14.5 C
New York
Tuesday, March 18, 2025
Home Blog Page 5

ios – Dealing with fetch redirect on react-native app throughout pkce authorization code movement


I’ve a react native cell app (ios/android), which I am trying to implement the PKCE Authorization Movement per the RFC. My purpose is to redirect the consumer to my very own login web page as a substitute of a 3rd get together supplier like google or fb. This manner I can keep away from having to retailer the applying secret on the consumer aspect. The movement is working nice on the browser as a result of I’ve a completely certified area title and the browser is ready to observe the redirect despatched by the authorization server on to my login web page.

Nevertheless, on the cell app I haven’t got a site title and so the redirect_uri I ship the authorization server is a schema url, e.g: my-app://someurl.com. I’ve created this schema url in xcode in addition to the AndroidManifest.xml and verified that domestically on the gadget it appropriately routes to the app from both chrome or safari whether or not the app is in background or inactive. The issue is that the react native fetch technique follows the 302 redirect despatched by the authorization server (e.g. my-app://someurl.com domestically) however it might probably’t resolve it domestically the best way the browser does for instance and throws a networking exception:

Fetch Exception

I printed out the stack on the native aspect and it is complaining about an ‘unsupported url’ given that it is the schema url and never a http/s formatted url:

Error Area=NSURLErrorDomain Code=-1002 "unsupported URL" UserInfo={NSLocalizedDescription=unsupported URL, NSErrorFailingURLStringKey=my-app://someurl.com?client_id=client-id-LLg5PEvPwvyfVQNrNuDUgyHXWbSmUHki&authorization_code=ajxmtNSGUysXoj8qyU1xu9al9dMo9PFRZoFpCzsepGzrh7p9RKQyeT3qvjmoTcK, NSErrorFailingURLKey=my-app://someurl.com?client_id=client-id-LLg5PEvPwvyfVQNrNuDUgyHXWbSmUHki&authorization_code=ajxmtNSGUysXoj8qyU1xu9al9dMo9PFRZoFpCzsepGzrh7p9RKQyeT3qvjmoTcK, _NSURLErrorRelatedURLSessionTaskErrorKey=( "LocalDataTask <5271A124-F625-4583-9926-056D95F943B9>.<2>" ), _NSURLErrorFailingURLSessionTaskErrorKey=LocalDataTask <5271A124-F625-4583-9926-056D95F943B9>.<2>, NSUnderlyingError=0x600000d308a0 {Error Area=kCFErrorDomainCFNetwork Code=-1002 "(null)"}}

The redirect: 'handbook' fetch choice would additionally clear up this downside for me assuming it could additionally give me entry to the redirect url I must extract the token from however neither ‘handbook’ nor ‘error’ work on react native (consumer aspect).

Curious to know if anyone has gotten this engaged on react native fetch with schema url’s, maybe I am lacking one thing apparent. The issue is not a lot the Deep Linking as that seems to be working, however extra that I am unsure deal with this redirect within the app. For the reason that native aspect has acquired the redirect request externally however is choking on it when it makes an attempt to observe it, is there a manner for it to bypass the act of truly following it and as a substitute simply return the url end result again to the react aspect?

Lastly, there are fairly a number of posts on right here about comparable points however nothing that truly offers with this distinctive use case.

Thanks…

Unpatched Home windows Zero-Day Flaw Exploited by 11 State-Sponsored Menace Teams Since 2017

0


Mar 18, 2025Ravie LakshmananVulnerability / Home windows Safety

Unpatched Home windows Zero-Day Flaw Exploited by 11 State-Sponsored Menace Teams Since 2017

An unpatched safety flaw impacting Microsoft Home windows has been exploited by 11 state-sponsored teams from China, Iran, North Korea, and Russia as a part of information theft, espionage, and financially motivated campaigns that date again to 2017.

The zero-day vulnerability, tracked by Development Micro’s Zero Day Initiative (ZDI) as ZDI-CAN-25373, refers to a problem that permits unhealthy actors to execute hidden malicious instructions on a sufferer’s machine by leveraging crafted Home windows Shortcut or Shell Hyperlink (.LNK) recordsdata.

