Tag: mobile
-
T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit
T-Mobile paid $33 million in a private arbitration process over a SIM swap attack leading to cryptocurrency theft. The post T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/t-mobile-coughed-up-33-million-in-sim-swap-lawsuit/
-
CoffeeLoader: A Brew of Stealthy Techniques
IntroductionZscaler ThreatLabz has identified a new sophisticated malware family that we named CoffeeLoader, which originated around September 2024. The purpose of the malware is to download and execute second-stage payloads while evading detection by endpoint-based security products. The malware uses numerous techniques to bypass security solutions, including a specialized packer that utilizes the GPU, call…
-
‘Lucid’ Phishing-as-a-Service Exploits Faults in iMessage, Android RCS
Cybercriminals in China have figured out how to undermine the strengths of mobile messaging protocols. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/lucid-phishing-exploits-imessage-android-rcs
-
Banking-Malware: 3,6-mal mehr Angriffe auf mobile Nutzer
Cyberkriminelle haben im Jahr 2024 ihre Methoden angepasst und vermehrt mobile Geräte sowie den Kryptowährungssektor ins Visier genommen. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/banking-angriffe-mobile-nutzer
-
New Malware Targets Android Users by Abusing Cross-Platform Framework for Evasion
A recent discovery by the McAfee Mobile Research Team has highlighted a new wave of Android malware campaigns that utilize the .NET MAUI cross-platform framework to evade detection. This framework, introduced by Microsoft as a replacement for Xamarin, allows developers to build applications for multiple platforms, including Android, iOS, Windows, and macOS. However, cybercriminals have…
-
Manipulierte Mobilgeräte bleiben ein hohes Risiko für Unternehmen
Immer häufiger manipulieren Cyberkriminelle mobile Betriebssysteme durch Rooting und Jailbreaking, um tiefgreifend in Nutzerrechte einzugreifen. Besonders brisant ist dabei der Trend zu Mobile-First-Angriffen Smartphones und Tablets rücken zunehmend ins Visier moderner Hackerstrategien. First seen on itsicherheit-online.com Jump to article: www.itsicherheit-online.com/news/security-management/manipulierte-mobilgeraete-bleiben-ein-hohes-risiko-fuer-unternehmen/
-
Cyberattack takes down Ukrainian state railway’s online services
Ukrzaliznytsia, Ukraine’s national railway operator, has been hit by a massive cyberattack that disrupted online services for buying tickets both through mobile apps and the website. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cyberattack-takes-down-ukrainian-state-railways-online-services/
-
Over 300 arrested in international crackdown on cyber scams
Law enforcement agencies in seven African countries arrested over 300 suspected cybercriminals involved in mobile banking, investment and messaging app scams, according to a statement on Monday by Interpol. First seen on therecord.media Jump to article: therecord.media/300-arrested-africa-crackdown-cyber-scams
-
Rooted, jailbroken mobile devices pose security risk to organizations
First seen on scworld.com Jump to article: www.scworld.com/news/rooted-jailbroken-mobile-devices-pose-security-risk-to-organizations
-
Entwicklungsplattform Firebase unter Feuer
Check Point Software Technologies hat eine Hacker-Kampagne gegen Firebase beobachtet, eine Entwicklungsplattform für mobile sowie Web-Applikationen. Die Sicherheitsforscher von Check Point Research (CPR) stießen auf professionell gestaltete und sehr überzeugend gemachte Fälschungen von echten Internet-Auftritten als Phishing-Websites. Die von CPR beobachtete Kampagne beinhaltete die Nutzung kompromittierter Konten, man spricht dabei auch von Business-E-Mail-Compromise (BEC). Sobald…
-
Catch Me If You Can: Rooting Tools vs The Mobile Security Industry
Our zLabs team dives into why rooting and jailbreaking is a significant threat for enterprises and much more. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/catch-me-if-you-can-rooting-tools-vs-the-mobile-security-industry/
-
Report: More Attacks Aimed at Android Devices Configured with Root Access
A report published today by Zimperium, a provider of a platform for securing mobile devices and applications, today finds devices running the Android operating system that have enabled root-level privileges are 3.5 times more likely to be attacked, resulting in 250 times more cybersecurity incidents. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/report-more-attacks-aimed-at-android-devices-configured-with-root-access/
-
Why rooting and jailbreaking make you a target
As cybercriminals have moved to a mobile-first attack strategy, rooting and jailbreaking mobile devices remain a powerful attack vector. Such mobile devices bypass critical … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/20/rooting-jailbreaking-threat/
