vulnerability detection

Winsage
October 2, 2025
Microsoft has begun the rollout of Windows 11 25H2, featuring a streamlined installation process that requires only a single restart. This update shares its code base with the upcoming 2024 version, 24H2, ensuring both versions receive the same updates, with certain features activated in 25H2. Key enhancements include advanced security features, support for Wi-Fi 7, Quick Machine Recovery, and improvements to the Taskbar, File Explorer, and Task Manager. Users upgrading to 25H2 will have support until October 2027, compared to October 2026 for 24H2. Known issues include a glitch affecting playback of protected content and an installation error in enterprise environments. To obtain Windows 11 25H2, users should ensure their device is updated to 24H2 and can follow various installation methods provided by Microsoft. After installation, users can verify the update in the Windows specifications section.
Winsage
October 1, 2025
Microsoft has rolled out the Windows 11 annual update, designated as version 25H2. This update is described as an "enablement package," allowing users on version 24H2 to access new features, including a revamped Start menu with a layout change and the option to disable Microsoft's recommendations. These enhancements are also available to users on 24H2, potentially even before those who upgrade to 25H2. The update includes improvements in security features, such as build and runtime vulnerability detection and AI-assisted secure coding. It also removes legacy features like PowerShell 2.0 and the Windows Management Instrumentation command line. Users can enable the 'Get the latest updates as soon as they’re available' setting to position themselves for the update, although compatibility checks may delay rollout for some PCs. Microsoft advises against bypassing the standard update process to avoid complications.
Winsage
October 1, 2025
Microsoft began rolling out the Windows 11 version 25H2 update on September 30, 2025. This update enhances user experience with improved security features and AI-powered tools, designed as a compact enablement package for users of Windows 11 24H2. It introduces new AI functionalities in File Explorer, including reverse image searches, background blurring, and object removal. The Click to Do functionality has been refined for Copilot+ PCs. Version 25H2 shares its codebase with 24H2, ensuring both receive identical monthly feature updates. Microsoft has improved vulnerability detection and AI-assisted secure coding for enhanced security. New customization options include repositioning on-screen indicators for volume and brightness, along with performance enhancements in File Explorer and a redesigned Advanced Settings page. The update is being gradually deployed through Windows Update, with several installation methods available, including the Installation Assistant, Media Creation Tool, and ISO file. Users on version 24H2 will receive a swift cumulative update, while those on older versions will need to reinstall. Microsoft has removed legacy components like PowerShell 2.0 and plans to monitor compatibility issues during the rollout.
Winsage
October 1, 2025
Microsoft has released the Windows 11 2025 Update, also known as Windows 11, version 25H2, which will be delivered as an enablement package (eKB) that includes features from version 24H2. This update focuses on security enhancements, including improved vulnerability detection and AI-assisted secure coding, while removing legacy features like PowerShell 2.0. The rollout begins for eligible devices running version 24H2, with a gradual expansion over the coming months. For commercial and educational users, version 25H2 is available through Windows Autopatch and the Microsoft 365 admin center, introducing new functionalities such as Wi-Fi 7. The support timeline is reset to 24 months for Home and Pro editions and 36 months for Enterprise and Education editions. Users on version 23H2 and earlier must perform a full OS swap to update to version 25H2. The update will be available via Windows Server Update Services (WSUS) on October 14, 2025.
Winsage
September 30, 2025
Microsoft has begun rolling out the Windows 11 update version 25H2, which follows a successful testing phase and is now available to all users via Windows Update. The update is a compact "enablement package" that allows for a swift installation process. It includes all recently announced features in Windows 11 version 24H2, utilizing a shared code base and servicing branch for streamlined updates. Version 25H2 introduces significant enhancements in build and runtime vulnerability detection and AI-assisted secure coding as part of a strategy to address security threats. It also removes PowerShell 2.0 and WMIC to create a leaner operating environment. Users can access the update by activating the “get the latest updates as soon as they’re available” option in Windows Update, but a safeguard hold may delay the update if any issues are detected. The rollout will gradually expand over the coming months, with updates on known issues provided through the Windows release health hub.
