What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
GoogleSec.webp 2024-12-05 12:53:25 Announcing the launch of Vanir: Open-source Security Patch Validation (lien direct) Posted by Hyunwook Baek, Duy Truong, Justin Dunlap and Lauren Stan from Android Security and Privacy, and Oliver Chang from the Google Open Source Security TeamToday, we are announcing the availability of Vanir, a new open-source security patch validation tool. Introduced at Android Bootcamp in April, Vanir gives Android platform developers the power to quickly and efficiently scan their custom platform code for missing security patches and identify applicable available patches. Vanir significantly accelerates patch validation by automating this process, allowing OEMs to ensure devices are protected with critical security updates much faster than traditional methods. This strengthens the security of the Android ecosystem, helping to keep Android users around the world safe. By open-sourcing Vanir, we aim to empower the broader security community to contribute to and benefit from this tool, enabling wider adoption and ultimately improving security across various ecosystems. While initially designed for Android, Vanir can be easily adapted to other ecosystems with relatively small modifications, making it a versatile tool for enhancing software security across the board. In collaboration with the Google Open Source Security Team, we have incorporated feedback from our early adopters to improve Vanir and make it more useful for security professionals. This tool is now available for you to start developing on top of, and integrating into, your systems.The need for VanirThe Android ecosystem relies on a multi-stage process for vulnerability mitigation. When a new vulnerability is discovered, upstream AOSP developers create and release upstream patches. The downstream device and chip manufacturers then assess the impact on their specific devices and backport the necessary fixes. This process, while effective, can present scalability challenges, especially for manufacturers managing a diverse range of devices and old models with complex update histories. Managing patch coverage across diverse and customized devices often requires considerable effort due to the manual nature of backporting.To streamline the vital security workflow, we developed Vanir. Vanir provides a scalable and sustainable solution for security patch adoption and validation, helping to ensure Android devices receive timely protection against potential threats. Tool Vulnerability Mobile ★★★
bleepingcomputer.webp 2024-12-05 12:17:25 New Android spyware found on phone seized by Russian FSB (lien direct) After a Russian programmer was detained by Russia\'s Federal Security Service (FSB) for fifteen days and his phone confiscated, it was discovered that a new spyware was secretly installed on his device upon its return. [...]
After a Russian programmer was detained by Russia\'s Federal Security Service (FSB) for fifteen days and his phone confiscated, it was discovered that a new spyware was secretly installed on his device upon its return. [...]
Mobile ★★★
globalsecuritymag.webp 2024-12-05 11:55:45 Vigilance.fr - Google Android | Pixel: multiple vulnerabilities of March 2024, analyzed on 05/03/2024 (lien direct) An attacker can use several vulnerabilities of Google Android | Pixel. - Security Vulnerability
An attacker can use several vulnerabilities of Google Android | Pixel. - Security Vulnerability
Vulnerability Mobile ★★
globalsecuritymag.webp 2024-12-05 11:55:45 Vigilance.fr - Google Android | Pixel : multiples vulnérabilités de mars 2024, analysé le 05/03/2024 (lien direct) Un attaquant peut employer plusieurs vulnérabilités de Google Android | Pixel. - Vulnérabilités
Un attaquant peut employer plusieurs vulnérabilités de Google Android | Pixel. - Vulnérabilités
Mobile ★★
TrendMicro.webp 2024-12-05 00:00:00 MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur\\'s Multi-Platform Attacks (lien direct) Trend Micro\'s monitoring of the MOONSHINE exploit kit revealed how it\'s used by the threat actor Earth Minotaur to exploit Android messaging app vulnerabilities and install the DarkNimbus backdoor for surveillance.
Trend Micro\'s monitoring of the MOONSHINE exploit kit revealed how it\'s used by the threat actor Earth Minotaur to exploit Android messaging app vulnerabilities and install the DarkNimbus backdoor for surveillance.
Vulnerability Threat Mobile Prediction ★★
DarkReading.webp 2024-12-04 20:06:00 Pegasus Spyware Infections Proliferate Across iOS, Android Devices (lien direct) The notorious spyware from Israel\'s NSO Group has been found targeting journalists, government officials, and corporate executives in multiple variants discovered in a threat scan of 3,500 mobile phones.
The notorious spyware from Israel\'s NSO Group has been found targeting journalists, government officials, and corporate executives in multiple variants discovered in a threat scan of 3,500 mobile phones.
Threat Mobile ★★
ZDNet.webp 2024-12-04 18:20:30 Finally, my search for the best cheap Android tablet is over, and now it\\'s $70 off (lien direct) The Blackview Tab 18 has everything you want in a tablet: a big display, a solid battery, and lots of memory. Even after Cyber Monday, Blackview is offering a 21% price drop.
