#androidsec 검색 결과

This sample for the #androidsec community. Have you seen any #dirtycow malicious sample in the wild? Find me in keybase.

virqdroid's tweet image. This sample for the #androidsec community. Have you seen any #dirtycow malicious sample in the wild? Find me in keybase.
virqdroid's tweet image. This sample for the #androidsec community. Have you seen any #dirtycow malicious sample in the wild? Find me in keybase.

[50/n] End Thread Protection is not perfect but raises the bar significantly. In a world of automated attacks, even basic obfuscation helps. Read full paper: dl.acm.org/doi/10.1145/37… #AndroidSec #MobileSecurity #InfoSec


Google's Triada backdoor demonstrates vulnerabilities in the mobile supply chain #MobSec #AndroidSec cyberscoop.com/android-backdo…


New on the blog: my writeup for CyCTF 2025 — Grand Theft Mobile. Recovered the flag from an Android native lib using Frida. Read: 0xmar.medium.com/cyctf-2025-and… #CTF #AndroidSec


Toolkit for Android Testing - ADB (data access) - Frida (runtime hooks) - Burp Suite (traffic analysis) - JADX (code review) - MobSF (automated analysis) #BugBountyTools #AndroidSec #EthicalHacking


A study detailing how Android vulnerabilities are traced, labeled, and linked to code changes to build an accurate dataset for security-bug classification. - hackernoon.com/inside-the-dat… #mlsecurityframework #aospsecurity


Argus: Android Vulnerabilities at Scale 📆 When: Wednesday 26th November 📍Where: B67/1037 🕙When: 18:00 - 20:00 Find out more on our website sucss.org

sotoncyber's tweet image. Argus: Android Vulnerabilities at Scale

📆 When: Wednesday 26th November 
📍Where: B67/1037
🕙When: 18:00 - 20:00

Find out more on our website sucss.org

Updated Post: How to Protect Your Device with Android 16’s Enhanced Mobile Security Features cybersecurity-insiders.com/how-to-protect…

Cybersecinsider's tweet image. Updated Post: How to Protect Your Device with Android 16’s Enhanced Mobile Security Features cybersecurity-insiders.com/how-to-protect…

ガチヤバそうなAndroidの脆弱性。アップデートした方がよさそう。 --- インストールされたアプリはシステム権限を要求しないにもかかわらず、画面に表示されるほかのインストール済みアプリの情報を実質的に読み取ることが可能だ。 wired.jp/article/a-new-…


Static analysis for Android apps based on the OWASP MASVS framework 🌟 - github.com/Cyber-Buddy/AP… #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. Static analysis for Android apps based on the OWASP MASVS framework 🌟

- github.com/Cyber-Buddy/AP…

#infosec #cybersec #bugbountytips

📚 Hacking Crypto Secrets from Android Heap Memory Extract cryptographic secrets from Android application heap to compromise encryption. infosecwriteups.com/728097fcda3

IntCyberDigest's tweet image. 📚 Hacking Crypto Secrets from Android Heap Memory

Extract cryptographic secrets from Android application heap to compromise encryption.

infosecwriteups.com/728097fcda3

The Android overlay function is a convenient feature, but it can be repurposed with malicious intent. Attackers use this functionality to steal user credentials and financial information, but there are ways to defend against it. Watch here to learn more: hubs.la/Q03ThpXp0

Guardsquare's tweet card. Overlay Attacks: What is Android Mobile App Malware?

youtube.com

YouTube

Overlay Attacks: What is Android Mobile App Malware?


AndroPseudoProtect: Ultimate Device Security... or is it? academy.8ksec.io/course/android… An Android app promises one-tap encryption and always-on protection, but the real test is resilience. Discover if its IPC and authentication can be bypassed and demonstrate a proof-of-concept that…

8kSec's tweet image. AndroPseudoProtect: Ultimate Device Security... or is it?
academy.8ksec.io/course/android… 
An Android app promises one-tap encryption and always-on protection, but the real test is resilience. Discover if its IPC and authentication can be bypassed and demonstrate a proof-of-concept that…

Rust in Android: move fast and fix things: ift.tt/U4285cv by Google Online Security Blog #infosec #cybersecurity #technology #news


Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution – PATCH: NOW dlvr.it/TPFcSN


Meaning: If you are a user you can install unvetted/no reputation apps from unknown parties if you really want to. But there's going to be enough friction and warnings in the user experience flow to make successful social engineering sonewhat difficult. android-developers.googleblog.com/2025/11/androi…


All Android devices are vulnerable to an attack that effectively screenshares any app that the attacker chooses, without your knowledge

Concerning

Sauers_'s tweet image. Concerning


New Post: Google Declares Android as the Most Secure Mobile OS: A Game Changer in Mobile Cybersecurity cybersecurity-insiders.com/google-declare…

Cybersecinsider's tweet image. New Post: Google Declares Android as the Most Secure Mobile OS: A Game Changer in Mobile Cybersecurity cybersecurity-insiders.com/google-declare…

Google start met verificatie van Android-ontwikkelaars #securitynl security.nl/posting/912665…


Update your ANDROID devices, now. Unlike typical exploits that require users to tap a link or install an app, this zero-click vulnerability can be triggered silently through crafted network packets or malicious applications distributed outside official app stores. CVE-2025-48593


This sample for the #androidsec community. Have you seen any #dirtycow malicious sample in the wild? Find me in keybase.

virqdroid's tweet image. This sample for the #androidsec community. Have you seen any #dirtycow malicious sample in the wild? Find me in keybase.
virqdroid's tweet image. This sample for the #androidsec community. Have you seen any #dirtycow malicious sample in the wild? Find me in keybase.

Loading...

Something went wrong.


Something went wrong.


United States Trends