Attacks are confirmed — update as soon as you can; here’s what to know.| Forbes
More bad news for Galaxy flagship owners.| Forbes
Amnesty International’s Security Lab, in collaboration with Amnesty’s European Regional Office, has uncovered a new case of misuse of a Cellebrite product to break into the phone of a youth activist in Serbia. The attack closely matches the form of attack that we previously documented in a report, ‘A Digital Prison’, published in December 2024. […] The post Cellebrite zero-day exploit used to target phone of Serbian student activist appeared first on Amnesty International Security Lab.| Amnesty International Security Lab
Published November 4, 2024The Android Security Bulletin contains details of security vulnerabilities| Android Open Source Project
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.How to use the KEV CatalogThe KEV catalog is also available in these formats:| Cybersecurity and Infrastructure Security Agency CISA
Common vulnerabilities and Exposures (CVE)| www.cve.org