The Blackview Tab 18 has everything you want in a tablet: a big display, a solid battery, and lots of memory. Even after Cyber Monday, Blackview is offering a 21% price drop.
Mobile
ZDNet.webp 2024-12-04 16:14:00 I use this budget tablet more than my iPad Pro - and it\\'s still $60 off after Cyber Monday (lien direct) This Blackview Tab 90 is the mobile entertainment device most people should buy following Cyber Week, especially since it\'s still on sale for $169.
This Blackview Tab 90 is the mobile entertainment device most people should buy following Cyber Week, especially since it\'s still on sale for $169.
Mobile
WiredThreatLevel.webp 2024-12-04 14:00:00 A New Phone Scanner That Detects Spyware Has Already Found 7 Pegasus Infections (lien direct) The mobile device security firm iVerify has been offering a tool since May that makes spyware scanning accessible to anyone-and it\'s already turning up victims.
The mobile device security firm iVerify has been offering a tool since May that makes spyware scanning accessible to anyone-and it\'s already turning up victims.
Tool Mobile ★★★
bleepingcomputer.webp 2024-12-04 13:26:24 New DroidBot Android malware targets 77 banking, crypto apps (lien direct) A new Android banking malware named \'DroidBot\' attempts to steal credentials for over 77 cryptocurrency exchanges and banking apps in the UK, Italy, France, Spain, and Portugal. [...]
A new Android banking malware named \'DroidBot\' attempts to steal credentials for over 77 cryptocurrency exchanges and banking apps in the UK, Italy, France, Spain, and Portugal. [...]
Malware Mobile ★★★
ZDNet.webp 2024-12-03 21:35:00 (Déjà vu) You can still buy these iPhone 16 models for one cent on Amazon after Cyber Monday - but act fast (lien direct) It might be one of those \'too good to be true\' offers for most people, but the right customer can realize the one-cent iPhone dream with this Boost Mobile promo.
It might be one of those \'too good to be true\' offers for most people, but the right customer can realize the one-cent iPhone dream with this Boost Mobile promo.
Mobile
InfoSecurityMag.webp 2024-12-03 18:00:00 French Mobile Operators Join Forces to Tackle Rising Fraud (lien direct) France\'s four leading mobile operators, Bouygues, Free, Orange and SFR, have taken steps to combat mobile fraud as part of the GSMA Open Gateway initiative
France\'s four leading mobile operators, Bouygues, Free, Orange and SFR, have taken steps to combat mobile fraud as part of the GSMA Open Gateway initiative
Mobile ★★★
ZDNet.webp 2024-12-03 16:46:07 The 25+ Best Buy Cyber Monday 2024 deals still available: Save big on TVs, laptops, and more (lien direct) Some Cyber Monday sales are still live, but ending soon. Hurry to get the biggest deals on home entertainment, mobile, audio, and more.
Some Cyber Monday sales are still live, but ending soon. Hurry to get the biggest deals on home entertainment, mobile, audio, and more.
Mobile
ZDNet.webp 2024-12-03 14:29:00 (Déjà vu) The best Verizon Cyber Monday deals 2024: Last chance sales on iPhone, Samsung Galaxy, more (lien direct) Cyber Monday is done and dusted, but I\'ve curated the best Verizon deals still available for popular phones, tablets, smartwatches, and more.
Cyber Monday is done and dusted, but I\'ve curated the best Verizon deals still available for popular phones, tablets, smartwatches, and more.
Mobile
ZDNet.webp 2024-12-03 14:19:00 The 30+ best Cyber Monday 2024 phone deals still live: Final sales on iPhones and Android (lien direct) Cyber Monday is over, but we found the best phone deals still live across major retailers and carriers - save big on iPhone, Samsung Galaxy, Google Pixel, and more.
Cyber Monday is over, but we found the best phone deals still live across major retailers and carriers - save big on iPhone, Samsung Galaxy, Google Pixel, and more.
