Mobile

A Ukrainian Raccoon Infostealer operator is awaiting trial in the USA Ukrainian Raccoon Infostealer operator is awaiting trial in the US

A Ukrainian Raccoon Infostealer operator is awaiting trial in the US

The Raccoon Infostealer operator, Mark Sokolovsky, was extradited to the US from the Netherlands to appear in a US court.…

1 year ago
Google fixed an Android critical remote code execution flawGoogle fixed an Android critical remote code execution flaw

Google fixed an Android critical remote code execution flaw

Google released Android ’s February 2024 security patches to address 46 vulnerabilities, including a critical remote code execution issue. Google…

1 year ago
Black Basta gang claims the hack of the UK water utility Southern WaterBlack Basta gang claims the hack of the UK water utility Southern Water

Black Basta gang claims the hack of the UK water utility Southern Water

The Black Basta ransomware gang claimed to have hacked the UK water utility Southern Water, a major player in the…

1 year ago
iShutdown lightweight method allows to discover spyware infections on iPhonesiShutdown lightweight method allows to discover spyware infections on iPhones

iShutdown lightweight method allows to discover spyware infections on iPhones

Researchers devised a "lightweight method," called iShutdown, to determine whether Apple iOS devices have been infected with spyware. Cybersecurity researchers from Kaspersky…

1 year ago
MyEstatePoint Property Search Android app leaks user passwordsMyEstatePoint Property Search Android app leaks user passwords

MyEstatePoint Property Search Android app leaks user passwords

The MyEstatePoint Property Search app leaked data on nearly half a million of its users, exposing their names and plain-text…

2 years ago
Operation Triangulation attacks relied on an undocumented hardware featureOperation Triangulation attacks relied on an undocumented hardware feature

Operation Triangulation attacks relied on an undocumented hardware feature

Experts discovered that Operation Triangulation targeting Apple iOS devices leveraged an undocumented hardware feature. Researchers from the Russian cybersecurity firm Kaspersky…

2 years ago
Xamalicious Android malware distributed through the Play StoreXamalicious Android malware distributed through the Play Store

Xamalicious Android malware distributed through the Play Store

Researchers discovered a new Android malware dubbed Xamalicious that can take full control of the device and perform fraudulent actions.…

2 years ago
InfectedSlurs botnet targets QNAP VioStor NVR vulnerabilityInfectedSlurs botnet targets QNAP VioStor NVR vulnerability

InfectedSlurs botnet targets QNAP VioStor NVR vulnerability

The Mirai-based botnet InfectedSlurs was spotted targeting QNAP VioStor NVR (Network Video Recorder) devices. In November, Akamai warned of a…

2 years ago
Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malwareOperation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware

Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware

North Korea-linked APT group Lazarus was spotted exploiting Log4j vulnerabilities to deploy previously undocumented remote access trojans. The North Korea-linked…

2 years ago
Researcher discovered a new lock screen bypass bug for Android 14 and 13Researcher discovered a new lock screen bypass bug for Android 14 and 13

Researcher discovered a new lock screen bypass bug for Android 14 and 13

Researchers discovered a lock screen bypass bug in Android 14 and 13 that could expose sensitive data in users' Google…

2 years ago