bug-bounty457
google361
microsoft312
facebook270
xss250
apple179
malware176
rce165
exploit140
cve111
account-takeover104
bragging-post101
phishing84
privilege-escalation82
csrf81
supply-chain68
stored-xss65
authentication-bypass63
dos62
browser61
reflected-xss57
react53
cloudflare51
reverse-engineering49
input-validation48
cross-site-scripting48
node47
aws47
docker47
access-control47
smart-contract45
ethereum44
defi43
sql-injection43
web342
ssrf42
web-security42
web-application41
oauth37
writeup37
race-condition36
burp-suite35
info-disclosure34
idor34
vulnerability-disclosure34
cloud33
auth-bypass33
html-injection33
smart-contract-vulnerability32
buffer-overflow32
0
3/10
A researcher reports detection of anomalous mesh networking activity across iOS devices, including APNs redirection to non-Apple ASNs, persistent P2P tunneling on non-standard ports, and globally distributed clusters, discovered through TraceV3 binary log analysis.
ios-security
mesh-network
network-analysis
protocol-hijacking
apns-redirection
p2p-networking
traffic-analysis
binary-parsing
routing-anomalies
threat-tracking
exfiltration
Joseph Goydish II
Bill Woodcock
NANOG
Google GSLB
TraceV3