Mobile
globalsecuritymag.webp 2024-12-03 13:36:34 Multiples vulnérabilités dans Google Android (03 décembre 2024) (lien direct) De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d\'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un problème de sécurité non spécifié par l\'éditeur. - Vulnérabilités
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d\'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un problème de sécurité non spécifié par l\'éditeur. - Vulnérabilités
Mobile ★★
ProofPoint.webp 2024-12-03 12:31:21 The Rise of MMS Scams: A Picture Is Worth a 1,000 Words-and Sometimes That\\'s Not Good (lien direct) Reports of messaging abuse and smishing continue to increase at a rapid pace. Since the beginning of May, reports of U.S.-based abusive messages have grown by 39%, and Proofpoint threat engineers are observing a significant increase in one specific subtype. Reported MMS (multimedia messaging service) abuse has increased by 220% over the same period. These messages use images and/or graphics to trick subscribers into providing confidential information or entice them into falling for other scams.  MMS-based abuse represents a burgeoning attack vector. In the past 18 months, subscriber reports of unwanted MMS messages have grown from far less than 1% of all reports in January 2023 to more than 21% in October of this year. Since January of this year, reports of unwanted MMS messages have grown by a staggering 429%.  What is MMS, and how is it abused?  MMS is built on the same technology as SMS (short messaging service) and allows mobile subscribers to send and receive pictures, audio and video content. Today in the United States, subscribers often use MMS without even realizing it. We often combine SMS and MMS and simply call it “mobile messaging.”  We have written in the past regarding how quickly users read and respond to mobile messages.  Typically, mobile messages are read and replied to within three minutes, which is why mobile marketing works so well. Threat actors are now starting to embed images to add a level of perceived authenticity to their scams as they impersonate businesses, public or governmental representatives, or otherwise entice subscribers to fall for scams.    Examples of MMS scams  Imaging impersonation and abuse comes in a variety of types. The following are just a few examples of some recently observed scams.  MMS message impersonating Jerome Powell of the Federal Reserve Bank.  MMS message impersonating FedEx and an official-looking waiver document.  MMS message impersonating PayPal and an official-looking purchase verification.  MMS message with pictures of a check with scam instructions.  Smart devices are ubiquitous in the U.S., with more than 90% of Americans using an intelligent device capable of both sending and receiving images. Proofpoint threat analysts have witnessed similar image impersonation and scams in over-the-top (OTT) messaging platforms as well, such as WhatsApp and Line. Proofpoint is continuously enhancing threat detection and protection solutions to protect against evolving threats including those emerging in MMS.  Tips for avoiding MMS scams  We often remind users to be suspicious of mobile messages and to follow the “do\'s and don\'ts” below.  It\'s also very important to remain suspicious of messages that have authentic looking images. Just because the message includes an image or picture, that doesn\'t mean it\'s legitimate or that it was sent by a legitimate source.  Do\'s   Be on the lookout for suspicious mobile messages. Criminals increasingly employ mobile messaging and smishing as an attack vector.  Carefully consider before you provide your mobile phone number to an unknown entity.  Whenever you receive a mobile message that contains a URL (web link), including a political message, do not click on the URL. Instead, use your device\'s browser to access the known sender\'s website directly. Or use the brand\'s app, if it\'s installed on your device.    Report unwanted messaging (spam) and smishing to your mobile network operator (service provider) and the Mobile Abuse Visibility Solution run by Proofpoint. To do this, make use of the built-in iOS and Android reporting features by clicking “Report Junk” on iOS or “Report Spam” on Android devices. If this simplified reporting capability is not available, you can forward the unwanted/spam text messages to 7726 which spells “SPAM” on the phone keypad. These reports help the mobile network operator and Proofpoint protect other subscribers from abusive c Spam Threat Mobile Commercial FedEx ★★
ZDNet.webp 2024-12-03 02:17:00 (Déjà vu) Last chance: One of the best Android smartwatches I\\'ve tested is 26% off for Cyber Monday (lien direct) The OnePlus Watch 2R offers a sharp design and marathon battery life at a steep discount as Cyber Monday ends.
The OnePlus Watch 2R offers a sharp design and marathon battery life at a steep discount as Cyber Monday ends.
Mobile
ZDNet.webp 2024-12-02 22:06:48 One of the best Android smartwatches I\\'ve tested is 26% off for Cyber Monday (lien direct) The OnePlus Watch 2R offers a sharp design and marathon battery life at a competitive, discounted price for Cyber Monday.
The OnePlus Watch 2R offers a sharp design and marathon battery life at a competitive, discounted price for Cyber Monday.
Mobile
ZDNet.webp 2024-12-02 21:21:35 One of the best cheap Android phones I\\'ve tested isn\\'t a Samsung or TCL - and it\\'s on sale for $80 (lien direct) Not everyone needs a $1,000 phone​. If you\'re on a tight budget, the NUU N10 is an impressive handset that won\'t break the bank, especially with this Cyber Monday deal.
Not everyone needs a $1,000 phone​. If you\'re on a tight budget, the NUU N10 is an impressive handset that won\'t break the bank, especially with this Cyber Monday deal.
Mobile
ZDNet.webp 2024-12-02 21:18:59 The Apple AirTag 4-Pack is $70 - A historically low price for Cyber Monday (lien direct) If you\'re an iPhone user, you could probably use these trackers to monitor your keys, wallet, luggage, and more, especially with this rare $29 discount through Cyber Monday.
If you\'re an iPhone user, you could probably use these trackers to monitor your keys, wallet, luggage, and more, especially with this rare $29 discount through Cyber Monday.
Mobile
CS.webp 2024-12-02 21:14:41 Small number of vulnerabilities patched in last Android security update of 2024 (lien direct) None of the patched bugs were considered critical.
