Mobile

GuLoader implements new evasion techniquesGuLoader implements new evasion techniques

GuLoader implements new evasion techniques

Cybersecurity researchers exposed new evasion techniques adopted by an advanced malware downloader called GuLoader. CrowdStrike researchers d a detailed multiple evasion…

2 years ago
Apple fixed the tenth actively exploited zero-day this yearApple fixed the tenth actively exploited zero-day this year

Apple fixed the tenth actively exploited zero-day this year

Apple rolled out security updates to iOS, iPadOS, macOS, tvOS, and Safari to fix a new actively exploited zero-day (CVE-2022-42856).…

2 years ago
Zombinder APK binding service used in multiple malware attacksZombinder APK binding service used in multiple malware attacks

Zombinder APK binding service used in multiple malware attacks

Zombinder is a third-party service on darknet used to embed malicious payloads in legitimate Android applications. While investigating a new…

2 years ago
<strong>Android app with over 5m downloads leaked user browsing history</strong><strong>Android app with over 5m downloads leaked user browsing history</strong>

<strong>Android app with over 5m downloads leaked user browsing history</strong>

The Android app Web Explorer – Fast Internet left an open instance, exposing a trove of sensitive data that malicious…

2 years ago
Pwn2Own Toronto 2022 hacking competition. Samsung S22 hackedPwn2Own Toronto 2022 hacking competition. Samsung S22 hacked

Pwn2Own Toronto 2022 hacking competition. Samsung S22 hacked

The Pwn2Own Toronto 2022 hacking competition has begun, this is the 10th anniversary of the consumer-focused version of the contest.…

2 years ago
Exclusive: The largest mobile malware marketplace identified by Resecurity in the Dark WebExclusive: The largest mobile malware marketplace identified by Resecurity in the Dark Web

Exclusive: The largest mobile malware marketplace identified by Resecurity in the Dark Web

Resecurity has identified a new underground marketplace in the Dark Web oriented towards mobile malware developers and operators. "In the Box" dark…

2 years ago
Android Keyboard Apps with 2 Million downloads can remotely hack your deviceAndroid Keyboard Apps with 2 Million downloads can remotely hack your device

Android Keyboard Apps with 2 Million downloads can remotely hack your device

Experts found multiple flaws in three Android Keyboard apps that can be exploited by remote attackers to compromise a mobile…

2 years ago
Experts claim that iPhone’s analytics data is not anonymousExperts claim that iPhone’s analytics data is not anonymous

Experts claim that iPhone’s analytics data is not anonymous

Researchers discovered that analytics data associated with iPhone include Directory Services Identifier (DSID) that could allow identifying users. Researchers at…

2 years ago
China-based Fangxiao group behind a long-running phishing campaignChina-based Fangxiao group behind a long-running phishing campaign

China-based Fangxiao group behind a long-running phishing campaign

A China-based financially motivated group, tracked as Fangxiao, is behind a large-scale phishing campaign dating back as far as 2019. Researchers…

3 years ago
Beginning 2023 Google plans to rollout the initial Privacy Sandbox BetaBeginning 2023 Google plans to rollout the initial Privacy Sandbox Beta

Beginning 2023 Google plans to rollout the initial Privacy Sandbox Beta

Google announced it will roll out the Privacy Sandbox system for Android in beta to a limited number of Android…

3 years ago