Google has patched a “high-severity” vulnerability that may be “under limited, targeted exploitation” in Android devices.
Google issued an advisory stating that the bug, known as CVE-2024-36971, affects the Linux kernel. This kernel is a crucial part of an operating system, connecting the software to the computer’s hardware.
According to Google, a vulnerability lets hackers run code on the device from a distance. Google hasn’t given details about the attacks or the attackers.
By infosecbulletin
/ Friday , April 18 2025
According to Shadowserver Foundation around 17,000 Fortinet devices worldwide have been compromised using a new technique called "symlink". This number...
Read More
By infosecbulletin
/ Friday , April 18 2025
A critical security flaw has been found in the Erlang/Open Telecom Platform (OTP) SSH implementation, allowing an attacker to run...
Read More
By infosecbulletin
/ Thursday , April 17 2025
On Wednesday, CISA alerted about increased breach risks due to the earlier compromise of legacy Oracle Cloud servers, emphasizing the...
Read More
By infosecbulletin
/ Thursday , April 17 2025
Cisco issued a security advisory about a serious vulnerability in its Webex App that allows unauthenticated remote code execution (RCE)...
Read More
By infosecbulletin
/ Thursday , April 17 2025
On Wednesday, Apple released urgent operating system updates to address two security vulnerabilities that had already been exploited in highly...
Read More
By infosecbulletin
/ Wednesday , April 16 2025
On April 15, 2025, Oracle released a Critical Patch Update for 378 flaws for its products. The patch update covers...
Read More
By infosecbulletin
/ Wednesday , April 16 2025
Check Point Research warns of the active exploitation of a new vulnerability, CVE-2025-24054, which lets hackers leak NTLMv2-SSP hashes using...
Read More
By infosecbulletin
/ Wednesday , April 16 2025
Bengaluru's Whiteboard Technologies Pvt Ltd was hit by a ransomware attack, with hackers demanding a ransom of up to $70,000...
Read More
By infosecbulletin
/ Wednesday , April 16 2025
MITRE Vice President Yosry Barsoum warned that U.S. government funding for the Common Vulnerabilities and Exposures (CVE) and Common Weakness...
Read More
By infosecbulletin
/ Wednesday , April 16 2025
PwC has ceased operations in more than a dozen countries that its global bosses have deemed too small, risky or...
Read More
In order for the exploit to work, the attacker must have system-level privileges, which are the highest level of access permissions.
Google’s August update fixed 47 flaws, including some in Arm, Imagination Technologies, MediaTek, and Qualcomm components. Most of these flaws were rated as “high severity.”
Clement Lecigne from Google’s Threat Analysis Group found a new Android zero-day. He usually reports on zero-day flaws used in espionage attacks.
Google researchers recently warned that zero-day exploits, which can compromise devices before their vulnerabilities are known, are increasingly being used by nation-state hackers and cybercriminals.
According to a report from Google in March, they found that there were 97 zero-day exploits in 2023, compared to 62 in 2022. This is a 50 percent increase. Out of these exploits, 48 were done by spies and 49 were done by hackers looking for financial gain.