None of the patched bugs were considered critical.
Vulnerability Mobile ★★
TechWorm.webp 2024-12-02 20:25:02 SpyLoan Malware Hits 8 Million Android Users (lien direct) Security researchers at McAfee Labs have identified 15 malicious Android apps that contain malware known as \'SpyLoan\'. These apps have been downloaded over 8 million times from the Google Play Store. These predatory loan apps disguise themselves as legitimate financial services, luring unsuspecting users into downloading them. They are targeting users primarily in South America, Southeast Asia, and Africa, with some of them being promoted through deceptive social media advertising. “These PUP (potentially unwanted programs) applications use social engineering tactics to trick users into providing sensitive information and granting extra mobile app permissions, which can lead to extortion, harassment, and financial loss,” security researcher Fernando Ruiz wrote in a blog post published last week. According to the security software company, the 15 SpyLoan apps operate using a shared framework designed to encrypt and exfiltrate sensitive data from a victim\'s device to a command and control (C2) server, indicating that the same developer or group of cybercriminals is behind all of them. SpyLoan apps masquerade as legitimate loan providers under deceptive names and logos, creating a false sense of trust. These apps pose as genuine loan services, promising instant credit with minimal requirements to unsuspecting users in Mexico, Colombia, Senegal, Thailand, Indonesia, Vietnam, Tanzania, Peru, and Chile. Once a user registers for the service, these apps use a one-time password (OTP) to ensure they have a phone number from the targeted region. The users are then prompted to provide supplementary identification documents and personal information, banking accounts, employee information, and device data that are subsequently exfiltrated from the victims to the C2 server in an encrypted format. However, these apps secretly collect sensitive data, including contacts, call logs, and SMS messages, under the pretense of processing loans. They also employ aggressive tactics, such as demanding additional mobile app permissions and intimidating users with threatening messages or calls, including death threats. Once the loan is disbursed, users often find themselves trapped in high-interest repayment schemes. The operators misuse the stolen phone data to harass and blackmail borrowers, often contacting family members to pressure repayment. According to McAfee Labs, malicious SpyLoan apps and unique infected devices have increased by over 75% from the end of Q2 to the end of Q3 2024. 5 of these apps are still available for download on the official app store, as they have reportedly made adjustments to align with Google Play policies. To mitigate the risks posed by such apps, it is advisable to read app permissions carefully, read app reviews to see if any issues have been reported, avoid downloading apps from third-party marketplaces, check the legitimacy of the application publisher before downloading them, and install and update security software. “The threat of Android apps like SpyLoan is a global issue that exploits users’ trust and financial desperation. Despite law enforcement actions to capture multiple groups linked to the operation of SpyLoan apps, new operators and cybercriminals continue to exploit these fraud activities,” Ruiz said. “SpyLoan apps operate with similar code at app and C2 level across different continents. This suggests the presence of a common developer or a shared framework that is being sold to cybercriminals. This modular approach allows these developers to quickly distribute malicious apps tailored to various markets, exploiting local vulnerabilities while maintaining a consistent model for scamming users.”
Security researcher
Malware Vulnerability Threat Legislation Mobile ★★
ZDNet.webp 2024-12-02 19:02:00 This Android smartwatch made me consider switching to Google Pixel - and it\\'s on sale for Cyber Monday (lien direct) The latest Google Pixel Watch 3 is bigger, better, more connected, and still a beautiful wearable. It\'s on sale for Cyber Monday.
The latest Google Pixel Watch 3 is bigger, better, more connected, and still a beautiful wearable. It\'s on sale for Cyber Monday.
Mobile
ZDNet.webp 2024-12-02 18:26:46 One of the best cheap Android phones I\\'ve tested has a unique look (and now it\\'s 55% off) (lien direct) The X6 Phantom keeps costs low with a stock Android loadout, surprising durability, and an interesting thermometer feature. It\'s currently only $194 for Cyber Monday.
The X6 Phantom keeps costs low with a stock Android loadout, surprising durability, and an interesting thermometer feature. It\'s currently only $194 for Cyber Monday.
Mobile
ZDNet.webp 2024-12-02 18:15:24 The most durable Android phone I\\'ve tested has a marathon battery (and now it\\'s $75 off) (lien direct) If you need a handset that laughs in the face of inclement weather, the Doogee V Max Plus is for you. And right now, it\'s on sale for $424 during Cyber Monday.
If you need a handset that laughs in the face of inclement weather, the Doogee V Max Plus is for you. And right now, it\'s on sale for $424 during Cyber Monday.
Mobile
ZDNet.webp 2024-12-02 17:43:00 (Déjà vu) The best Verizon Cyber Monday deals 2024: iPhone, Samsung Galaxy, and online promotions (lien direct) Cyber Monday has kicked off, and I\'ve curated the best Verizon deals on popular phones, tablets, smartwatches, and more.
