MitM Attack
‘Blast-RADIUS’ Critical Bug Blows Up IT Vacation Plans
Richi Jennings | | blast radius, collision-based-hashing-algorithm-disclosure, CVE-2024-3596, hash, hash algorithms, hash function, hash functions, Man In The Middle, man in the middle attack, man in the middle attacks, maninthemiddleattacks, md5 hash, men-in-the-middle attack, mitm, MitM Attack, mitm attacks, RADIUS, SB Blogwatch
MD5 MITM Muddle: Ancient, widely used protocol has CVSS 9.0 vulnerability ...
Security Boulevard
Limitations of Huawei HarmonyOS Safety Detect: What You Need to Know
George McGregor | | API Security - Analysis, News and Insights, App Attestation, certificate pinning, HarmonyOS, MitM Attack, Mobile API Security, mobile app security
This overview outlines the development and adoption of Huawei HarmonyOS and the associated security solution Safety Detect, highlighting some limitations with the approach. As regulations such as the EU DMA force the ...
Revealed: Facebook’s “Incredibly Aggressive” Alleged Theft of Snapchat App Data
Richi Jennings | | Brian J. Dunne, class action, class action lawsuit, DeleteFacebook, facebook, facebook fine, free vpn app, Ghostbusters, IAPP, Man In The Middle, man in the middle attack, man in the middle attacks, Mark Zuckerberg, Meta, mitm, MitM Attack, mitm attacks, mitm tool, mitm tools, Onavo, Onavo VPN, SB Blogwatch, Snapchat, SSL Bump, VPN
Meta MITM IAAP SSL bump: Zuck ordered “Project Ghostbusters”—with criminal consequences, says class action lawsuit ...
Security Boulevard
The Limitations of Google Play Integrity API (ex SafetyNet)
George McGregor | | Android Security, API security, API Security - Analysis, News and Insights, man in the middle attack, MitM Attack, mobile app development, SafetyNet
This overview outlines the history and use of Google Play Integrity API and highlights some limitations. We also compare and contrast Google Play Integrity API with the comprehensive mobile security offered by ...
SSH FAIL: Terrapin Attack Smashes ‘Secure’ Shell Spec
Richi Jennings | | Authentication, CBC, ChaCha20, chaves ssh, CVE-2023-48795, libSSH, Man In The Middle, man in the middle attack, man in the middle attacks, mitm, MitM Attack, mitm attack prevention, mitm attacks, openssh, OpenSSH protocol, SB Blogwatch, SSH, Terrapin
Testy Testudine: Lurking vuln in SSH spec means EVERY implementation must build patches ...
Security Boulevard
The Security Threats to Mobile Crypto Apps and How to Protect Them
George McGregor | | API Security - Analysis, News and Insights, Fintech, man in the middle attack, MitM Attack, Run-time Secrets Protection
The last year has not been great for crypto. Most crypto currencies, including Bitcoin, experienced significant loss of value, and we saw high profile exchanges like FTX collapse. In addition, hackers were ...
‘BrutePrint’ Unlocks Android Phones — Chinese Researchers
Richi Jennings | | android, Authentication, authentication bypass, biometric, biometric authentication, biometric security, biometrics authentication, Biometrics-Based Authentication, BrutePrint, fingerprint, Fingerprint Scanners, fingerprint scanning, fingerprint sensors, fingerprints, iot, Man In The Middle, man in the middle attack, man in the middle attacks, mitm, MitM Attack, mitm attacks, SB Blogwatch, Trusted Execution Environment
Or, at least, OLDER phones: SPI/TEE MITM FAIL ...
Security Boulevard
What is Runtime Application Self-Protection (RASP)?
Shona Hossell | | API security, API Security - Analysis, News and Insights, MitM Attack, mobile app development, Mobile Security, threats
Runtime Application Self-Protection (RASP) is a security technology that is designed to protect applications from attacks while the application is running. It works by embedding a security mechanism directly into the application, ...
Mobile App Security: Uncovering the Risks of Secret Theft at Runtime
This is our second blog highlighting the results of the Approov Threat Lab Report ...
Do You Want to Know a Secret? Just Take a Look Inside Top Finance Apps
George McGregor | | A Series - Mobile API Security, API Keys, API security, API Security - Analysis, News and Insights, Business, Fintech, MitM Attack
Financial apps have access to valuable and sensitive personal data, so you would think mobile app security would be top-of-mind for financial institutions. But is it? ...