Tag: mobile
-
35 countries use Chinese networks for transporting mobile user traffic, posing cyber risks
An analysis from iVerify found U.S. allies on the list where mobile providers employ China-based networks. First seen on cyberscoop.com Jump to article: cyberscoop.com/35-countries-use-chinese-networks-for-transporting-mobile-user-traffic-posing-cyber-risks/
-
CISA tags SonicWall VPN flaw as actively exploited in attacks
On Wednesday, CISA warned federal agencies to secure their SonicWall Secure Mobile Access (SMA) 100 series appliances against attacks exploiting a high-severity remote code execution vulnerability. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cisa-tags-sonicwall-vpn-flaw-as-actively-exploited-in-attacks/
-
CISA Issues Alert on SonicWall Flaw Being Actively Exploited
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert after confirming active exploitation of a SonicWall vulnerability. The flaw, documented as CVE-2021-20035, targets SonicWall’s SMA100 series appliances and has been added to CISA’s Known Exploited Vulnerabilities Catalog. Overview of the Vulnerability This particular vulnerability lies within the SonicWall Secure Mobile Access (SMA)…
-
CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices
Tags: access, cisa, cve, cybersecurity, exploit, flaw, infrastructure, injection, kev, mobile, vulnerabilityThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting SonicWall Secure Mobile Access (SMA) 100 Series gateways to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.The high-severity vulnerability, tracked as CVE-2021-20035 (CVSS score: 7.2), relates to a case of operating system command injection First seen…
-
Cloud, Cryptography Flaws in Mobile Apps Leak Enterprise Data
Cloud misconfigurations and cryptography flaws plague some of the top apps used in work environments, exposing organizations to risk and intrusion. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/cloud-cryptography-flaws-mobile-apps-expose-enterprise-data
-
92% of Mobile Apps Found to Use Insecure Cryptographic Methods
Study reveals 92% of mobile apps use insecure cryptographic methods, exposing millions to data risks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/92-mobile-apps-insecure/
-
Tycoon 2FA phishing kit adds stealth, expands to mobile devices
First seen on scworld.com Jump to article: www.scworld.com/news/tycoon-2fa-phishing-kit-adds-stealth-expands-to-mobile-devices
-
South African telecom provider Cell C disclosed a data breach following a cyberattack
Cell C, one of the biggest telecom providers in South Africa confirms a data breach following a 2024 cyberattack. Cell C is the fourth-largest mobile network operator in South Africa, ,after Vodacom, MTN, and Telkom. The company founded in 2001 offers prepaid and postpaid mobile plans, data bundles and internet services, fiber broadband, roaming and…
-
iOS devices face twice the phishing attacks of Android
2024 brought about countless new cybersecurity challenges including significant growth of the mobile threat landscape, according to Lookout. Threat actors, ranging from … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/04/11/mobile-cybersecurity-challenges/
-
Malicious ‘mParivahan’ App Circulates on WhatsApp, Skimming Sensitive Mobile Data
A new variant of the fake NextGen mParivahan app has emerged, exploiting the trust users place in official government notifications to distribute malware. This malicious software is distributed through seemingly legitimate traffic violation alerts via WhatsApp, luring victims into installing what they believe is the official app. Infection Vector and Deceptive Tactics The malware spreads…
-
South African telecom provider serving 7.7 million confirms data leak following cyberattack
South Africa’s fourth-largest mobile network operator, Cell C, has confirmed that its data was leaked on the dark web following a cyberattack last year. First seen on therecord.media Jump to article: therecord.media/south-african-telecom-provider-discloses-data-breach-ransomware
-
Top 16 OffSec, pen-testing, and ethical hacking certifications
