Tag: mobile
-
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 57
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter Arctic Wolf Observes July 2025 Uptick in Akira Ransomware Activity Targeting SonicWall SSL VPN The State of Ransomware Q2 2025 Malware 101: a comprehensive guide Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed […]…
-
French firm Bouygues Telecom suffered a data breach impacting 6.4M customers
Bouygues Telecom suffered a cyberattack that compromised the personal information of 6.4 million customers. French telecommunications company Bouygues Telecom suffered a cyberattack that resulted in the compromise of personal information of 6.4 million customers. Bouygues Telecom, part of the Bouygues industrial group, is one of France’s leading telecom providers, offering mobile, internet, and IPTV services.…
-
Cyberattack hits France’s third-largest mobile operator, millions of customers affected
Bouygues Telecom, a large French mobile carrier, disclosed a cyberattack and data breach affecting more than 6 million customer accounts. First seen on therecord.media Jump to article: therecord.media/bouygues-telecom-france-cyberattack-data-breach
-
Cyberattack hits France’s third-largest mobile operator, millions of customers affected
Bouygues Telecom, a large French mobile carrier, disclosed a cyberattack and data breach affecting more than 6 million customer accounts. First seen on therecord.media Jump to article: therecord.media/bouygues-telecom-france-cyberattack-data-breach
-
Cyberattack hits France’s third-largest mobile operator, millions of customers affected
Bouygues Telecom, a large French mobile carrier, disclosed a cyberattack and data breach affecting more than 6 million customer accounts. First seen on therecord.media Jump to article: therecord.media/bouygues-telecom-france-cyberattack-data-breach
-
How Can Dynamic Application Security Testing (DAST) Help Your Organization?
Dynamic Application Security Testing (DAST) is a black-box security testing method that analyzes running applications for vulnerabilities by emulating real-world attacks against their exposed interfaces. Instead of analyzing source code, DAST using manual and automated tools interact with a live deployment of the application (web app, APIs, mobile backend, etc.) and inject malicious payloads to……
-
New Android Malware Poses as SBI Card and Axis Bank Apps to Steal Financial Data
McAfee’s Mobile Research Team has identified a sophisticated Android malware campaign primarily aimed at Hindi-speaking users in India, masquerading as legitimate financial applications from institutions like SBI Card, Axis Bank, and IndusInd Bank. This operation distributes malicious APKs through dynamically created phishing websites that mimic official banking portals, leveraging real assets such as images and…
-
Chinese Nation-State Hackers Breach Southeast Asian Telecoms
Threat Actor Maintains Long-Term Stealthy Access. Chinese nation-state hackers penetrated mobile telecom networks across Southeast Asia likely in order to track individuals’ location, say security researchers. One tell about the hackers’ intentions was deployment of a custom-made network scanning and packet capture utility tracked as CordScan. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/chinese-nation-state-hackers-breach-southeast-asian-telecoms-a-29120
-
Russia’s mobile internet shutdowns hit record high amid Ukrainian drone attacks
Russia shut down mobile internet services more than 2,000 times in July as authorities ramped up digital restrictions in the name of security. First seen on therecord.media Jump to article: therecord.media/russia-mobile-internet-shutdowns-record
-
Security gaps still haunt shared mobile device use in healthcare
Shared mobile devices are becoming the standard in hospitals and health systems. While they offer cost savings and workflow improvements, many organizations are still … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/01/shared-mobile-device-security-healthcare/
-
Security gaps still haunt shared mobile device use in healthcare
Shared mobile devices are becoming the standard in hospitals and health systems. While they offer cost savings and workflow improvements, many organizations are still … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/08/01/shared-mobile-device-security-healthcare/
-
Researchers Link New SS7 Encoding Attack to Surveillance Vendor Activity
Researchers identify a new SS7 encoding attack used by a surveillance vendor to bypass security and access mobile subscriber data without detection. First seen on hackread.com Jump to article: hackread.com/researchers-ss7-encoding-attack-surveillance-vendor/
-
UNC2891 Hackers Breach ATMs Using Raspberry Pi Devices for Network Access
A Raspberry Pi device that was directly attached to an internal network switch was used by the financially motivated threat actor group UNC2891 to breach ATM networks in a sophisticated cyber campaign that targeted banking infrastructure. This embedded hardware, equipped with a 4G modem, facilitated remote access over mobile data, bypassing perimeter firewalls and establishing…
-
Koreans Hacked, Blackmailed by 250+ Fake Mobile Apps
A swath of copycat Korean apps are hiding spyware, occasionally leading to highly personal, disturbing extortions. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/koreans-hacked-blackmailed-250-fake-mobile-apps
-
Apple pushes almost 30 security fixes in mobile update
Apple pushes what will likely be the last major security update to its current iPhone and iPad operating systems, fixing 29 vulnerabilities in its mobile ecosystem First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366628089/Apple-pushes-almost-30-security-fixes-in-mobile-update
