What are the types of vulnerabilities that could result in exploits that do not require user interaction? [closed]

What are the existing types of vulnerabilities that could result in exploits that do not require user interaction (e.g. zero-click)? I’m trying to understand the type of zero-click attack type for us to plan proper mitigation in code.

Continue reading What are the types of vulnerabilities that could result in exploits that do not require user interaction? [closed]

News Wrap: Ransomware Extortion Tactics, Contact-Tracing App Security Worries

Threatpost editors discuss recent ransomware attacks and contact-tracing app privacy concerns. Continue reading News Wrap: Ransomware Extortion Tactics, Contact-Tracing App Security Worries

How can I prevent my server from receiving requests for a modified application? [duplicate]

I am developing an android application and in the future also for IOS, and I use a server in PHP.

Is it possible for my server to know the source of the application sending the requests?

For example, if someone modifies the apk of my app… Continue reading How can I prevent my server from receiving requests for a modified application? [duplicate]

What is the use case of request signing in this mobile app?

The API of a mobile app I was testing is sending the AWS AccessKeyId and SecretKey used for request signing from the AWS Cognito server unencrypted (apart from the regular TLS encryption). Making it possible to re-sign all requests to thei… Continue reading What is the use case of request signing in this mobile app?