn almost any device, even Android phones, into fake AirTags. This loophole lets bad actors ...