Tag: android
-
CISA Issues Alert on Android 0-Day Use-After-Free Vulnerability Under Active Exploitation
Tags: android, browser, chrome, cisa, cyber, cybersecurity, exploit, flaw, infrastructure, vulnerability, zero-dayThe Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert for a newly discovered zero-day vulnerability in the Android Runtime component. This “use-after-free” flaw could allow attackers to escape the Chrome sandbox and elevate privileges on an affected device. CISA warns that the vulnerability is under active exploitation and urges organizations and users…
-
Boffins build automated Android bug hunting system
AI agent system said to have found more than 100 zero-day flaws in production apps First seen on theregister.com Jump to article: www.theregister.com/2025/09/04/boffins_build_automated_android_bug_hunting/
-
Cryptohack Roundup: El Salvador Splits Bitcoin Reserve
Also: PowerShell-Based Cryptojacking Attack, a Malvertising Campaign. This week, El Salvador split its bitcoin reserve, an Indian court jailed cops for crypto kidnapping, a PowerShell-based cryptojacking attack, a malvertising campaign targeted Android users, a Venus Protocol hack, malware hid in npm packages using smart contracts for evasion and Bunni DEX exploit. First seen on govinfosecurity.com…
-
Judge who ruled Google is a monopoly decides to do hardly anything to break it up
Ad giant won’t be broken up, forced to offload Chrome or Android, thanks to AI First seen on theregister.com Jump to article: www.theregister.com/2025/09/03/google_doj_antitrust_ruling/
-
Google fixes actively exploited Android vulnerabilities (CVE-2025-48543, CVE-2025-38352)
Google has provided fixes for over 100 Android vulnerabilities, including CVE-2025-48543 and CVE-2025-38352, which >>may be under limited, targeted exploitation.
-
Google Patches 111 Android Vulnerabilities, Confirms Active Exploitation of Two Zero-Days
In its latest Android Security Bulletin, Google has confirmed the patching of 111 unique security vulnerabilities, including two zero-day vulnerabilities that were actively exploited in targeted attacks. The most concerning of these involve CVE-2025-48543, a flaw in Android Runtime, and CVE-2025-38352, a bug in the Linux kernel. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/cve-2025-48543-and-cve-2025-38352/
-
Mega-Patchday bei Google: Android-Nutzer werden attackiert
Google schließt in Android zum September 20-mal so viele Sicherheitslücken wie in den beiden Vormonaten zusammen. Einige werden schon aktiv ausgenutzt. First seen on golem.de Jump to article: www.golem.de/news/mega-patchday-bei-google-android-nutzer-werden-attackiert-2509-199770.html
-
Android drops mega patch bomb – 120 fixes, two already exploited
September bundle the largest this year, and possibly the most serious First seen on theregister.com Jump to article: www.theregister.com/2025/09/03/android_patch_september/
-
Google addressed two Android flaws actively exploited in targeted attacks
Google addressed 120 Android vulnerabilities in September 2025, including two flaws actively exploited in targeted attacks. Google has released security updates to address 120 Android vulnerabilities as part of Android Security Bulletin September 2025. Two of these vulnerabilities have been exploited in targeted attacks. >>There are indications that the following may be under limited, targeted […]…
-
Google addressed two Android flaws actively exploited in targeted attacks
Google addressed 120 Android vulnerabilities in September 2025, including two flaws actively exploited in targeted attacks. Google has released security updates to address 120 Android vulnerabilities as part of Android Security Bulletin September 2025. Two of these vulnerabilities have been exploited in targeted attacks. >>There are indications that the following may be under limited, targeted […]…
-
Google patches two Android zero-days, 120 defects total in September security update
The critical, actively exploited zero-day vulnerabilities affect the Linux kernel and Android runtime. First seen on cyberscoop.com Jump to article: cyberscoop.com/android-security-update-september-2025/
-
Google fixes actively exploited Android flaws in September update
Google has released the September 2025 security update for Android devices, addressing a total of 84 vulnerabilities, including two actively exploited flaws. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/google-fixes-actively-exploited-android-flaws-in-september-update/
-
Android Security Alert: Google Patches 120 Flaws, Including Two Zero-Days Under Attack
Google has shipped security updates to address 120 security flaws in its Android operating system as part of its monthly fixes for September 2025, including two issues that it said have been exploited in targeted attacks.The vulnerabilities are listed below -CVE-2025-38352 (CVSS score: 7.4) – A privilege escalation flaw in the Linux Kernel component CVE-2025-48543…
-
Android droppers evolved into versatile tools to spread malware
Android droppers now spread banking trojans, SMS stealers, and spyware, disguised as government or banking apps in India and Asia. ThreatFabric researchers warn of a shift in Android malware: dropper apps now deliver not just banking trojans, but also SMS stealers and spyware, mainly in Asia. Google’s Pilot Program enhances Play Protect by scanning Android…
-
Android Issues Security Update to Patch Actively Exploited 0-Day Flaws
Google has released a criticalAndroid Security Bulletinfor September 2025, addressing multiple high-severity vulnerabilities that are currently being actively exploited in the wild. The security patch level2025-09-05or later is required to protect Android devices from these serious threats. The security bulletin reveals thattwo CVEs are under limited, targeted exploitation, making this update particularly urgent for Android…
-
Android Issues Security Update to Patch Actively Exploited 0-Day Flaws
Google has released a criticalAndroid Security Bulletinfor September 2025, addressing multiple high-severity vulnerabilities that are currently being actively exploited in the wild. The security patch level2025-09-05or later is required to protect Android devices from these serious threats. The security bulletin reveals thattwo CVEs are under limited, targeted exploitation, making this update particularly urgent for Android…