Cyber Monday has kicked off, and I\'ve curated the best Verizon deals on popular phones, tablets, smartwatches, and more.
Mobile
ZDNet.webp 2024-12-02 17:15:15 One of the most durable Android phones I\\'ve tested just hit its lowest price for Cyber Monday (lien direct) The Doogee S200 has a quad-core processor, a 20-day battery (on standby), and even a 100-megapixel camera. Right now, it\'s on sale for 21% off.
The Doogee S200 has a quad-core processor, a 20-day battery (on standby), and even a 100-megapixel camera. Right now, it\'s on sale for 21% off.
Mobile
ZDNet.webp 2024-12-02 16:41:50 The budget Android tablet I recommend to most people is 26% off with this Cyber Monday deal (lien direct) The Blackview Tab 18 has everything you want in a tablet: a big display, a solid battery, and lots of memory. For Cyber Monday, the device gets a nice price drop.
The Blackview Tab 18 has everything you want in a tablet: a big display, a solid battery, and lots of memory. For Cyber Monday, the device gets a nice price drop.
Mobile
ZDNet.webp 2024-12-02 15:58:07 This touchscreen display adds Apple CarPlay or Android Auto to any car - and it\\'s on sale for Cyber Monday (lien direct) Upgrade your car\'s info system with this 10-inch car display, which is 50% off right now for Cyber Monday.
Upgrade your car\'s info system with this 10-inch car display, which is 50% off right now for Cyber Monday.
Mobile
ZDNet.webp 2024-12-02 15:40:00 I finally found a wireless Android Auto adapter that\\'s reliable and affordable - and it\\'s in stock again (lien direct) The AAWireless Two won\'t charm you with a ground-breaking industrial design or an edgy name, but it\'s as good as these adapters get - and back in stock for Cyber Monday.
The AAWireless Two won\'t charm you with a ground-breaking industrial design or an edgy name, but it\'s as good as these adapters get - and back in stock for Cyber Monday.
Mobile Industrial
ZDNet.webp 2024-12-02 15:38:41 I use this cheap tablet more than my iPad Pro - and it\\'s over 30% off for Cyber Monday (lien direct) This Blackview Tab 90 is the mobile entertainment device most people should buy on Cyber Monday, based on my testing experience.
This Blackview Tab 90 is the mobile entertainment device most people should buy on Cyber Monday, based on my testing experience.
Mobile
The_Hackers_News.webp 2024-12-02 15:16:00 8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play (lien direct) Over a dozen malicious Android apps identified on the Google Play Store that have been collectively downloaded over 8 million times contain malware known as SpyLoan, according to new findings from McAfee Labs. "These PUP (potentially unwanted programs) applications use social engineering tactics to trick users into providing sensitive information and granting extra mobile app permissions, which
Over a dozen malicious Android apps identified on the Google Play Store that have been collectively downloaded over 8 million times contain malware known as SpyLoan, according to new findings from McAfee Labs. "These PUP (potentially unwanted programs) applications use social engineering tactics to trick users into providing sensitive information and granting extra mobile app permissions, which
Malware Mobile ★★
WiredThreatLevel.webp 2024-12-02 12:58:23 The Apple AirPods Pro Are (Still) the Cheapest We\\'ve Ever Seen (lien direct) Need wireless earbuds? This Cyber Monday deal on the AirPods Pro is going strong, and they\'re the best earbuds for the iPhone.
Need wireless earbuds? This Cyber Monday deal on the AirPods Pro is going strong, and they\'re the best earbuds for the iPhone.
Mobile
WiredThreatLevel.webp 2024-12-02 12:44:00 Best Cyber Monday Phone Deals (2024), Including Cases Too (lien direct) Need a smartphone? These Cyber Monday deals are the best we\'ve seen all year on Android phones, accessories, and even iPhones.
Need a smartphone? These Cyber Monday deals are the best we\'ve seen all year on Android phones, accessories, and even iPhones.
