Tag: mobile
-
Canadian Airline WestJet Suffers Cyberattack, Halts App and Web Services
Calgary-based WestJet Airlines, Canada’s second-largest carrier, is grappling with the fallout from a significant cybersecurity incident that has disrupted access to its mobile app and internal systems. The breach, first detected on June 13, has led to intermittent outages and errors for guests attempting to use WestJet’s digital platforms, including the WestJet app and website.…
-
How to Monetize Unity Apps: Best Practices
Unity is one of the most popular game engines for mobile and cross-platform app development. It powers millions… First seen on hackread.com Jump to article: hackread.com/how-to-monetize-unity-apps-best-practices/
-
Data breach purportedly pilfers over 64M T-Mobile records
First seen on scworld.com Jump to article: www.scworld.com/brief/data-breach-purportedly-pilfers-over-64m-t-mobile-records
-
SHARED INTEL QA: A sharper lens on rising API logic abuse, and a framework to fight back
In today’s digital enterprise, API-driven infrastructure is the connective tissue holding everything together. Related: The DocuSign API-abuse hack From mobile apps to backend workflows, APIs are what keep digital services talking”, and scaling. But this essential layer of connectivity is also… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/shared-intel-qa-a-sharper-lens-on-rising-api-logic-abuse-and-a-framework-to-fight-back/
-
Half of Mobile Users Now Face Daily Scams
Malwarebytes claims 44% of mobile users are exposed to scams every day First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/half-of-mobile-users-now-face/
-
Android Enterprise update puts mobile security first
Google is rolling out new Android Enterprise features aimed at improving mobile security, IT management, and employee productivity. According to Zimperium’s 2025 Global Mobile … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/10/android-enterprise-new-features-2025/
-
Android Enterprise Rolls Out Security and Productivity Updates
Android Enterprise has introduced features for mobile security, device management and user productivity in its latest update First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/android-enterprise-security-updates/
-
OpenAI working to fix ChatGPT outage affecting users worldwide
OpenAI is working to fix an ongoing outage impacting ChatGPT users worldwide and preventing them from accessing the chatbot on the web or via mobile and desktop apps. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/technology/openai-working-to-fix-chatgpt-outage-affecting-users-worldwide/
-
OpenAI working to fix ChatGPT outage affecting users worldwide
OpenAI is working to fix an ongoing outage impacting ChatGPT users worldwide and preventing them from accessing the chatbot on the web or via mobile and desktop apps. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/technology/openai-working-to-fix-chatgpt-outage-affecting-users-worldwide/
-
Operation DRAGONCLONE: China Mobile Tietong Hit by Advanced APT Attack
The post Operation DRAGONCLONE: China Mobile Tietong Hit by Advanced APT Attack appeared first on Daily CyberSecurity. First seen on securityonline.info Jump to article: securityonline.info/operation-dragonclone-china-mobile-tietong-hit-by-advanced-apt-attack/
-
How to Use Risk-Based Metrics in an Exposure Management Program
Tags: attack, business, cloud, control, cybersecurity, data, exploit, guide, intelligence, iot, metric, mobile, monitoring, risk, service, threat, tool, update, vulnerability, vulnerability-managementEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, Tenable security engineers Arnie Cabral and Jason Schavel share how you can use risk-based metrics. You can read the entire Exposure Management Academy series here. We’re information security engineers at…
-
New Way to Track Covertly Android Users
Researchers have discovered a new way to covertly track Android users. Both Meta and Yandex were using it, but have suddenly stopped now that they have been caught. The details are interesting, and worth reading in detail: >Tracking code that Meta and Russia-based Yandex embed into millions of websites is de-anonymizing visitors by abusing legitimate…
-
Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths
Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and how new mobile IDs fit into the TSA’s plans. We also discuss the broader implications for identity surveillance and who truly benefits from……
-
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 48
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Pure Crypter Malware Analysis: 99 Problems but Detection Ain’t One Attacker exploits misconfigured AI tool to run AI-generated payload Crocodilus Mobile Malware: Evolving Fast, Going Global How Threat Actors Exploit Human Trust: A Breakdown of the…