AppWizard
September 6, 2025
A team of researchers from Nanjing University and the University of Sydney has developed an AI agent named A2, which identifies and verifies vulnerabilities in Android applications. A2 achieved 78.3% coverage on the Ghera test suite, outperforming the static analyzer APKHunt, which achieved only 30%. In tests on 169 real APKs, A2 discovered 104 zero-day vulnerabilities, with 57 confirmed through automatically generated exploits. A notable vulnerability was a medium-severity bug in an app with over 10 million installs, involving an intentional redirection issue that could allow malware to take control. A2 features a validation module that was absent in its predecessor, A1, which only assessed attack profitability. A2 validates vulnerabilities step by step, with automatic verification at each stage. It integrates several commercial language models, including OpenAI o3, Gemini 2.5 Pro, Gemini 2.5 Flash, and GPT-oss-120b, which are assigned specific roles in the vulnerability detection process. The cost of vulnerability detection ranges from [openai_gpt model="gpt-4o-mini" prompt="Summarize the content and extract only the fact described in the text bellow. The summary shall NOT include a title, introduction and conclusion. Text: Artificial intelligence systems have faced scrutiny for their tendency to generate perplexing vulnerability reports, often overwhelming open-source developers with irrelevant notifications. However, a team of researchers from Nanjing University and the University of Sydney has introduced a promising solution: an agent named A2, designed to identify and verify vulnerabilities in Android applications, effectively emulating the work of a bug hunter. This development builds upon the earlier A1 project, which was successful in exploiting bugs within smart contracts. Performance and Capabilities The researchers assert that A2 achieved an impressive 78.3% coverage on the Ghera test suite, significantly surpassing the static analyzer APKHunt, which managed only 30%. In tests conducted on 169 real APKs, A2 uncovered 104 zero-day vulnerabilities, with 57 of these confirmed through automatically generated working exploits. Notably, among these vulnerabilities was a medium-severity bug found in an application boasting over 10 million installs. This particular flaw involved an intentional redirection issue that could allow malware to seize control. A2's standout feature is its validation module, which was notably absent in its predecessor. The earlier A1 system employed a fixed verification scheme, merely assessing the profitability of an attack. In contrast, A2 meticulously validates vulnerabilities step by step, breaking down the process into specific tasks. For instance, in an application where the AES key was stored in clear text, A2 first locates the key in the strings.xml file, generates a fake password reset token using that key, and subsequently verifies that the token successfully bypasses authentication. Each step is accompanied by automatic verification, ensuring accuracy from value matching to confirming application activity. Technological Framework A2 operates by integrating several commercial language models, including OpenAI o3, Gemini 2.5 Pro, Gemini 2.5 Flash, and GPT-oss-120b. These models are allocated specific roles: the planner devises an attack strategy, the executor carries out the actions, and the validator confirms the outcomes. This architecture mirrors human methodology, enabling a reduction in noise and an increase in confirmed results. Traditional analysis tools often generate thousands of insignificant signals, yielding very few genuine threats, whereas A2 can promptly demonstrate the exploitability of a flaw. Cost Efficiency The researchers have also analyzed the cost implications of the system. Vulnerability detection ranges from [cyberseo_openai model="gpt-4o-mini" prompt="Rewrite a news story for a business publication, in a calm style with creativity and flair based on text below, making sure it reads like human-written text in a natural way. The article shall NOT include a title, introduction and conclusion. The article shall NOT start from a title. Response language English. Generate HTML-formatted content using tag for a sub-heading. You can use only , , , , and HTML tags if necessary. Text: Redazione RHC : 6 September 2025 09:12Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing University and the University of Sydney have an example to the contrary: they presented an agent called A2, capable of finding and verifying vulnerabilities in Android applications, mimicking the work of a bug hunter. The new development is a continuation of the previous A1 project, which was able to exploit bugs in smart contracts.The authors claim that A2 achieved 78.3% coverage on the Ghera test suite, outperforming the static analyzer APKHunt, which achieved only 30%. Run on 169 real APKs, it found 104 zero-day vulnerabilities, 57 of which were confirmed by automatically generated working exploits. Among these, a medium-severity bug in an app with over 10 million installs. This was an intentional redirection issue that allowed the malware to gain control.A2’s main distinguishing feature is the validation module, which was absent in its predecessor.The old A1 system used a fixed verification scheme that only assessed whether an attack would be