“The assaults leverage hidden command line arguments inside .LNK recordsdata to execute malicious payloads, complicating detection,” safety researchers Peter Girnus and Aliakbar Zahravi stated in an evaluation shared with The Hacker Information. “The exploitation of ZDI-CAN-25373 exposes organizations to vital dangers of information theft and cyber espionage.”

Cybersecurity

Particularly, this includes the padding of the arguments with Line Feed (x0A) and Carriage Return (x0D) characters to evade detection.

Practically a 1,000 .LNK file artifacts exploiting ZDI-CAN-25373 have been unearthed thus far, with a majority of the samples linked to Evil Corp (Water Asena), Kimsuky (Earth Kumiho), Konni (Earth Imp), Bitter (Earth Anansi), and ScarCruft (Earth Manticore).

Of the 11 state-sponsored menace actors which were discovered abusing the flaw, almost half of them originate from North Korea. Apart from exploiting the flaw at varied instances, the discovering serves as a sign of cross-collaboration among the many totally different menace clusters working inside Pyongyang’s cyber equipment.

Telemetry information signifies that governments, personal entities, monetary organizations, suppose tanks, telecommunication service suppliers, and navy/protection businesses positioned in the USA, Canada, Russia, South Korea, Vietnam, and Brazil have grow to be the first targets of assaults exploiting the vulnerability.

Within the assaults dissected by ZDI, the .LNK recordsdata act as a supply car for recognized malware households like Lumma Stealer, GuLoader, and Remcos RAT, amongst others. Notable amongst these campaigns is the exploitation of ZDI-CAN-25373 by Evil Corp to distribute Raspberry Robin.

Cybersecurity

Microsoft, for its half, has categorised the difficulty as low severity and doesn’t plan to launch a repair.

“ZDI-CAN-25373 is an instance of (Person Interface (UI) Misrepresentation of Crucial Info (CWE-451),” the researchers stated. “Which means the Home windows UI didn’t current the person with essential info.”

“By exploiting ZDI-CAN-25373, the menace actor can forestall the tip person from viewing essential info (instructions being executed) associated to evaluating the danger stage of the file.”

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we put up.



Java 24 is now out there with launch of Stream Gatherers, Class-File APIs


Oracle has introduced the discharge of Java 24, which provides a number of new options to the language, corresponding to the supply of the Stream Gatherers API and Class-File API, and new options designed for AI inference and quantum safety.

“Over the previous 30 years, Java has supplied builders with a complete platform to construct and deploy functions that deal with a various vary of use circumstances,” stated Georges Saab, senior vp for the Oracle Java Platform and chair of the OpenJDK governing board. “With greater than 20 new options spanning each component of Java, together with new AI and post-quantum crypto capabilities, the Java 24 launch offers builders the instruments they should construct revolutionary, AI-infused functions. Because the stewards of Java, we’re excited to work with the worldwide Java

neighborhood to proceed delivering a gradual stream of recent options by way of our predictable, six-month cadence.”

This launch is the ultimate Java launch earlier than the subsequent Lengthy-Time period Help (LTS) launch in September. In accordance with Saab, Java 25 is not going to have plenty of newer options in comparison with Java 24, so builders can now begin making ready for that subsequent launch by experimenting with Java 24. 

Java 24 consists of the discharge of the Steam Gatherers API, which helps customized intermediate operations, permitting stream pipelines to rework information in methods which are troublesome when utilizing built-in intermediate choices. In accordance with Oracle, this API will enable Java builders to be extra environment friendly when studying, writing, and sustaining their Java code. 

The Class-File API was additionally finalized on this launch, and it offers an ordinary API for parsing, producing, and reworking Java class information, in addition to monitoring the category file format that’s outlined by the JVM specification. In accordance with the builders who labored on this API, the six-month launch schedule for Java has induced some points with class information, as a result of typically third-party frameworks embrace class-files which are older than the present model, leading to errors. 

“The Java Platform ought to outline and implement an ordinary class-file API that evolves along with the class-file format,” they wrote within the JEP. “Elements of the Platform would be capable to rely solely on this API, somewhat than rely perpetually on the willingness of third-party builders to replace and take a look at their class-file libraries. Frameworks and instruments that use the usual API would help class information from the newest JDK mechanically, in order that new language and VM options with illustration in school information could possibly be adopted shortly and simply.”

A lot of efficiency enhancements have been additionally included on this launch, together with ahead-of-time class loading and linking, elimination of the non-generational mode from the Z rubbish collector (ZGC), late barrier extension for the G1 rubbish collector, and the flexibility to synchronize digital threads with out pinning

Hardening Java for post-quantum world

Java 24 introduces a number of new security measures geared toward hardening Java for quantum computing. The Key Derivation Perform API (in preview) presents cryptographic safety for information in transit. This launch additionally presents implementations in Java of the Quantum-Resistant Module-Lattice-Primarily based Key Encapsulation Mechanism and the Quantum-Resistant Module-Lattice-Primarily based Digital Signature Algorithm, each of that are NIST requirements for quantum safety. 

“You understand, the business consensus is that it’s not a matter of if, however a matter of when quantum computing goes to render present cryptographic schemes breakable,” stated Donald Smith, vp of Java Product Administration at Oracle. “So there may be plenty of curiosity within the business to develop quantum resistant algorithms for communication and signing and so forth. And we’re beginning to get plenty of questions, ‘hey, when are we going to have quantum resistant algorithms in Java?’”

Java 24 places concentrate on AI inference

Primitive Sorts in Patterns, instanceof, and swap (JEP 488) — presently in its second preview — goals to make the language extra uniform and expressive. In accordance with Oracle, this characteristic shall be significantly helpful to builders integrating AI inferencing into their functions.

“Numerous software builders who’re utilizing or integrating with an inference engine, they’re typically pulling collectively giant units of primitive information,” Smith defined. “So you’ll have a document kind of some sort, and also you wish to pull out some variable from that—it’s often a primitive— after which ship that into an inference engine to attempt to perceive the information somewhat higher, proper? And in order that JEP goes to assist make that job lots simpler.”

Different new options on this space embrace the second preview of Module Import Declarations, which permits builders to extra simply combine enterprise logic with AI inference, libraries, and repair calls, and one other incubation of the Vector API, which is commonly utilized in AI inference. 

Locus Array automates induction, storage for ‘zero contact’ achievement

0


Array, shown here, uses a LocusBot designed to pick from and to bins from warehouse shelving, says Locus Robotics.

Array makes use of a LocusBot designed to select from and to bins from warehouse shelving. Supply: Locus Robotics


CHICAGO — Locus Robotics is thought for its goods-to-person automation, wherein cell robots help human pickers. At ProMat yesterday, the corporate gave a sneak peek of Locus Array, a system utilizing synthetic intelligence and robots for high-density storage and throughput. “We’ve been engaged on this for the previous a number of years,” mentioned Rick Faulk, CEO of Locus Robotics. “Our zero-touch achievement automates induction, and double-deep storage covers 100% of SKUs.” The Wilmington, Mass.-based firm has developed a brand new journal tower that may retrieve a number of orders from shelving into bins or cartons that may be subdivided for additional effectivity.

Locus Array makes use of AMRs, arms for environment friendly retrieval

For Array, Locus Robotics mixed an autonomous cell robotic (AMR) with a tower and a custom-developed, vision-guided choosing arm. The AMR has omnidirectional wheels much like Vector, which the corporate acquired with Waypoint Robotics, to make tight turns and slide subsequent shelving on both facet of an aisle.

“It will possibly pull from a conveyor or circulate rack, decide most of an order, after which hand off objects to be picked with Origin or Vector,” mentioned Mike Johnson, president of Locus Robotics. “The robotic can decide to 3 totally different tote sizes for optimum density with 99.9% accuracy.”

Array’s robotic choosing arm, which makes use of suction cup finish effectors, can decide from both facet of a really slim aisle, defined Faulk. Racks as much as 10 ft. (3 m) excessive add versatile, high-density storage and a 3rd dimension to Locus’ robotic choosing, not not like an automatic storage and retrieval system (ASRS).

“Healthcare, industrial, retail, and e-commerce all have the identical issues with throughput and labor shortages. We will now automate every part from induction and putaway to decant for packout,” he informed The Robotic Report throughout an unique media preview. “It will possibly get rid of 90% of labor, and our aim is to empty the parking plenty of all of the warehouses world wide.”

Locus has already assisted with greater than 4 billion picks, and the corporate was a 2024 RBR50 Robotics Innovation Award honoree.


SITE AD for the 2025 Robotics Summit registration.
Register now so you do not miss out!


LocusOne orchestrates achievement

As with Locus Robotics’ current goods-to-person (G2P) choosing, LocusOne‘s AI sequences choosing workflows for optimum effectivity, famous Kait Peterson, vp of product advertising at Locus.

“We’re creating a brand new class of robot-to-goods, or R2G, choosing,” she mentioned.

LocusOne already had the order logic and required only a few modifications for Array, added Faulk.

“This has been a part of the corporate’s imaginative and prescient because it was based, and our engineers have labored on this since September,” he mentioned. “By decreasing value per decide, we will ship a quick ROI [return on investment].”

Faulk added that cell manipulator Array may be shortly and simply built-in with current warehouses and Locus’ AMRs, permitting scalable deployments in weeks fairly than months. It will possibly function 24/7 to fulfill rising achievement calls for, he mentioned.

In response to Locus, the product will likely be out there for ordering later this yr, and can begin transport in early 2026.

Editor’s observe: Observe our ongoing protection of ProMat 2025.

New BitM Assault Permits Hackers to Hijack Person Classes in Seconds

0


A latest risk intelligence report highlights the emergence of a complicated cyberattack method often known as Browser-in-the-Center (BitM), which permits hackers to hijack consumer classes throughout numerous internet purposes in a matter of seconds.

This methodology exploits the inherent functionalities of internet browsers to deceive victims into believing they’re interacting with a safe connection, whereas in actuality, their actions are being carried out on the attacker’s machine.

BitM AttackBitM Attack
Monitoring the sufferer container

Exploiting Session Tokens

BitM assaults goal session tokens, that are saved in a consumer’s browser after finishing multi-factor authentication (MFA).

These tokens are essential for sustaining an authenticated state, making them a main goal for adversaries.

Conventional strategies, similar to utilizing clear proxies like Evilginx2, require vital customization and might be time-consuming.

In distinction, BitM affords fast focusing on capabilities with minimal configuration, permitting hackers to succeed in any web site rapidly.

Protection Methods

To counter these threats, organizations are suggested to implement strong defenses.

Mandiant suggests utilizing consumer certificates and hardware-based MFA options like FIDO2-compatible safety keys.

BitM AttackBitM Attack
FIDO2 authentication circulation

These measures can successfully deter BitM assaults by requiring authentication parts which are troublesome for attackers to govern.

As an illustration, FIDO2 keys make sure that authentication responses are tied to the request’s origin, stopping attackers from replaying them on totally different websites.

Nonetheless, these protections are solely efficient if the gadget internet hosting the safety keys or certificates stays uncompromised, emphasizing the necessity for a layered safety method.

The event of inside instruments like Delusion by Mandiant demonstrates the potential scale of BitM assaults.

Delusion permits operators to focus on purposes with out prior data of their authentication protocols, making session-stealing assaults extra accessible.

Whereas Mandiant has chosen to not publish Delusion because of weaponization considerations, open-source options like EvilnoVNC and Cuddlephish can be found for testing defenses towards such threats.

As BitM assaults proceed to evolve, organizations should prioritize strong authentication and access-control mechanisms to guard delicate knowledge and networks.

Are you from SOC/DFIR Groups? – Analyse Malware Incidents & get stay Entry with ANY.RUN -> Begin Now for Free.