-
Forscher warnen: Android-Malware klaut 2FA-Codes aus Google Authenticator
Eine Android-Malware namens Brokewell erweist sich als äußerst kompetent. Sie sammelt allerhand vertrauliche Daten – inklusive 2FA-Codes. First seen on golem.de Jump to article: www.golem.de/news/forscher-warnen-android-malware-klaut-2fa-codes-aus-google-authenticator-2509-199708.html
-
Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans
Cybersecurity researchers are calling attention to a new shift in the Android malware landscape where dropper apps, which are typically used to deliver banking trojans, to also distribute simpler malware such as SMS stealers and basic spyware.These campaigns are propagated via dropper apps masquerading as government or banking apps in India and other parts of…
-
Crooks exploit Meta malvertising to target Android users with Brokewell
Cybercriminals spread Brokewell via fake TradingView Premium ads on Meta, stealing crypto and data with remote control since July 2024. Bitdefender warns threat actors are abusing Meta ads to spread fake TradingView Premium apps for Android, delivering Brokewell malware to steal crypto and data. >>Bitdefender researchers recently uncovered a wave of malicious ads on Facebook…
-
Brokewell Android malware delivered through fake TradingView ads
Cybercriminals are abusing Meta’s advertising platforms with fake offers of a free TradingView Premium app that spreads the Brokewell malware for Android. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/brokewell-android-malware-delivered-through-fake-tradingview-ads/
-
Fraudulent Scholarship Apps Target Students in “Defarud” Scam Campaign
An Android malware tracker named SikkahBot, active since July 2024 and explicitly targeting students in Bangladesh. Disguised as applications from the Bangladesh Education Board, SikkahBot lures victims with promises of scholarships, coerces them into sharing sensitive information, and requests high-risk permissions. Once installed, it harvests personal and financial data, intercepts SMS messages, abuses the Accessibility…
-
Fraudulent Scholarship Apps Target Students in “Defarud” Scam Campaign
An Android malware tracker named SikkahBot, active since July 2024 and explicitly targeting students in Bangladesh. Disguised as applications from the Bangladesh Education Board, SikkahBot lures victims with promises of scholarships, coerces them into sharing sensitive information, and requests high-risk permissions. Once installed, it harvests personal and financial data, intercepts SMS messages, abuses the Accessibility…
-
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 60
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter The Resurgence of IoT Malware: Inside the Mirai-Based “Gayfemboy” Botnet Campaign Your Connection, Their Cash: Threat Actors Misuse SDKs to Sell Your Bandwidth The Silent, Fileless Threat of VShell Android backdoor spies on […]…
-
Fake Facebook Ads Push Brokewell Spyware to Android Users
A Facebook malvertising campaign is spreading the Brokewell spyware to Android users via fake TradingView ads. The malware… First seen on hackread.com Jump to article: hackread.com/fake-facebook-ads-brokewell-spyware-android-users/
-
Google verlangt von AndroidEntwicklern eine Identifizierung
Google geht, angesichts einer Vielzahl an schädlichen Android-Apps zukünftig einen drastischen Weg. Alle Entwickler von Android-Apps müssen sich gegenüber Google identifizieren, wenn die App künftig noch unter zertifizierten Android-Geräten ausgeführt werden soll. Im Artikel A new layer of security for certified … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/08/29/google-verlangt-von-android-app-entwicklern-eine-identifizierung/
-
Threat Actors Use Facebook Ads to Deliver Android Malware
Cybercriminals are increasingly turning their sights from desktop to mobile, exploiting Meta’s advertising platform to distribute a sophisticated Android banking trojan disguised as a free TradingView Premium app. Bitdefender Labs warns that these threat actors have shifted tactics after months of targeting Windows users with fake trading and cryptocurrency ads, now focusing worldwide on smartphone…
-
New Android Malware ‘SikkahBot’ Targets Students in Bangladesh
A newly discovered Android malware, dubbed SikkahBot, is actively targeting students in Bangladesh by posing as official applications from the Bangladesh Education Board. This malware campaign, identified by Cyble Research and Intelligence Labs (CRIL), has been in operation since July 2024. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/sikkahbot-malware-campaign/
-
Gefälschte Facebook-Ads: Malware-Falle für Android-Nutzer
Bitdefender warnt vor einer Malvertising-Kampagne auf Facebook, die Android-Nutzer mit Fake-Anzeigen für eine angeblich kostenlose TradingView-Premium-App täuscht. Statt der App laden Opfer eine neue Version der Malware Brokewell herunter ein Spyware- und Remote-Access-Trojaner, der Geräte ausspioniert, fernsteuert und sensible Daten sowie Kryptowährungen stiehlt. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/facebook-malware-android
-
Malvertising-Kampagne auf Facebook missbraucht Finanzplattform Tradingview, um Android-Nutzer anzugreifen
Es ist ein fataler Irrglaube, davon auszugehen, dass Smartphones für Hacker weniger interessant seien. Das Gegenteil ist der Fall: Nachdem Hacker monatelang Windows-Desktop-Nutzer mit gefälschten Anzeigen für Handels- und Kryptowährungsplattformen angegriffen haben, nehmen die Kriminellen nun weltweit Android-Nutzer ins Visier. Bitdefender hat neueste Forschungsergebnisse veröffentlicht, wonach eine aktive Malvertising-Kampagne auf Facebook die Finanzplattform Tradingview missbraucht,…
-
Google kneecaps indie Android devs, forces them to register
Sideloaders face ID checks, fees, and paperwork as Chocolate Factory tightens gates First seen on theregister.com Jump to article: www.theregister.com/2025/08/26/android_developer_verification_sideloading/