profitable. A2, on the other hand, can confirm a vulnerability step by step, breaking down the process into specific tasks. As an example, the authors cite a scenario involving an application where the AES key was stored in clear text. The agent first finds the key in the strings.xml file, then uses it to generate a fake password reset token, and finally verifies that this token actually bypasses authentication. All steps are accompanied by automatic verification: from matching values to confirming application activity and displaying the desired address on the screen.To function, A2 combines several commercial language models: OpenAI o3, Gemini 2.5 Pro, Gemini 2.5 Flash, and GPT-oss-120b. They are distributed according to roles: the planner develops an attack strategy, the executor executes the actions, and the validator confirms the result. This architecture, according to the authors, replicates the human methodology, which has allowed them to reduce noise and increase the number of confirmed results. The developers point out that traditional analysis tools produce thousands of insignificant signals and very few real threats, while their agent is able to immediately demonstrate the exploitability of a flaw.The researchers also calculated the cost of the system. Vulnerability detection costs between $0.0004 and $0.03 per app using different models, while a full cycle with verification costs an average of $1.77. At the same time, using only Gemini 2.5 Pro, the cost increases to $8.94 per bug. For comparison, last year a team from the University of Illinois demonstrated that GPT-4 creates an exploit from a vulnerability description for $8.80. It turns out that the cost of finding and confirming flaws in mobile apps is comparable to the cost of a medium-severity vulnerability in bug bounty programs, where rewards are calculated in the hundreds and thousands of dollars.Experts point out that A2 already outperforms Android static program analyzers, and A1 is close to the best results in smart contracts. They are confident that this approach can speed up and simplify the work of both researchers and hackers, because instead of developing complex tools, they simply call the API of pre-trained models. However, a problem remains: Bounty hunters can use A2 to get rich quickly, but bounty programs don’t cover all bugs. This leaves loopholes for attackers to directly exploit the found bugs.The authors of the article believe that the industry is just beginning to develop and that a surge in activity in both defensive and offensive attacks can be expected in the near future. Industry representatives emphasize that systems like A2 shift vulnerability searches from endless alerts to confirmed results, reducing the number of false positives and allowing them to focus on real risks.For now, the source code is only available to researchers with official partnerships, to maintain a balance between open science and responsible dissemination.RedazioneThe editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.Lista degli articoli" temperature="0.3" top_p="1.0" best_of="1" presence_penalty="0.1" ].0004 to [cyberseo_openai model="gpt-4o-mini" prompt="Rewrite a news story for a business publication, in a calm style with creativity and flair based on text below, making sure it reads like human-written text in a natural way. The article shall NOT include a title, introduction and conclusion. The article shall NOT start from a title. Response language English. Generate HTML-formatted content using tag for a sub-heading. You can use only , , , , and HTML tags if necessary. Text: Redazione RHC : 6 September 2025 09:12Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing University and the University of Sydney have an example to the contrary: they presented an agent called A2, capable of finding and verifying vulnerabilities in Android applications, mimicking the work of a bug hunter. The new development is a continuation of the previous A1 project, which was able to exploit bugs in smart contracts.The authors claim that A2 achieved 78.3% coverage on the Ghera test suite, outperforming the static analyzer APKHunt, which achieved only 30%. Run on 169 real APKs, it found 104 zero-day vulnerabilities, 57 of which were confirmed by automatically generated working exploits. Among these, a medium-severity bug in an app with over 10 million installs. This was an intentional redirection issue that allowed the malware to gain control.A2’s main distinguishing feature is the validation module, which was absent in its predecessor.The old A1 system used a fixed verification scheme that only assessed whether an attack would be profitable. A2, on the other hand, can confirm a vulnerability step by step, breaking down the process into specific tasks. As an example, the authors cite a scenario involving an application where the AES key was stored in clear text. The agent first finds the key in the strings.xml file, then uses it to generate a fake password reset token, and finally verifies that this token actually bypasses authentication. All steps are accompanied by automatic verification: from matching values to confirming application activity and displaying the desired address on the screen.To function, A2 combines several commercial language models: OpenAI o3, Gemini 2.5 Pro, Gemini 2.5 Flash, and GPT-oss-120b. They are distributed according