-
Keeper Security Releases Mobile Platform Updates for iOS and Android
Keeper Security has announced significant updates to its mobile apps for iOS and Android. The updates will bring users a smarter, smoother and more secure way to manage passwords, passkeys and sensitive data on the go. The updated Keeper mobile apps will be available in app stores soon. As smartphones become a primary point of…
-
Cybercriminals Use Fake Apps to Steal Data and Blackmail Users Across Asia’s Mobile Networks
Cybersecurity researchers have discovered a new, large-scale mobile malware campaign that’s targeting Android and iOS platforms with fake dating, social networking, cloud storage, and car service apps to steal sensitive personal data.The cross-platform threat has been codenamed SarangTrap by Zimperium zLabs. Users in South Korea appear to be the primary focus.”This extensive campaign involved First…
-
Cyble Uncovers RedHook Android Trojan Targeting Vietnamese Users
Cybersecurity researchers at Cyble Research and Intelligence Labs (CRIL) have uncovered a new Android banking trojan called RedHook that is actively targeting Vietnamese mobile users. The malware is distributed via carefully crafted phishing sites impersonating trusted financial and government agencies. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/redhook-android-banking-trojan-exploiting/
-
Präzise statt spekulative Kontrolle für mobile Datenströme
Tags: mobileDie meisten Unternehmen gehen davon aus, dass ein mobiles Gerät oder Ding automatisch abgesichert ist, sobald es sich mit einem Mobilfunknetz verbindet. In der Realität trifft diese Annahme leider nur selten zu. Sobald eine SIM-Karte aktiv ist und eine Verbindung zwischen Gerät und Netzwerk besteht, kann Datenverkehr ungehindert über mobile Netzwerke und sogar über Provider-Grenzen…
-
Methods to Bypass OTP in Mobile Apps: Successful VAPT Scenarios
Tags: mobileFirst seen on resecurity.com Jump to article: www.resecurity.com/blog/article/methods-to-bypass-otp-in-mobile-apps-successful-vapt-scenarios
-
Quid Miner Launches Mobile Cloud Mining App for Seamless, Secure BTC and DOGE Cryptocurrency Daily Income of $17,777
[London, UK ] July 2025 As digital assets continue to gain mainstream adoption, investors are turning to innovative tools that simplify how they participate in the crypto economy. Quid Miner, a UK-based platform, is leading this shift with a sleek, mobile-first application that enables users across 180+ countries to earn crypto directly from their […]…
-
SonicWall SMA 100 Vulnerabilities Allow Remote Execution of Arbitrary JavaScript
Cybersecurity vendor SonicWall issued a critical advisory highlighting three serious vulnerabilities affecting its Secure Mobile Access (SMA) 100 series appliances. Impacting SMA 210, SMA 410, and SMA 500v models running firmware version 10.2.1.15-81sv and earlier, the flaws could allow unauthenticated remote attackers to trigger denial-of-service conditions or execute arbitrary code and JavaScript. CVE ID Vulnerability…
-
Smashing Security podcast #427: When 2G attacks, and a romantic road trip goes wrong
Graham warns why it is high time we said goodbye to 2G – the outdated mobile network being exploited by cybercriminals with suitcase-sized SMS blasters. From New Zealand to London, scammers are driving around cities like dodgy Uber drivers, spewing phishing texts to thousands at once. First seen on grahamcluley.com Jump to article: grahamcluley.com/smashing-security-podcast-427/
-
Surveillance Firm Exploits SS7 Flaw to Track User Locations
Tags: attack, cyber, exploit, flaw, infrastructure, intelligence, international, mobile, phone, threat, vulnerabilityA sophisticated surveillance operation has been discovered exploiting critical vulnerabilities in the global telecommunications infrastructure to track mobile phone users’ locations without authorization, security researchers have revealed. The attack leverages weaknesses in the decades-old SS7 (Signaling System No. 7) protocol that underpins international cellular networks. New Attack Method Discovered Security experts at Enea’s Threat Intelligence…
-
China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
Cybersecurity researchers have shed light on a mobile forensics tool called Massistant that’s used by law enforcement authorities in China to gather information from seized mobile devices.The hacking tool, believed to be a successor of MFSocket, is developed by a Chinese company named SDIC Intelligence Xiamen Information Co., Ltd., which was formerly known as Meiya…
-
Summer Vacation Alert Surfaces More Than 5 Million Unsecured Wi-Fi Networks
Zimperium, a provider of mobile security software, this week published a report that notes more than 5 million unsecured public Wi-Fi networks have been detected globally since the beginning of 2025 First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/07/summer-vacation-alert-surfaces-more-than-5-million-unsecured-wifi-networks/
-
Scanception Exposed: New QR Code Attack Campaign Exploits Unmonitored Mobile Access
Tags: access, attack, control, credentials, data-breach, detection, exploit, intelligence, malicious, mobile, qrCyble’s Research and Intelligence Lab (CRIL) has analyzed a new quishing campaign that leverages QR codes embedded in PDF files to deliver malicious payloads. The campaign, dubbed Scanception, bypasses security controls, harvests user credentials, and evades detection by traditional systems. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/scanception-qr-code-quishing-campaign/

