Security
Headlines
HeadlinesLatestCVEs

Tag

#google

Malicious Apps Use Sneaky Versioning Technique to Bypass Google Play Store Scanners

Threat actors are leveraging a technique called versioning to evade Google Play Store's malware detections and target Android users. "Campaigns using versioning commonly target users' credentials, data, and finances," Google Cybersecurity Action Team (GCAT) said in its August 2023 Threat Horizons Report shared with The Hacker News. While versioning is not a new phenomenon, it's sneaky and hard

The Hacker News
#android#google#backdoor#auth#The Hacker News
New Version of Rilide Data Theft Malware Adapts to Chrome Extension Manifest V3

Cybersecurity researchers have discovered a new version of malware called Rilide that targets Chromium-based web browsers to steal sensitive data and steal cryptocurrency. "It exhibits a higher level of sophistication through modular design, code obfuscation, adoption to the Chrome Extension Manifest V3, and additional features such as the ability to exfiltrate stolen data to a Telegram channel

WebCoder CMS 1.0 SQL Injection

WebCoder CMS version 1.0 suffers from a remote SQL injection vulnerability.

WebCom CMS 1.0 SQL Injection

WebCom CMS version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

WebIncorp CMS 1.0 Cross Site Scripting

WebIncorp CMS version 1.0 suffers from a cross site scripting vulnerability.

WEBinsta Mailing Manager 1.3 Information Disclosure

WEBinsta Mailing Manager version 1.3 suffers from an information disclosure vulnerability.

How Malicious Android Apps Slip Into Disguise

Researchers say mobile malware purveyors have been abusing a bug in the Google Android platform that lets them sneak malicious code into benign mobile apps and evade security scanning tools. Google says it has updated its app malware detection mechanisms in response to the new research.

Phishing campaigns are using AMP URLs to avoid detection

Categories: Awareness Categories: News Tags: phishing Tags: amp Tags: url Tags: captcha Tags: redirection Researchers have found a new phishing tactic that uses Google Accelerated Mobile Pages (AMP) URLs to look trustworthy (Read more...) The post Phishing campaigns are using AMP URLs to avoid detection appeared first on Malwarebytes Labs.

CVE-2023-4070

Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)