Mobile
RiskIQ.webp 2024-12-02 12:13:17 Weekly OSINT Highlights, 2 December 2024 (lien direct) ## Snapshot Last week\'s OSINT reporting highlights the sophistication and diversity of cyber threat campaigns, emphasizing advanced techniques, varied attack vectors, and strategic targeting. Key themes include ransomware operations like Elpaco and CyberVolk, leveraging advanced encryption and Ransomware-as-a-Service models, and phishing campaigns such as Rockstar 2FA and SVG-based malware distribution showcasing innovative tactics to bypass MFA and exploit image formats. Attack vectors spanned vulnerabilities like Zerologon and CVE-2023-28461, legitimate tools like Atera, and novel methods like Wi-Fi proximity attacks. Threat actors ranged from state-sponsored groups to financially motivated cybercriminals and hacktivists. The targets reflected global geopolitical and economic stakes, focusing on public sectors, critical infrastructure, and high-value industries across Europe, the US, and Asia, reinforcing the importance of proactive threat intelligence and mitigation strategies. ## Description 1. [BianLian\'s Shift to Data Extortion](https://sip.security.microsoft.com/intel-explorer/articles/c958d17f): The BianLian ransomware group has transitioned from file encryption to data theft extortion, leveraging tactics like privilege escalation, SOCKS5 tunneling, and customized PowerShell scripts. Active since 2022, the group targets sectors like healthcare and airlines, using techniques such as ProxyShell exploitation and calling employees to pressure ransom payments. 1. [BYOVD Campaign Exploiting Avast Driver](https://sip.security.microsoft.com/intel-explorer/articles/75844a3f): Trellix researchers discovered malware leveraging the Bring-Your-Own-Vulnerable-Driver (BYOVD) technique with Avast\'s outdated anti-rootkit driver to bypass tamper protections. The malware terminates security processes using kernel-level privileges, posing significant risks to organizations relying on antivirus and EDR solutions. 1. [SpyLoan Apps Targeting Global Users](https://sip.security.microsoft.com/intel-explorer/articles/ddc51ef9): McAfee Labs reported a surge in SpyLoan apps on Android devices, exploiting users in South America, Asia, and Africa through predatory practices. These apps harvest sensitive data, extort victims, and misuse permissions, leading to financial fraud and harassment. 1. [Exploitation of CVE-2023-28461](https://sip.security.microsoft.com/intel-explorer/articles/4d4a4d34): CISA flagged CVE-2023-28461, a vulnerability in Array Networks\' ArrayOS, as actively exploited and mandated remediation by December 2024. Exploited due to improper authentication, the vulnerability threatens both federal and non-federal organizations. 1. [Hexon Stealer Targets Discord Users](https://sip.security.microsoft.com/intel-explorer/articles/19796350): CYFIRMA linked Hexon Stealer, a rebranded version of Stealit Stealer, to credential theft and cryptocurrency wallet exfiltration. Built with the Electron framework, the malware injects malicious code into Discord, enabling full system control for attackers. 1. [North Korean IT Worker Front Companies](https://sip.security.microsoft.com/intel-explorer/articles/d3dd2b00): SentinelLabs uncovered DPRK\'s use of fake tech companies impersonating U.S. brands to secure global contracts and fund state programs. These front companies route payments through shadow banking systems and cryptocurrencies, supporting activities like weapons development. 1. [Elpaco Ransomware Campaign](https://sip.security.microsoft.com/intel-explorer/articles/73371539): Kaspersky reported the Elpaco ransomware, a variant of Mimic, exploiting RDP brute force and Zerologon (CVE-2020-1472) for privilege escalation. The attacks, targeting various global industries, employ advanced encryption techniques and file discovery methods, rendering files unrecoverable without the private key. 1. [CyberVolk Ransomware Operations](https://sip.security.microsoft.com/intel-explorer/articles/db8b4022): CyberVolk, a pro-Russian hacktivist group, has deployed ransomware like Hexa Ransomware Malware Tool Vulnerability Threat Mobile Medical ★★
Chercheur.webp 2024-12-02 12:08:40 Details about the iOS Inactivity Reboot Feature (lien direct) I recently wrote about the new iOS feature that forces an iPhone to reboot after it’s been inactive for a longish period of time. Here are the technical details, discovered through reverse engineering. The feature triggers after seventy-two hours of inactivity, even it is remains connected to Wi-Fi.
I recently wrote about the new iOS feature that forces an iPhone to reboot after it’s been inactive for a longish period of time. Here are the technical details, discovered through reverse engineering. The feature triggers after seventy-two hours of inactivity, even it is remains connected to Wi-Fi.
Mobile ★★
ZDNet.webp 2024-12-02 09:57:00 Give your iPhone 16 thermal camera superpowers with this gadget (get 23% off in this Cyber Monday deal) (lien direct) Apple won\'t add a thermal camera to the iPhone, but now you can!
Apple won\'t add a thermal camera to the iPhone, but now you can!
Mobile
The_State_of_Security.webp 2024-12-02 04:17:51 Cyber-Safe Shopping: Protect Yourself from Holiday Scams and Cyber Threats (lien direct) The holiday shopping season is here, and while it brings excitement and joy, it also opens opportunities for cybercriminals to exploit unsuspecting shoppers. With more people buying gifts online and taking advantage of holiday deals, the risk of falling victim to cyberattacks increases. Whether you\'re shopping from your desktop, mobile device, or in-store, it\'s essential to be aware of common threats and take steps to protect yourself. Here\'s a guide on how to stay safe while you enjoy the holiday shopping season: Beware of Phishing Scams Phishing scams are one of the most common ways to steal...