to roles: the planner develops an attack strategy, the executor executes the actions, and the validator confirms the result. This architecture, according to the authors, replicates the human methodology, which has allowed them to reduce noise and increase the number of confirmed results. The developers point out that traditional analysis tools produce thousands of insignificant signals and very few real threats, while their agent is able to immediately demonstrate the exploitability of a flaw.The researchers also calculated the cost of the system. Vulnerability detection costs between $0.0004 and $0.03 per app using different models, while a full cycle with verification costs an average of $1.77. At the same time, using only Gemini 2.5 Pro, the cost increases to $8.94 per bug. For comparison, last year a team from the University of Illinois demonstrated that GPT-4 creates an exploit from a vulnerability description for $8.80. It turns out that the cost of finding and confirming flaws in mobile apps is comparable to the cost of a medium-severity vulnerability in bug bounty programs, where rewards are calculated in the hundreds and thousands of dollars.Experts point out that A2 already outperforms Android static program analyzers, and A1 is close to the best results in smart contracts. They are confident that this approach can speed up and simplify the work of both researchers and hackers, because instead of developing complex tools, they simply call the API of pre-trained models. However, a problem remains: Bounty hunters can use A2 to get rich quickly, but bounty programs don’t cover all bugs. This leaves loopholes for attackers to directly exploit the found bugs.The authors of the article believe that the industry is just beginning to develop and that a surge in activity in both defensive and offensive attacks can be expected in the near future. Industry representatives emphasize that systems like A2 shift vulnerability searches from endless alerts to confirmed results, reducing the number of false positives and allowing them to focus on real risks.For now, the source code is only available to researchers with official partnerships, to maintain a balance between open science and responsible dissemination.RedazioneThe editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.Lista degli articoli" temperature="0.3" top_p="1.0" best_of="1" presence_penalty="0.1" ].03 per app depending on the model used, while a complete cycle with verification averages around .77. However, utilizing only Gemini 2.5 Pro raises the cost to .94 per bug. In comparison, a previous study by a team from the University of Illinois revealed that GPT-4 generates an exploit from a vulnerability description for .80. Thus, the expenses associated with identifying and confirming flaws in mobile applications align closely with the rewards offered in bug bounty programs, which often range in the hundreds to thousands of dollars. Future Implications Experts highlight that A2 already surpasses Android static program analyzers, while A1 approaches the leading results in smart contracts. There is optimism that this innovative approach can expedite and simplify the efforts of both researchers and hackers alike, as they can leverage the API of pre-trained models instead of developing complex tools. Nonetheless, a challenge persists: while bounty hunters may exploit A2 for quick financial gain, bounty programs do not encompass all bugs, leaving vulnerabilities open for direct exploitation by attackers. The authors of the study believe that the industry is on the cusp of significant evolution, anticipating a surge in both defensive and offensive cyber activities in the near future. Industry representatives stress that systems like A2 are transforming vulnerability searches from a barrage of alerts to confirmed results, thereby minimizing false positives and allowing stakeholders to concentrate on genuine risks. Currently, the source code remains accessible only to researchers with official partnerships, striking a balance between open science and responsible dissemination. RedazioneThe editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general." max_tokens="3500" temperature="0.3" top_p="1.0" best_of="1" presence_penalty="0.1" frequency_penalty="frequency_penalty"].0004 to [openai_gpt model="gpt-4o-mini" prompt="Summarize the content and extract only the fact described in the text bellow. The summary shall NOT include a title, introduction and conclusion. Text: Artificial intelligence systems have faced scrutiny for their tendency to generate perplexing vulnerability reports, often overwhelming open-source developers with irrelevant notifications. However, a team of researchers from Nanjing University and the University of Sydney has introduced a promising solution: an agent named A2, designed to identify and verify vulnerabilities in Android applications, effectively emulating the work of a bug hunter. This development builds upon the earlier A1 project, which was successful in exploiting bugs within smart contracts. Performance and Capabilities The researchers assert that A2 achieved an impressive 78.3% coverage on the Ghera test suite, significantly surpassing the static analyzer APKHunt, which managed only 30%. In tests conducted on 169 real APKs, A2 uncovered 104 zero-day vulnerabilities, with 57 of these confirmed through automatically