{"id":353007,"date":"2025-11-19T01:35:00","date_gmt":"2025-11-19T09:35:00","guid":{"rendered":"https:\/\/cms-articles.softonic.io\/es\/?p=402113"},"modified":"2025-11-19T01:37:18","modified_gmt":"2025-11-19T09:37:18","slug":"meta-wants-to-further-protect-whatsapp","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/meta-wants-to-further-protect-whatsapp\/","title":{"rendered":"Meta wants to further protect WhatsApp"},"content":{"rendered":"\n<p>Meta has launched a new tool called <strong>WhatsApp Research Proxy, aimed at researchers in its bug bounty program<\/strong>, with the goal of improving research on the WhatsApp network protocol. This initiative seeks to facilitate access to specific WhatsApp technologies, especially in a context where the application is an attractive target for state actors and commercial spyware providers.<\/p>\n\n\n<h2 class=\"wp-block-heading\">\u00bfQu\u00e9 pasa, Whatsapp?<\/h2>\n\n\n<p>The company has also established a pilot program to invite research teams to focus on abuses on the platform, offering engineering support and tools. <em>&#8220;Our goal is to lower the entry barrier for academics and other researchers who <strong>may not be familiar with bug bounty programs<\/strong>&#8220;<\/em>, Meta noted.<\/p>\n\n\n<p>In the last 15 years, <strong>the company has awarded more than 25 million dollars in rewards to over 1400 researchers from 88 countries<\/strong>, with more than 4 million dollars paid out just in the last year for nearly 800 valid reports. Among the notable vulnerabilities detected is an incomplete validation bug, which was fixed in recent versions of WhatsApp, although there is no evidence that this issue was exploited.<\/p>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2025\/11\/wa.jpg\" alt=\"\" class=\"wp-image-402115\" \/><\/figure>\n\n\n<p>In addition, Meta has fixed a critical vulnerability (CVE-2025-59489) that allowed malicious applications on Quest devices to execute arbitrary code. This attack <strong>was discovered by Flatt Security researcher, RyotaK<\/strong>, who was recognized for his finding.<\/p>\n\n\n<p>In response to a report about a method for enumerating WhatsApp accounts on a large scale in 245 countries, <strong>Meta has implemented new protective measures against scraping<\/strong>. Although no signs of malicious abuse were found, the investigation revealed that millions of phone numbers are registered in countries where WhatsApp is banned, including 2.3 million in China, raising concerns about privacy and the misuse of user data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Meta has launched a new tool called WhatsApp Research Proxy, aimed at researchers in its bug bounty program, with the goal of improving research on the WhatsApp network protocol. This initiative seeks to facilitate access to specific WhatsApp technologies, especially in a context where the application is an attractive target for state actors and commercial spyware providers. What&#8217;s up, WhatsApp? The company has also established a pilot program to invite research teams to focus on abuses on the platform, offering support in engineering and tools. &#8220;Our goal is to reduce the [&#8230;]<\/p>\n","protected":false},"author":9317,"featured_media":353014,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015],"tags":[5605,3722,1043],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-353007","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-ciberseguridad","tag-meta","tag-whatsapp"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/353007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9317"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=353007"}],"version-history":[{"count":3,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/353007\/revisions"}],"predecessor-version":[{"id":353024,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/353007\/revisions\/353024"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/353014"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=353007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=353007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=353007"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=353007"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=353007"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=353007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}