Mobile

Brokewell Android malware supports an extensive set of Device Takeover capabilitiesBrokewell Android malware supports an extensive set of Device Takeover capabilities

Brokewell Android malware supports an extensive set of Device Takeover capabilities

ThreatFabric researchers identified a new Android malware called Brokewell, which implements a wide range of device takeover capabilities. ThreatFabric researchers…

1 year ago
Anatsa Android banking Trojan expands to Slovakia, Slovenia, and CzechiaAnatsa Android banking Trojan expands to Slovakia, Slovenia, and Czechia

Anatsa Android banking Trojan expands to Slovakia, Slovenia, and Czechia

The Android banking trojan Anatsa resurged expanding its operation to new countries, including Slovakia, Slovenia, and Czechia. In November 2023, researchers…

1 year ago
A Ukrainian Raccoon Infostealer operator is awaiting trial in the USA Ukrainian Raccoon Infostealer operator is awaiting trial in the US

A Ukrainian Raccoon Infostealer operator is awaiting trial in the US

The Raccoon Infostealer operator, Mark Sokolovsky, was extradited to the US from the Netherlands to appear in a US court.…

1 year ago
Google fixed an Android critical remote code execution flawGoogle fixed an Android critical remote code execution flaw

Google fixed an Android critical remote code execution flaw

Google released Android ’s February 2024 security patches to address 46 vulnerabilities, including a critical remote code execution issue. Google…

1 year ago
Black Basta gang claims the hack of the UK water utility Southern WaterBlack Basta gang claims the hack of the UK water utility Southern Water

Black Basta gang claims the hack of the UK water utility Southern Water

The Black Basta ransomware gang claimed to have hacked the UK water utility Southern Water, a major player in the…

2 years ago
iShutdown lightweight method allows to discover spyware infections on iPhonesiShutdown lightweight method allows to discover spyware infections on iPhones

iShutdown lightweight method allows to discover spyware infections on iPhones

Researchers devised a "lightweight method," called iShutdown, to determine whether Apple iOS devices have been infected with spyware. Cybersecurity researchers from Kaspersky…

2 years ago
MyEstatePoint Property Search Android app leaks user passwordsMyEstatePoint Property Search Android app leaks user passwords

MyEstatePoint Property Search Android app leaks user passwords

The MyEstatePoint Property Search app leaked data on nearly half a million of its users, exposing their names and plain-text…

2 years ago
Operation Triangulation attacks relied on an undocumented hardware featureOperation Triangulation attacks relied on an undocumented hardware feature

Operation Triangulation attacks relied on an undocumented hardware feature

Experts discovered that Operation Triangulation targeting Apple iOS devices leveraged an undocumented hardware feature. Researchers from the Russian cybersecurity firm Kaspersky…

2 years ago
Xamalicious Android malware distributed through the Play StoreXamalicious Android malware distributed through the Play Store

Xamalicious Android malware distributed through the Play Store

Researchers discovered a new Android malware dubbed Xamalicious that can take full control of the device and perform fraudulent actions.…

2 years ago
InfectedSlurs botnet targets QNAP VioStor NVR vulnerabilityInfectedSlurs botnet targets QNAP VioStor NVR vulnerability

InfectedSlurs botnet targets QNAP VioStor NVR vulnerability

The Mirai-based botnet InfectedSlurs was spotted targeting QNAP VioStor NVR (Network Video Recorder) devices. In November, Akamai warned of a…

2 years ago