generated working exploits. Notably, among these vulnerabilities was a medium-severity bug found in an application boasting over 10 million installs. This particular flaw involved an intentional redirection issue that could allow malware to seize control. A2's standout feature is its validation module, which was notably absent in its predecessor. The earlier A1 system employed a fixed verification scheme, merely assessing the profitability of an attack. In contrast, A2 meticulously validates vulnerabilities step by step, breaking down the process into specific tasks. For instance, in an application where the AES key was stored in clear text, A2 first locates the key in the strings.xml file, generates a fake password reset token using that key, and subsequently verifies that the token successfully bypasses authentication. Each step is accompanied by automatic verification, ensuring accuracy from value matching to confirming application activity. Technological Framework A2 operates by integrating several commercial language models, including OpenAI o3, Gemini 2.5 Pro, Gemini 2.5 Flash, and GPT-oss-120b. These models are allocated specific roles: the planner devises an attack strategy, the executor carries out the actions, and the validator confirms the outcomes. This architecture mirrors human methodology, enabling a reduction in noise and an increase in confirmed results. Traditional analysis tools often generate thousands of insignificant signals, yielding very few genuine threats, whereas A2 can promptly demonstrate the exploitability of a flaw. Cost Efficiency The researchers have also analyzed the cost implications of the system. Vulnerability detection ranges from [cyberseo_openai model="gpt-4o-mini" prompt="Rewrite a news story for a business publication, in a calm style with creativity and flair based on text below, making sure it reads like human-written text in a natural way. The article shall NOT include a title, introduction and conclusion. The article shall NOT start from a title. Response language English. Generate HTML-formatted content using tag for a sub-heading. You can use only , , , , and HTML tags if necessary. Text: Redazione RHC : 6 September 2025 09:12Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing University and the University of Sydney have an example to the contrary: they presented an agent called A2, capable of finding and verifying vulnerabilities in Android applications, mimicking the work of a bug hunter. The new development is a continuation of the previous A1 project, which was able to exploit bugs in smart contracts.The authors claim that A2 achieved 78.3% coverage on the Ghera test suite, outperforming the static analyzer APKHunt, which achieved only 30%. Run on 169 real APKs, it found 104 zero-day vulnerabilities, 57 of which were confirmed by automatically generated working exploits. Among these, a medium-severity bug in an app with over 10 million installs. This was an intentional redirection issue that allowed the malware to gain control.A2’s main distinguishing feature is the validation module, which was absent in its predecessor.The old A1 system used a fixed verification scheme that only assessed whether an attack would be profitable. A2, on the other hand, can confirm a vulnerability step by step, breaking down the process into specific tasks. As an example, the authors cite a scenario involving an application where the AES key was stored in clear text. The agent first finds the key in the strings.xml file, then uses it to generate a fake password reset token, and finally verifies that this token actually bypasses authentication. All steps are accompanied by automatic verification: from matching values to confirming application activity and displaying the desired address on the screen.To function, A2 combines several commercial language models: OpenAI o3, Gemini 2.5 Pro, Gemini 2.5 Flash, and GPT-oss-120b. They are distributed according to roles: the planner develops an attack strategy, the executor executes the actions, and the validator confirms the result. This architecture, according to the authors, replicates the human methodology, which has allowed them to reduce noise and increase the number of confirmed results. The developers point out that traditional analysis tools produce thousands of insignificant signals and very few real threats, while their agent is able to immediately demonstrate the exploitability of a flaw.The researchers also calculated the cost of the system. Vulnerability detection costs between $0.0004 and $0.03 per app using different models, while a full cycle with verification costs an average of $1.77. At the same time, using only Gemini 2.5 Pro, the cost increases to $8.94 per bug. For comparison, last year a team from the University of Illinois demonstrated that GPT-4 creates an exploit from a vulnerability description for $8.80. It turns out that the cost of finding and confirming flaws in mobile apps is comparable to the cost of a medium-severity vulnerability in bug bounty programs, where rewards are calculated in the hundreds and thousands of dollars.Experts point out that A2 already outperforms Android static program analyzers, and A1 is close to the best results in smart contracts. They are confident that this approach can speed up and simplify the work of both researchers and hackers, because instead of developing complex tools, they simply call the API of pre-trained models. However, a problem remains: Bounty hunters can use A2 to get rich quickly, but bounty programs don’t cover all bugs. This leaves loopholes for attackers to directly exploit the found bugs.The authors of the article believe that the industry is just beginning to develop and that a surge in activity in both defensive and offensive attacks can be expected in the near future. Industry representatives emphasize that systems like A2 shift vulnerability searches from endless alerts to confirmed results, reducing the number of false positives and allowing them to focus on real risks.For now, the source code is only available to researchers with official partnerships, to maintain a balance between open science and responsible dissemination.RedazioneThe editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.Lista degli articoli" temperature="0.3" top_p="1.0" best_of="1" presence_penalty="0.1" ].0004 to [cyberseo_openai model="gpt-4o-mini" prompt="Rewrite a news story for a business publication, in a calm style with creativity and flair based on text below, making sure it reads like human-written text in a natural way. The article shall NOT include a title, introduction and conclusion. The article shall NOT start from a title. Response language English. Generate HTML-formatted content using tag for a sub-heading. You can use only , , , , and HTML tags if necessary. Text: Redazione RHC : 6 September 2025 09:12Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing University and the University of Sydney have an example to the contrary: they presented an agent called A2, capable of finding and verifying vulnerabilities in Android applications, mimicking the work of a bug hunter. The new development is a continuation of the previous A1 project, which was able to exploit bugs in smart contracts.The authors claim that A2 achieved 78.3% coverage on the Ghera test suite, outperforming the static analyzer APKHunt, which achieved only 30%. Run on 169 real APKs, it found 104 zero-day vulnerabilities, 57 of which were confirmed by automatically generated working exploits. Among these, a medium-severity bug in an app with over 10 million installs. This was an intentional redirection issue that allowed the malware to gain control.A2’s main distinguishing feature is the validation module, which was absent in its predecessor.The old A1 system used a fixed verification scheme that only assessed whether an attack would be profitable. A2, on the other hand, can confirm a vulnerability step by step, breaking down the process into specific tasks. As an example, the authors cite a scenario involving an application where the AES key was stored in clear text. The agent first finds the key in the strings.xml file, then uses it to generate a fake password reset token, and finally verifies that this token actually bypasses authentication. All steps are accompanied by automatic verification: from matching values to confirming application activity and displaying the desired address on the screen.To function, A2 combines several commercial language models: OpenAI o3, Gemini 2.5 Pro, Gemini 2.5 Flash, and GPT-oss-120b. They are distributed according to roles: the planner develops an attack strategy, the executor executes the actions, and the validator confirms the result. This architecture, according to the authors, replicates the human methodology, which has allowed them to reduce noise and increase the number of confirmed results. The developers point out that traditional analysis tools produce thousands of insignificant signals and very few real threats, while their agent is able to immediately demonstrate the exploitability of a flaw.The researchers also calculated the cost of the system. Vulnerability detection costs between $0.0004 and $0.03 per app using different models, while a full cycle with verification costs an average of $1.77. At the same time, using only Gemini 2.5 Pro, the cost increases to $8.94 per bug. For comparison, last year a team from the University of Illinois demonstrated that GPT-4 creates an exploit from a vulnerability description for $8.80. It turns out that the cost of finding and confirming flaws in mobile apps is comparable to the cost of a medium-severity vulnerability in bug bounty programs, where rewards are calculated in the hundreds and thousands of dollars.Experts point out that A2 already outperforms Android static program analyzers, and A1 is close to the best results in smart contracts. They are confident that this approach can speed up and simplify the work of both researchers and hackers, because instead of developing complex tools, they simply call the API of pre-trained models. However, a problem remains: Bounty hunters can use A2 to get rich quickly, but bounty programs don’t cover all bugs. This leaves loopholes for attackers to directly exploit the found bugs.The authors of the article believe that the industry is just beginning to develop and that a surge in activity in both defensive and offensive attacks can be expected in the near future. Industry representatives emphasize that systems like A2 shift vulnerability searches from endless alerts to confirmed results, reducing the number of false positives and allowing them to focus on real risks.For now, the source code is only available to researchers with official partnerships, to