Android

MavenGate Supply Chain Attack Let Attackers Hijack Java & Android Apps

Hackers use supply chain attacks to breach a target by gaining access to and taking advantage of weaknesses in the…

3 months ago

Top 12 Best Penetration Testing Companies & Services – 2024

Penetration Testing Companies are pillars when it comes to information security; nothing is more important than ensuring your systems and…

3 months ago

Bigpanzi Bot Hacks 170,000+ Android TVs to Launch DDoS Attacks

Android TVs are widely used, and due to their wide adoption, threat actors frequently target them for unauthorized access or…

3 months ago

Intellexa Spyware Adds Persistence with iOS or Android Device

In the shadowy realm of commercial spyware, the spotlight turns to the notorious Intellexa spyware and its Predator/Alien solution, as…

4 months ago

Hackers Abusing WhatsApp Messages to Install Android Malware

Embarking on a journey into the realm of cyber threats, Microsoft recently uncovered a series of mobile banking trojan campaigns…

5 months ago

WhatsApp New Privacy Feature Let Users Hide Location During Calls

WhatsApp has begun to roll out the 'Protect IP Address in Calls' feature, which conceals your IP address during calls.…

5 months ago

Android Security Updates: 2023 – 37 Vulnerabilities Patched Including RCE, DOS

Android has fixed 37 vulnerabilities that were impacting its devices with the release of its November 2023 security updates. Most…

5 months ago

Arid Viper Steals Sensitive Data From Android’s & Deploy Other Malware

According to recent reports, Arabic-speaking Android users have been targeted with spyware by the "Arid Viper" threat actor, also known…

5 months ago

Malicious Android Apps on Google Play With Over 2 Million Installs

Several recently discovered malicious apps on Google Play have been found to display intrusive advertisements to users, with a total…

6 months ago

Chinese Android-based Devices It Comes Pre-installed With a Firmware Backdoor

The Trojan War's famous horse trick inspired the term for cyberattacks, where a user unwittingly downloads a file that causes…

6 months ago