The holiday shopping season is here, and while it brings excitement and joy, it also opens opportunities for cybercriminals to exploit unsuspecting shoppers. With more people buying gifts online and taking advantage of holiday deals, the risk of falling victim to cyberattacks increases. Whether you\'re shopping from your desktop, mobile device, or in-store, it\'s essential to be aware of common threats and take steps to protect yourself. Here\'s a guide on how to stay safe while you enjoy the holiday shopping season: Beware of Phishing Scams Phishing scams are one of the most common ways to steal...
Threat Mobile ★★
no_ico.webp 2024-12-02 04:17:47 SpyLoan Apps: The New Face of Financial Exploitation (lien direct) The McAfee mobile research team has identified a significant global rise in predatory loan applications, commonly referred to as SpyLoan apps, which primarily target Android users. These applications, classified as potentially unwanted programs (PUP), utilize social engineering tactics to manipulate users into sharing sensitive information and granting excessive permissions, leading to extortion, harassment, and financial losses. [...]
The McAfee mobile research team has identified a significant global rise in predatory loan applications, commonly referred to as SpyLoan apps, which primarily target Android users. These applications, classified as potentially unwanted programs (PUP), utilize social engineering tactics to manipulate users into sharing sensitive information and granting excessive permissions, leading to extortion, harassment, and financial losses. [...]
Mobile ★★★
ZDNet.webp 2024-12-02 00:54:00 This thermal camera is my new favorite smartphone accessory (and it\\'s on sale for Cyber Week) (lien direct) Thermal cameras are infinitely useful, and this one from Thermal Master would be a fantastic addition to any Android user\'s toolkit. For Cyber Monday, Amazon reduced the price and is offering a coupon.
Thermal cameras are infinitely useful, and this one from Thermal Master would be a fantastic addition to any Android user\'s toolkit. For Cyber Monday, Amazon reduced the price and is offering a coupon.
Mobile
ZDNet.webp 2024-12-02 00:00:00 The Pixel 8 is still a sweet Android phone and has been given a new low price for Cyber Monday (lien direct) With all eyes on Google\'s newest smartphone - the Pixel 9 - last year\'s model is seeing big discounts. The Pixel 8 still has some impressive specs and a new base price.
With all eyes on Google\'s newest smartphone - the Pixel 9 - last year\'s model is seeing big discounts. The Pixel 8 still has some impressive specs and a new base price.
Mobile
ZDNet.webp 2024-12-01 19:56:37 The best Cyber Monday Verizon deals 2024: iPhone, Samsung Galaxy, and internet sales (lien direct) Cyber Monday is hours away, and I\'ve curated the best Verizon deals on popular phones, tablets, smartwatches, and more.
Cyber Monday is hours away, and I\'ve curated the best Verizon deals on popular phones, tablets, smartwatches, and more.
Mobile
ZDNet.webp 2024-12-01 19:02:23 The 45+ best Cyber Monday 2024 phone deals: Save big on iPhones, Samsung, and more (lien direct) Several Black Friday phone deals are still live, and Cyber Monday deals are just getting started -- don\'t miss out on major savings on the iPhone 16, Samsung Galaxy S24 Ultra, and far more.
Several Black Friday phone deals are still live, and Cyber Monday deals are just getting started -- don\'t miss out on major savings on the iPhone 16, Samsung Galaxy S24 Ultra, and far more.
Mobile
ZDNet.webp 2024-12-01 17:46:17 I found the only iPhone 16 model on sale for one cent on Amazon ahead of Cyber Monday (lien direct) It might be one of those \'too good to be true\' offers for most people, but the right customer can realize the one-cent iPhone dream with this Boost Mobile promo. But grab it fast: this Cyber Monday deal won\'t be around for long.
It might be one of those \'too good to be true\' offers for most people, but the right customer can realize the one-cent iPhone dream with this Boost Mobile promo. But grab it fast: this Cyber Monday deal won\'t be around for long.
Mobile
ZDNet.webp 2024-12-01 17:00:15 Gift 3 months of Xbox Game Pass Ultimate for 28% off with this Cyber Monday deal (lien direct) Try or gift Xbox Game Pass for three months for nearly one-third off and play over 100 games including Starfield, Forza Motorsport, and Football Manager 2024 on your Xbox, PC, or mobile device.
Try or gift Xbox Game Pass for three months for nearly one-third off and play over 100 games including Starfield, Forza Motorsport, and Football Manager 2024 on your Xbox, PC, or mobile device.