-
Discontinuation of CISA’s mobile app security program untimely, lawmaker says
First seen on scworld.com Jump to article: www.scworld.com/brief/discontinuation-of-cisas-mobile-app-security-program-untimely-lawmaker-says
-
Cellebrite Acquires Corellium, Raising Stakes for Mobile Security and Surveillance Tools
First seen on scworld.com Jump to article: www.scworld.com/brief/cellebrite-acquires-corellium-raising-stakes-for-mobile-security-and-surveillance-tools
-
Colossal breach exposes 4B Chinese user records in surveillance-grade database
Tags: breach, china, cybercrime, cybersecurity, data, data-breach, disinformation, exploit, finance, fraud, group, identity, infrastructure, insurance, intelligence, iphone, leak, mobile, organized, phishing, phone, threataccording to cybersecurity firm Cybernews, which reported its findings based on its own research.What makes this breach particularly alarming isn’t just its size, though at four billion records, it’s believed to be the largest single-source leak of Chinese personal data ever found, it’s the breadth and depth of information that was exposed.According to the report, the researchers stumbled…
-
Cellebrite to acquire mobile testing firm Corellium in $200 million deal
Tags: mobileBoth companies have faced controversy in recent years, primarily for their work in circumventing mobile device security features First seen on cyberscoop.com Jump to article: cyberscoop.com/cellebrite-correllium-acquisition-ios-android/
-
Rep. Garbarino: Ending CISA mobile app security program for feds sends ‘wrong signal’
CyberScoop is first to report on the letter to DHS from the chair of a cybersecurity subcommittee, which also addresses CISA’s role as lead coordinator with the telecom sector. First seen on cyberscoop.com Jump to article: cyberscoop.com/rep-garbarino-ending-cisa-mobile-app-security-program-for-feds-sends-wrong-signal/
-
Phone unlocking firm Cellebrite to acquire mobile testing startup Corellium for $170M
Cellebrite said the deal will help with the “accelerated identification of mobile vulnerabilities and exploits.” First seen on techcrunch.com Jump to article: techcrunch.com/2025/06/05/phone-unlocking-firm-cellebrite-to-acquire-mobile-testing-startup-corellium-for-170m/
-
Web Application Firewall (WAF) Best Practices For Optimal Security
Web and mobile application code protection is a must-have security control. Modern solutions such as application layer firewall help your organisation to keep those assets protected from threats like SQL injection, cross-site scripting and bot-driven attacks. This is where a Web Application Firewall (WAF) comes into the picture. A WAF has the capability of filtering,……
-
New Crocodilus Malware Grants Full Control Over Android Devices
The Mobile Threat Intelligence (MTI) team identified a formidable new player in the mobile malware landscape: Crocodilus, an Android banking Trojan designed for device takeover. Initially observed in test campaigns with limited live instances, this malware has rapidly evolved, demonstrating a surge in active campaigns and sophisticated development. A Rising Threat in the Android Ecosystem…
-
Meta pauses mobile port tracking tech on Android after researchers cry foul
Zuckercorp and Yandex used localhost loophole to tie browser data to app users, say boffins First seen on theregister.com Jump to article: www.theregister.com/2025/06/03/meta_pauses_android_tracking_tech/
-
Interlock and the Kettering Ransomware Attack: ClickFix’s Persistence
Tags: access, attack, breach, captcha, ciso, computer, control, credentials, cyberattack, data, data-breach, detection, endpoint, exploit, group, healthcare, HIPAA, incident response, injection, malicious, mobile, network, phishing, powershell, ransom, ransomware, risk, saas, service, technology, threat, tool, vulnerabilityIn healthcare, every minute of downtime isn’t just a technical problem”Š”, “Šit’s a patient safety risk. CNN recently reported that Kettering Health, a major hospital network in Ohio, was hit by a ransomware attack. According to CNN, the Interlock ransomware group claimed responsibility, sending a chilling reminder that healthcare remains a prime target for this particular…
-
KnowBe4 gibt praktische Tipps für den Datenschutz in der Urlaubszeit
Ob Phishing-Mails im Urlaubslook, unsichere WLAN-Verbindungen oder anfällige mobile Geräte: Die Bedrohungslage für Reisende hat sich weiterentwickelt. Umso wichtiger ist es, vorbereitet zu sein. KnowBe4 gibt sieben einfache, aber wirkungsvolle Empfehlungen, wie man sich und seine Daten auf Reisen schützen kann: First seen on infopoint-security.de Jump to article: www.infopoint-security.de/knowbe4-gibt-praktische-tipps-fuer-den-datenschutz-in-der-urlaubszeit/a40980/

