Security
Headlines
HeadlinesLatestCVEs

Tag

#ios

Toll fee scams are back and heading your way

Heavy incoming traffic: A new wave of toll fee scams are sweeping America.

Malwarebytes
#web#ios#android#git#auth
Top Crypto Wallets of 2025: Balancing Security and Convenience

Crypto software wallets are invincible in the micro range. If you own multiple crypto assets, you need safe and reliable wallets, too.

Flaw in Verizon call record requests put millions of Americans at risk

A security researcher found a flaw in Verizon call record requests that may have put millions of Americans at risk

Popular VPNs are routing traffic via Chinese companies, including one with link to military

Up to one in five of the most popular mobile VPNs are owned by Chinese companies that do their best to hide the fact.

QR codes sent in attachments are the new favorite for phishers

Phishers are putting QR codes as images in attachments because it helps them bypass email filters.

Location, name, and photos of random kids shown to parents in child tracker mix up

Worried parents tracking their children with T-Mobile SyncUP devices suddenly found that they were looking at the location of random other children. And could not locate their own.

AI Image Site GenNomis Exposed 47GB of Underage Deepfakes

Cybersecurity researcher Jeremiah Fowler uncovers a massive 47.8GB database with disturbing AI-generated content belonging to GenNomis.

CVE-2025-29796: Microsoft Edge for iOS Spoofing Vulnerability

**According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?** A user could be tricked into entering credentials or responding to a pop up after opening a specially crafted file or clicking on a link, typically by way of an enticement in an email or URL.

CVE-2025-25001: Microsoft Edge for iOS Spoofing Vulnerability

**According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability?** An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability).

Apple Backports Critical Fixes for 3 Live Exploits Impacting iOS and macOS Legacy Devices

Apple on Monday backported fixes for three vulnerabilities that have come under active exploitation in the wild to older models and previous versions of the operating systems. The vulnerabilities in question are listed below - CVE-2025-24085 (CVSS score: 7.3) - A use-after-free bug in the Core Media component that could permit a malicious application already installed on a device to elevate