Tag
#android
The "Code-on-Toast" supply chain cyberattacks by APT37 delivered data-stealing malware to users in South Korea who had enabled Toast pop-up ads.
Researchers at Microsoft discovered a new macOS vulnerability, “HM Surf” (CVE-2024-44133), which bypasses TCC protections, allowing unauthorized access…
Plus, a zero-day vulnerability in Qualcomm chips, exposed health care devices, and the latest on the Salt Typhoon threat actor.
Protect yourself from the ClickFix attack! Learn how cybercriminals are using fake Google Meet pages to trick users…
Discover DVa, a new tool that detects and removes malware exploiting accessibility features on Android devices. Learn how…
ESET Research found the Telekopye scam network targeting Booking.com and Airbnb. Scammers use phishing pages via compromised accounts…
New variants of an Android banking trojan called TrickMo have been found to harbor previously undocumented features to steal a device's unlock pattern or PIN. "This new addition enables the threat actor to operate on the device even while it is locked," Zimperium security researcher Aazim Yaswant said in an analysis published last week. First spotted in the wild in 2019, TrickMo is so named for
Octo2 malware is targeting Android devices by disguising itself as popular apps like NordVPN and Google Chrome. This…
Android GKI kernels contain broken non-upstream Speculative Page Faults MM code that can lead to use-after-free conditions.