Mobile
RedTeam.pl.webp 2024-12-01 15:51:25 BadWPAD, DNS suffix and wpad.pl / wpadblocking.com case (lien direct) Quoting resolv.conf (Linux) man page for “search” option: “Search list for host-name lookup. The search list is normally determined from the local domain name; by default, it contains only the local domain name. This may be changed by listing the desired domain search path following the search keyword with spaces or tabs separating the names. Resolver queries having fewer than ndots dots (default is 1) in them will be attempted using each component of the search path in turn until a match is found. For environments with multiple subdomains please read options ndots:n below to avoid man-in-the-middle attacks and unnecessary traffic for the root-dns-servers. Note that this process may be slow and will generate a lot of network traffic if the servers for the listed domains are not local, and that queries will timeout if no server is available for one of the domains”. In short it means that when we will use “search pl" and visit http://redteam/ the resolver will first try http://redteam.pl/. This option is the same as “dns-search pl” in /etc/network/interfaces (Linux). In Windows this option is called DNS suffix and also works identical. Such DNS suffix configuration is retrieved by the client from DHCP, but can also be (manually) modified on each system. Threat Mobile ★★★
ZDNet.webp 2024-12-01 00:55:39 This Anker mini power bank makes the perfect stocking stuffer, and it\\'s still on sale for $16 (lien direct) Anker\'s Nano Power Bank makes charging your iPhone or Android device effortless, and it\'s on sale for Cyber Monday at Amazon.
Anker\'s Nano Power Bank makes charging your iPhone or Android device effortless, and it\'s on sale for Cyber Monday at Amazon.
Mobile
bleepingcomputer.webp 2024-11-30 10:11:21 SpyLoan Android malware on Google play installed 8 million times (lien direct) A new set of 15 SpyLoan apps with over 8 million installs was discovered on Google Play, targeting primarily users from South America, Southeast Asia, and Africa. [...]
A new set of 15 SpyLoan apps with over 8 million installs was discovered on Google Play, targeting primarily users from South America, Southeast Asia, and Africa. [...]
Malware Mobile
globalsecuritymag.webp 2024-11-29 16:31:19 Wie man Videospiel-Engines für Hacking missbraucht (lien direct) Check Point Software Technologies Ltd (NASDAQ: CHKP), ein Pionier und weltweit führender Anbieter von Cyber-Sicherheitslösungen, kam einer neuen Hacker-Masche auf die Spur. Mithilfe der Gaming Engine Godot Engine können Cyber-Kriminelle verschiedene Betriebssysteme von vernetzten Geräten attackieren, darunter Windows, macOS, Linux, Android und iOS. Verbreitet wird der schädliche Code von dem Malware-Netzwerk Stargazers Ghost Network, die Check Point vor einigen Monaten untersucht hatte, über die Open-Source-Plattform GitHub. In drei Monaten wurden über 17 000 Geräte infiziert. Die Auswirkung kann möglicherweise über 1,2 Millionen von Nutzern erstellte Videospiele betreffen, die mit der Godot Engine entwickelt worden sind, da legitime Godot-Ausführdateien missbraucht werden, um betrügerische Inhalte über Mods (Modifikationen für Videospiele) und DLCs (downloadable content, Zusatzinhalte) zu laden. Das schädliche Script der Hacker hört auf den Namen GodLoader, welches zusammen mit Payloads auf die Ziel-Geräte gebracht wird. Der Diebstahl von Anmeldedaten und die Installation von Ransomware sind das Ziel der Cyber-Kriminellen. - Malware /
Check Point Software Technologies Ltd (NASDAQ: CHKP), ein Pionier und weltweit führender Anbieter von Cyber-Sicherheitslösungen, kam einer neuen Hacker-Masche auf die Spur. Mithilfe der Gaming Engine Godot Engine können Cyber-Kriminelle verschiedene Betriebssysteme von vernetzten Geräten attackieren, darunter Windows, macOS, Linux, Android und iOS. Verbreitet wird der schädliche Code von dem Malware-Netzwerk Stargazers Ghost Network, die Check Point vor einigen Monaten untersucht hatte, über die Open-Source-Plattform GitHub. In drei Monaten wurden über 17 000 Geräte infiziert. Die Auswirkung kann möglicherweise über 1,2 Millionen von Nutzern erstellte Videospiele betreffen, die mit der Godot Engine entwickelt worden sind, da legitime Godot-Ausführdateien missbraucht werden, um betrügerische Inhalte über Mods (Modifikationen für Videospiele) und DLCs (downloadable content, Zusatzinhalte) zu laden. Das schädliche Script der Hacker hört auf den Namen GodLoader, welches zusammen mit Payloads auf die Ziel-Geräte gebracht wird. Der Diebstahl von Anmeldedaten und die Installation von Ransomware sind das Ziel der Cyber-Kriminellen. - Malware /
Ransomware Mobile
Last update at: 2025-05-10 13:07:29
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter