
Photo by Taylor Grote on Unsplash
Viral Call-Recording App Neon Pulled Following Massive Security Flaw
- Written by Andrea Miliani Former Tech News Expert
- Fact-Checked by Sarah Frazier Former Content Manager
The viral voice-calling app Neon, which gained popularity for offering users the option to sell private data to AI companies, went offline on Thursday after TechCrunch discovered a major security flaw.
In a rush? Here are the quick facts:
- The new app Neon went offline after TechCrunch reported a major security flaw.
- The platform quickly rose to the top of the U.S. App Store charts, promoted as a “money-making tool,” reaching 75,000 downloads in a day.
- The app developer, Alex Kiam, shared a notification with users.
According to TechCrunch’s exclusive report , researchers revealed that logged-in users could access other people’s private data, including recent call lists, transcripts, call recordings, and earnings per call. The team also discovered that Neon’s servers could be manipulated to reveal metadata from other users.
“We used a network traffic analysis tool called Burp Suite to inspect the network data flowing in and out of the Neon app,” wrote TechCrunch. “Our network analysis tool revealed details that were not visible to regular users in the Neon app. These details included the text-based transcript of the call and a web address to the audio files, which anyone could publicly access as long as they had the link.”
TechCrunch reported the security flaw to the app creator, Alex Kiam, on Thursday, immediately after confirming the data breach. The app was shut down shortly afterward.
Kiam said that he took the servers down and notified users. Moments later, he sent an email to customers informing them about the app’s shutdown.
“Your data privacy is our number one priority, and we want to make sure it is fully secure even during this period of rapid growth. Because of this, we are temporarily taking the app down to add extra layers of security,” stated the email shared with TechCrunch.
Neon had reached over 75,000 downloads only on Thursday, and quickly reached the top of the charts on app marketplaces, reaching second place in the App Store as one of the most popular social media apps.
The platform, promoted as a “moneymaking tool,” offered users the opportunity to sell their audio conversations—between app users—for thirty cents per minute, allowing them to earn up to $30 per day, along with referral bonuses.
The data collected was offered to AI companies “for the purpose of developing, training, testing, and improving machine learning models, artificial intelligence tools and systems, and related technologies,” according to Neon’s description.
It remains unclear when Neon’s service will be restored, and TechCrunch noted that the warning shared with users did not mention the data that had already been exposed.
Other popular apps that have recently climbed the app marketplace charts have also faced troubling security risks. Tea, a women-focused dating advice app, suffered a massive data breach right after reaching the top charts in July, forcing its developers to suspend services.

Image by Denny Bú, from Unsplash
NCSC Issues Urgent Warning On Malware Targeting Cisco Devices
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
The National Cyber Security Centre (NCSC) of the UK has released a new alert about an ongoing malware attack, which targets specific Cisco devices, urging organizations to take immediate protective measures.
In a rush? Here are the quick facts:
- Attackers exploited new flaws to implant malware, execute commands, and steal data.
- Cisco detection guide highlights suppressed system logs and disabled memory checks.
- Attackers use stolen credentials, creating “impossible travel” login scenarios.
In a new update , Cisco confirmed that the same threat actor behind last year’s ArcaneDoor campaign is now exploiting new flaws in Cisco Adaptive Security Appliance (ASA) 5500-X Series devices.
The networking tools of Cisco include routers, switches, and firewalls which direct and protect internet traffic. They’re widely used by companies and governments to connect systems, enable remote access, and safeguard sensitive data.
Attackers have managed to place malware into systems while performing commands and obtaining sensitive data from compromised systems.
The NCSC has published detailed analysis of two new malware strains, named RayInitiator and LINE VIPER, which represent a more advanced evolution of malware seen in the earlier campaign. NCSC says that organisations need to check their systems right away according to Cisco remediation guidance.
Ollie Whitehouse, NCSC’s Chief Technology Officer, said: “It is critical for organisations to take note of the recommended actions highlighted by Cisco today, particularly on detection and remediation. We strongly encourage network defenders to follow vendor best practices and engage with the NCSC’s malware analysis report to assist with their investigations.”
End-of-life technology presents a significant risk for organisations. Systems and devices should be promptly migrated to modern versions to address vulnerabilities and strengthen resilience,” Whitehouse concluded.
Cisco has also issued a detailed detection guide for network defenders. It explains how attackers may try to hide their activity, including suppressing system logs, disabling memory checks, and using stolen credentials to create “impossible travel” scenarios, where the same user logs in from distant locations in an unrealistic timeframe.
Only certain Cisco ASA 5500-X models running specific software versions with VPN services enabled have been confirmed as compromised. Cisco and the NCSC recommend users to update their devices, check their logs and replace all unsupported equipment as it creates a growing security threat.