Google recently handed out a $70,000 bug bounty reward for an Android vulnerability leading to lock screen bypass, security researcher David Schutz says.
Google Reveals Spyware Vendor’s Use of Samsung Phone Zero-Day Exploits
Google Project Zero has disclosed the details of three Samsung phone vulnerabilities that have been exploited by a spyware vendor since when they still had a zero-day status.
Calls for UK to Probe Reported Hacking of Liz Truss’s Phone
UK opposition politicians called for an investigation Saturday after a newspaper reported that suspected Kremlin agents had hacked ex-Prime Minister Liz Truss’s cell phone when she was foreign minister.
Google Brings Passkey Support to Android and Chrome
Google on Wednesday announced the introduction of passkey support in Android and Chrome, to protect users from credential leaks and phishing attacks.
Meant to replace passwords, passkeys rely on biometric verification for authentication. They can be synced on multiple devices, cannot be reused and, unlike passwords, cannot be leaked.
Quantum-Safe Communications Startup Qunnect Raises $8 Million
Quantum-secure networking devices maker Qunnect this week announced raising $8 million in a Series A funding round that brings the total investment in the company to $12.4 million.
The new investment round was led by Airbus Ventures, with additional participation from Impact Science Ventures, Motus Ventures, NY Ventures, Quantonation, and SandboxAQ.
Iranian Hackers Target Enterprise Android Users With New RatMilad Spyware
Zimperium is warning of an Iranian hacking group using a new piece of Android spyware in a broad campaign that has also targeted enterprise users.
High-Profile Hacks Show Effectiveness of MFA Fatigue Attacks
Google, Apple Remove ‘Scylla’ Mobile Ad Fraud Apps After 13 Million Downloads
Cybersecurity firm Human has discovered and disrupted a mobile ad fraud campaign involving 89 mobile applications with a total download count of 13 million.
US Agencies Publish Security Guidance on Implementing Open RAN Architecture
The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have published guidance on implementing an Open Radio Access Network (RAN) architecture.
novoShield Emerges From Stealth With Mobile Phishing Protection App
Mobile phishing protection startup novoShield has emerged from stealth mode with an enterprise-grade iPhone protection application.
The new solution, novoShield says, was designed to protect both end-users and businesses from the increasing number of phishing attacks.