maintain a balance between open science and responsible dissemination.RedazioneThe editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.Lista degli articoli" temperature="0.3" top_p="1.0" best_of="1" presence_penalty="0.1" ].03 per app depending on the model used, while a complete cycle with verification averages around .77. However, utilizing only Gemini 2.5 Pro raises the cost to .94 per bug. In comparison, a previous study by a team from the University of Illinois revealed that GPT-4 generates an exploit from a vulnerability description for .80. Thus, the expenses associated with identifying and confirming flaws in mobile applications align closely with the rewards offered in bug bounty programs, which often range in the hundreds to thousands of dollars. Future Implications Experts highlight that A2 already surpasses Android static program analyzers, while A1 approaches the leading results in smart contracts. There is optimism that this innovative approach can expedite and simplify the efforts of both researchers and hackers alike, as they can leverage the API of pre-trained models instead of developing complex tools. Nonetheless, a challenge persists: while bounty hunters may exploit A2 for quick financial gain, bounty programs do not encompass all bugs, leaving vulnerabilities open for direct exploitation by attackers. The authors of the study believe that the industry is on the cusp of significant evolution, anticipating a surge in both defensive and offensive cyber activities in the near future. Industry representatives stress that systems like A2 are transforming vulnerability searches from a barrage of alerts to confirmed results, thereby minimizing false positives and allowing stakeholders to concentrate on genuine risks. Currently, the source code remains accessible only to researchers with official partnerships, striking a balance between open science and responsible dissemination. RedazioneThe editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general." max_tokens="3500" temperature="0.3" top_p="1.0" best_of="1" presence_penalty="0.1" frequency_penalty="frequency_penalty"].03 per app, while a complete verification cycle averages .77. Using only Gemini 2.5 Pro raises the cost to .94 per bug. Experts believe A2 surpasses existing Android static program analyzers and that its approach can streamline the work of researchers and hackers. However, there are concerns that bounty hunters could exploit A2 for financial gain, as bounty programs do not cover all bugs. The source code is currently available only to researchers with official partnerships.
AppWizard
September 6, 2025
Researchers from Nanjing University and The University of Sydney have developed an AI vulnerability identification system called A2, which is designed to discover and validate vulnerabilities in Android applications. A2 achieves 78.3 percent coverage on the Ghera benchmark, outperforming static analyzers like APKHunt, which only reaches 30.0 percent. In testing on 169 production APKs, A2 identified 104 true-positive zero-day vulnerabilities, with 57 validated through automatically generated proof-of-concept exploits. One identified vulnerability was a medium-severity flaw in an Android app with over 10 million installs, specifically an intent redirect issue. A2 integrates various commercial AI models for planning, execution, and validation of tasks, improving upon its predecessor, A1, which lacked robust validation. The system effectively reduces false positives by providing valuable signals rather than overwhelming noise.
AppWizard
September 6, 2025
A team of researchers has developed an automated system using AI to identify vulnerabilities in Android applications, successfully detecting over 100 zero-day flaws in production apps. This system automates traditional vulnerability detection tasks, utilizing machine learning to analyze app behaviors, permissions, and data flows. The AI's ability to uncover critical issues, such as insecure data storage and improper API implementations, highlights the limitations of current app security protocols. While the technology shows promise, it faces challenges such as the potential for imprecise bug reports and ethical considerations regarding vulnerability ownership and disclosure methods. Experts predict that automated systems like this will become integral to app development workflows by 2025, enhancing the security of mobile applications.
AppWizard
July 15, 2025
Google's AI security agent, Big Sleep, has identified a vulnerability in SQLite, designated as CVE-2025-6965, which was being exploited by hackers. Enhancements have been made to Google's open-source forensics tool, now operating on the upgraded Sec-Gemini platform for improved log analysis and threat detection. Google is set to unveil FACADE, an insider threat detection system that has monitored billions of daily events since 2018 using contrastive learning. At DEF CON 33, Google will co-host a Capture the Flag event with Airbus, involving AI assistants in security challenges. Google is contributing data from its Secure AI Framework to the Coalition for Secure AI to enhance research in cybersecurity. The AI Cyber Challenge, a DARPA-led competition supported by Google, is nearing its conclusion, with winners showcasing AI tools for identifying and rectifying vulnerabilities in open-source software.
Search