Tags: access, android, antivirus, application-security, attack, authentication, blockchain, bug-bounty, business, cisco, cloud, computing, credentials, crypto, cryptography, cyber, cybersecurity, data, defense, detection, encryption, exploit, guide, hacker, hacking, incident response, injection, iot, jobs, kali, linux, malware, microsoft, mitigation, mobile, network, penetration-testing, RedTeam, remote-code-execution, reverse-engineering, risk, risk-assessment, sap, skills, sql, technology, threat, tool, training, update, vulnerability, windowsExperiential learning Offensive security can’t be fully mastered through lectures alone. Candidates need hands-on training in lab environments to develop practical skills. Ideally, certification exams should include a practical assessment, such as developing an exploit to compromise a system.Because individuals learn OffSec techniques, such as penetration testing, in different ways, the most effective certifications offer…
-
Innovations in Managing Cloud Machine Identities
Can Innovations in Machine Identity Management Reshape Cloud Security? Cloud technology has transformed the way we work, store data, and build software, revolutionizing various industries from vending to mobile automation. Nevertheless, this digital shift brings forth novel cybersecurity challenges. One particularly important aspect often overlooked is the management of Non-Human Identities (NHIs). So, what exactly……
-
Whatsapp plugs bug allowing RCE with spoofed filenames
Whatsapp makes for a popular attack vector: Whatsapp has been frequently targeted in the past for its popularity as an encrypted chatting platform. With over 10 billion downloads on Google Play Store alone, the platform makes for a lucrative target for threat actors.A similar security oversight was reported in July 2024 to be affecting the…
-
NCSC issues warning over Chinese Moonshine and BadBazaar spyware
Two spyware variants are being used to target the mobile devices of persons of interest to Chinese intelligence, including individuals in the Taiwanese, Tibetan and Uyghur communities First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366622023/NCSC-issues-warning-over-Chinese-Moonshine-and-BadBazaar-spyware
-
Apple Pay und Sicherheit was Nutzer wissen sollten
Mobile Bezahlsysteme scheinen einer der wichtigsten Trends für das Jahr 2015 zu werden dafür spricht zumindest der Boom, der durch die Veröffentlichung von Apple Pay ausgelöst wurde. Damit hat Apple etwas geschafft, woran sich andere Unternehmen schon lange die Zähne ausbeißen. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2014/11/18/apple-pay-und-sicherheit-nutzer-wissen-sollten/
-
Kids Online: Das mobile Gerät hat Schule gemacht
Das Internet hat bei Kids Schule gemacht. Deswegen sollten Eltern und Lehrer ihre Hausaufgaben zum Thema Online-Sicherheit erledigt haben. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2015/08/28/kids-online-das-mobile-gerat-hat-schule-gemacht/
-
Windows-Gefahren: Vergangenheit, Gegenwart und Zukunft
Mobile Malware befindet sich auf dem Vormarsch, doch die fragmentierte Marktsituation erschwert den Cyberkriminellen ihre Arbeit ganz im Gegensatz zu der Welt der Desktops und Laptops: Laut Net Marketshare laufen seit letztem Monat 90 Prozent der Computer unter einer Windows-Version. First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2015/05/19/windows-gefahren-vergangenheit-gegenwart-und-zukunft/
-
Hackers Conceal NFC Carders Behind Apple Pay and Google Wallet
Tags: apple, cyber, cybercrime, exploit, finance, fraud, google, hacker, mobile, nfc, password, technology, vulnerabilityIn a disturbing evolution of financial fraud, cybercriminals are leveraging advanced techniques to exploit mobile payment systems such as Apple Pay and Google Wallet. Once reliant on magnetic stripe card cloning, fraudsters have adapted to breakthroughs in card security technology like chip cards and one-time passwords, exploiting vulnerabilities in contactless payments and digital wallets. By…
-
Check Point Infinity überzeugt im unabhängigen KI-Sicherheitsvergleich
Check Point wurde insbesondere in den Bereichen Threat Prevention, Zero Trust Access, Secure Access Service Edge (SASE), Cloud Security, Mobile & Endpoint Protection als führend eingestuft. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/check-point-infinity-ueberzeugt-im-unabhaengigen-ki-sicherheitsvergleich/a40415/
-
Widespread call record exposure possible due to Verizon mobile app flaw
First seen on scworld.com Jump to article: www.scworld.com/brief/widespread-call-record-exposure-possible-due-to-verizon-mobile-app-flaw