-
Mobile Jailbreaks Exponentially Increase Corporate Risk
Both Android devices and iPhones are 3.5 times more likely to be infected with malware once broken and 250 times more likely to be totally compromised, recent research shows. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/mobile-jailbreaks-corporate-risk
-
iPhone Android Users: A Major Privacy Upgrade is Coming Soon
This breakthrough will finally allow secure, encrypted messaging between different mobile platforms. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-iphone-android-encrypted-messaging/
-
Analyze Mobile Threats Faster: ANY.RUN Introduces Android OS to Its Interactive Sandbox
Disclosure: This article was provided by ANY.RUN. The information and analysis presented are based on their research and findings. First seen on hackread.com Jump to article: hackread.com/analyze-mobile-threats-any-run-android-os-sandbox/
-
iPhone-Android: A Major Privacy Upgrade is Coming Soon
This breakthrough will finally allow secure, encrypted messaging between different mobile platforms. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-iphone-android-encrypted-messaging/
-
Apple Introduces RCS EndEnd Encryption for iPhone Messages
Apple has announced the integration of end-to-end encryption (E2EE) for Rich Communication Services (RCS) on iPhones. This development follows the introduction of RCS in iOS 18, marking a new era in mobile messaging with enhanced privacy and security features. The GSMA, a key organizer behind this technology, has released new specifications incorporating E2EE based on…
-
The most notorious and damaging ransomware of all time
Tags: access, android, attack, backdoor, backup, banking, botnet, breach, communications, computer, control, credentials, cryptography, cyber, cybercrime, dark-web, data, defense, detection, email, encryption, endpoint, exploit, extortion, finance, flaw, framework, germany, google, government, group, hacker, hacking, healthcare, infection, infrastructure, international, jobs, korea, law, lazarus, leak, linux, malicious, malware, microsoft, mobile, msp, network, north-korea, office, open-source, oracle, password, phishing, phone, powershell, ransom, ransomware, russia, service, software, spam, switch, technology, threat, tool, ukraine, update, usa, virus, vulnerability, windowsConti: History: First appearing in May 2020, the Conti RaaS platform is considered the successor to the Ryuk ransomware. As of January 2021, Conti is believed to have infected over 150 organizations and earned millions of dollars for its criminal developers and their affiliates. At least three new versions have been found since its inception.How it works: Conti uses the…
-
Breaking the Barriers to a Password-Free Life in Enterprise: Meet SafeNet eToken Fusion NFC PIV security key
Tags: access, authentication, cloud, compliance, control, credentials, data, defense, encryption, fido, framework, government, healthcare, identity, infrastructure, mobile, nfc, password, phishing, regulation, service, software, strategy, technology, windowsBreaking the Barriers to a Password-Free Life in Enterprise: Meet SafeNet eToken Fusion NFC PIV security key madhav Thu, 03/13/2025 – 06:46 As large organizations increasingly shift towards passwordless solutions, the benefits are clear: enhanced user experience, improved security, and significant cost savings. The FIDO (Fast Identity Online) standard has emerged as the gold standard…
-
Xitter Hit by Major Cyberattack
On March 10, 2025, Xitter experienced major service disruptions throughout the day. Users couldn’t access the platform on both mobile apps and the website. Here’s what happened and why it matters. What Happened? X suffered multiple waves of outages starting early Monday morning: First wave: Around 6:00 AM Eastern Time, affecting about 20,000 users Second……
-
Angreifer setzen beim Phishing zunehmend auf Mobile-First
Vor kurzem ist eine interessante Studie zu Phishing-Angriffen auf mobile Endgeräte, die sogenannten Mishing-Angriffe, erschienen, die Aufmerksamkeit verdient. Immer häufiger kommen in Unternehmen mobile Endgeräte zum Einsatz. Zum Beispiel im Rahmen einer Multi-Faktor-Authentifizierung oder um eine Mobile-First-Anwendung nutzen zu können. Cyberkriminelle machen sich diesen Umstand, so die Studie, immer häufiger zu Nutze, da mobile Endgeräte,…
-
US cities warn of wave of unpaid parking phishing texts
US cities are warning of an ongoing mobile phishing campaign pretending to be texts from the city’s parking violation departments about unpaid parking invoices, that if unpaid, will incur an additional $35 fine per day. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/us-cities-warn-of-wave-of-unpaid-parking-phishing-texts/

