Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Mobile Security

Google fixes 120 Android vulnerabilities, including 2 zero-days

Cyberinchief by Cyberinchief
October 1, 2025
Reading Time: 2 mins read
0
Google fixes 120 Android vulnerabilities, including 2 zero-days


RELATED POSTS

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026

Emerging Technology Management for Modern IT Leaders

Adopting Blueprints in Jamf Tools

At the beginning of September 2025, Google released its monthly Android security update. And this time, the numbers are striking: a total of 120 vulnerabilities, compared to only 6 last month. Among them, two zero-day vulnerabilities had already been exploited by cybercriminals before the fix was made available.

A Massive and Critical Patch

Among the 120 vulnerabilities patched, two are particularly concerning because they were already being actively exploited at the time of the patch:

  • CVE-2025-38352: a flaw in the Android system allowing a malicious application to gain more privileges than intended
  • CVE-2025-48543: a vulnerability in the Android runtime, allowing system protections to be bypassed

These two vulnerabilities can be seen as true entry points, giving cybercriminals the ability to escalate privileges and override the security mechanisms meant to protect data.

Beyond these two critical flaws, the September patch also addresses numerous other vulnerabilities in the Android system and in chips from manufacturers such as Qualcomm and MediaTek. Notably, a Remote Code Execution (RCE) vulnerability was fixed in the System component, which could have allowed a cybercriminal to take full remote control of a device.

Why Businesses Should Care

Today, smartphones are true work tools: professional messaging, access to business applications, sharing of sensitive documents… When an Android zero-day vulnerability is exploited, organizational data and security are directly at risk.

Two major challenges aggravate the situation:

Buy JNews
ADVERTISEMENT
  • Android fragmentation: not all devices receive updates at the same time, leaving some exposed longer
  • BYOD (Bring Your Own Device): many employees use their personal phones, with no guarantee they are up to date

Protection Beyond Updates

Installing the September patch is essential. But between the discovery of a vulnerability and the release of a patch, there is always a window of exposure during which cybercriminals can exploit zero-days. Moreover, not all devices receive updates at the same time, especially in BYOD environments.

The Pradeo Mobile Threat Defense (MTD) solution provides continuous protection by:

  • Detecting suspicious behaviors in real time related to vulnerability exploitation
  • Automatically blocking malicious applications or connections
  • Offering security teams clear visibility into each device’s status and patch level
  • Protecting sensitive data even in hybrid or BYOD environments

The leap from 6 vulnerabilities fixed in August to 120 in September is a strong warning. To counter fast-evolving and sophisticated threats, businesses need mobile solutions that continuously detect, block, and protect. With Pradeo, they remain one step ahead of cybercriminals.

 

 

 

 

 

 



Source link

Tags: fixesGoogleincludingvulnerabilitieszerodays
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
Mobile Security

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026

January 21, 2026
Emerging Technology Management for Modern IT Leaders
Mobile Security

Emerging Technology Management for Modern IT Leaders

December 8, 2025
Adopting Blueprints in Jamf Tools
Mobile Security

Adopting Blueprints in Jamf Tools

December 8, 2025
Jamf Safe Internet + On-Device Phishing AI
Mobile Security

Jamf Safe Internet + On-Device Phishing AI

December 7, 2025
Act on Jamf Protect Alerts
Mobile Security

Act on Jamf Protect Alerts

December 7, 2025
Terraform + GitLab CI/CD for Jamf
Mobile Security

Terraform + GitLab CI/CD for Jamf

December 6, 2025
Next Post
Why Humans Can’t Win Without AI Security

Why Humans Can’t Win Without AI Security

AI-Driven Cybersecurity Requires Skilled Human Oversight

AI-Driven Cybersecurity Requires Skilled Human Oversight

Recommended Stories

Bangladeshi | Money Mule | Brokerage | Scam | FIR | Tamil Nadu Police | Cyber Crime | Sun News

Bangladeshi | Money Mule | Brokerage | Scam | FIR | Tamil Nadu Police | Cyber Crime | Sun News

November 7, 2025
Cyber Security Salary in 2025 | How Much Does a Cyber Security Engineer Earn? | Intellipaat #shorts

Cyber Security Salary in 2025 | How Much Does a Cyber Security Engineer Earn? | Intellipaat #shorts

November 29, 2025
Jamf Trust: Dead Gateway Detection

Jamf Trust: Dead Gateway Detection

October 29, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested