November 5, 2015 By Shane Schick 2 min read

The team at Google charged with looking for security risks may be called Project Zero, but its investigation into the Galaxy S6 Edge has revealed a much higher number of potential vulnerabilities.

According to a post issued by Project Zero earlier this week, an audit of Samsung Galaxy S6 Edge smartphones have at least 11 issues described as high-impact. These problems include security holes in the gallery app and email client. While original equipment manufacturers (OEMs) theoretically take a lot of time and effort to test their products for security risks prior to release, the Google researchers uncovered the flaws in just one week.

The Verge suggested that to some extent, the security issues in products like the Galaxy S6 Edge are to be expected, given the cutthroat competition among manufacturers and the challenge of standing out in the Android market. It remains to be seen whether BlackBerry, which is expected to launch its first Android device called the Priv, will do any better in keeping cyberthreats at bay.

Fortunately, Samsung is already working to make its products safer for consumers and businesses. Many of the script injection problems, JavaScript vulnerabilities and other flaws have already been patched, BetaNews reported. While at least three issues still needed to be dealt with at press time, Samsung received kudos from Project Zero for the speed of its response to the findings.

Of course, Android security has been an ongoing concern, particularly among enterprise users, which is probably why Google and Samsung committed to monthly updates earlier this year, Mashable pointed out. One of the interesting things about Project Zero’s work is the seemingly straightforward approach it has to finding the flaws: Teams attempt to gain access to unauthorized permissions through an app on Google Play or by injecting code into a phone and trying to maintain it, even if the devices were wiped clean.

The Telegraph noted that besides Samsung, a number of other OEMs are all expected to release updates of their devices supporting the latest version of Android. These include LG, HTC and Sony. Here’s hoping the next generation of Galaxy S6 Edge devices are a little more secure.

More from

Bypassing Windows Defender Application Control with Loki C2

10 min read - Windows Defender Application Control (WDAC) is a security solution that restricts execution to trusted software. Since it is classified as a security boundary, Microsoft offers bug bounty payouts for qualifying bypasses, making it an active and competitive field of research.Typical outcomes of a WDAC bypass bug bounty submission:Bypass is fixed; possible bounty awardedBypass is not fixed but instead "mitigated" by being added to the WDAC recommended block list. Likely no bounty awarded but honorable mention is typically givenBypass is not…

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today