-
MediaTek Releases Security Patch to Fix Vulnerabilities in Mobile and IoT Devices
MediaTek, a prominent semiconductor company specializing in mobile, IoT, and multimedia chipsets, has announced the release of critical software patches to address multiple security vulnerabilities uncovered in its products. These vulnerabilities have the potential to compromise devices running MediaTek-powered chipsets, including smartphones, tablets, AIoT devices, smart displays, OTT platforms, and TVs. The announcement comes as…
-
German Mobile Proxy Dein digitaler Tarnmantel von GermanProxy.io
Tags: mobileGerman Mobile Proxy von GermanProxy.io: Sicher, anonym & ohne Einschränkungen mit echter deutscher IP dein digitaler Tarnmantel fürs Netz. First seen on tarnkappe.info Jump to article: tarnkappe.info/advertorial/german-mobile-proxy-dein-digitaler-tarnmantel-von-germanproxy-io-312735.html
-
Counterfeit Phones Carrying Hidden Revamped Triada Malware
The malware, first discovered in 2016, has been updated over the years, and the latest version is now hiding in the firmware of counterfeit mobile phones. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/counterfeit-phones-infected-triada-malware
-
Apple Fined $162 Million by France Authorities for Mobile Ad Market Domination
French antitrust regulators have imposed a hefty fine of Euro150 million ($162.4 million) on tech giant Apple for abusing its dominant position in mobile app advertising through its App Tracking Transparency (ATT) tool. The ruling marks the first fine by regulators globally targeting Apple’s ATT feature, which controls user tracking permissions for third-party apps on…
-
Das gehört in Ihr Security-Toolset
Tags: access, ai, antivirus, authentication, backup, breach, business, cloud, compliance, control, cyberattack, cybersecurity, data, data-breach, defense, detection, edr, firewall, gartner, governance, iam, identity, incident response, intelligence, iot, malware, mfa, ml, mobile, network, password, ransomware, risk, saas, service, software, spyware, threat, tool, update, vulnerability, vulnerability-managementLesen Sie, welche Werkzeuge essenziell sind, um Unternehmen gegen Cybergefahren abzusichern.Sicherheitsentscheider sind mit einer sich kontinuierlich verändernden Bedrohungslandschaft, einem zunehmend strengeren, regulatorischen Umfeld und immer komplexeren IT-Infrastrukturen konfrontiert. Auch deshalb wird die Qualität ihrer Sicherheits-Toolsets immer wichtiger.Das Problem ist nur, dass die Bandbreite der heute verfügbaren Cybersecurity-Lösungen überwältigend ist. Für zusätzliche Verwirrung sorgen dabei nicht…
-
New Surge of IRS-Themed Attacks Targets Taxpayers’ Mobile Devices
As the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit taxpayers through a new wave of IRS-themed scams. Research from McAfee Labs has revealed a sharp increase in fraudulent activities targeting mobile devices, with scammers using deceptive text messages and fake IRS websites to steal personal and financial information. Mobile Attacks…
-
Apple fined Euro150 million over App Tracking Transparency issues
Autorité de la concurrence, France’s antitrust watchdog, has fined Apple Euro150 million ($162 million) for using the App Tracking Transparency privacy framework to abuse its dominant market position in mobile app advertising on its devices. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/apple/apple-fined-150-million-over-app-tracking-transparency-issues/
-
Apple Patches Recent Zero-Days in Older iPhones
Apple has released a hefty round of security updates for its desktop and mobile products, patching two recent zero-days in older iPhone models. The post Apple Patches Recent Zero-Days in Older iPhones appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/apple-patches-recent-zero-days-in-older-iphones/
-
Moscow Metro Digital Outage: Alleged Cyberattack or Technical Failure?
The Moscow Metro website and mobile application experienced disruptions on March 31, 2023. The Moscow subway app users reported various malfunctions, including issues loading personal accounts and difficulties in accessing key features like ticket purchasing and account management. The metro website, which is an essential tool for navigating the city’s vast metro system, became unavailable…

