Tag: mobile
-
Hackers Converting Stolen Payment Card Data into Apple Google Wallets
Cybercriminal groups, primarily based in China, are leveraging advanced phishing techniques and mobile wallet technologies to convert stolen payment card data into fraudulent Apple and Google Wallet accounts. This innovative approach has revitalized the underground carding industry, which had been weakened in recent years by the adoption of chip-based payment cards in the United States.…
-
Pegasus spyware infections found on several private sector phones
Mobile security company iVerify says that it discovered about a dozen new infections of the powerful Pegasus spyware on phones mostly used by people in private industry. First seen on therecord.media Jump to article: therecord.media/pegasus-spyware-infections-iverify
-
How CISOs can rebuild trust after a security incident
Tags: attack, breach, business, cisco, ciso, cloud, communications, cybersecurity, data, firewall, group, incident response, jobs, linux, mobile, monitoring, risk, security-incident, service, software, strategy, vulnerabilityMaintaining sensitivity in accountability: Cisco’s Lidz emphasizes that transparency does not end at incident resolution.”Being transparent, internally in particular, by making sure stakeholders understand you and your team have learned from the incident, that there are things you would do better not just in terms of protections, but how you respond and react to incidents”…
-
South Korea Suspends DeepSeek AI Downloads Over Privacy Violations
South Korea has formally suspended new downloads of Chinese artificial intelligence (AI) chatbot DeepSeek in the country until the service makes changes to its mobile apps to comply with data protection regulations.Downloads have been paused as of February 15, 2025, 6:00 p.m. local time, the Personal Information Protection Commission (PIPC) said in a statement. The…
-
Android 16 Takes Action Against Scammers with In-Call Security Features
Google is working to enhance the security of its mobile operating system, focusing on preventing scammers from exploiting certain phone features during calls. One key feature of Android 16 aims to block actions like sideloading apps or enabling accessibility access during an active phone call, both of which are commonly used by scammers to gain…
-
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 33
Tags: breach, credit-card, cyber, data, data-breach, google, india, international, malware, mobile, north-korea, usaSecurity Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Mobile Indian Cyber Heist: FatBoyPanel And His Massive Data Breach Google Tag Manager Skimmer Steals Credit Card Info From Magento Site From South America to Southeast Asia: The Fragile Web of REF7707 Analyzing DEEP#DRIVE: North Korean…
-
Meta confirms ‘Project Waterworth,’ a global subsea cable project spanning 50,000 kilometers
Tags: mobileBack in November, we broke the news that Meta, owner of Facebook, Instagram, and WhatsApp, with billions of users accounting for 10% of all fixed and 22% of all mobile traffic, was close to announcing work on a major new, $10 billion+ subsea cable project to connect up the globe. The aim was […] First…
-
Channel Brief: Vodafone Teams With Advantage for Mobile Connectivity
Tags: mobileFirst seen on scworld.com Jump to article: www.scworld.com/news/channel-brief-vodafone-teams-with-advantage-for-mobile-connectivity
-
Btmob RAT: A New Evolution of Android Malware Targets Users via Phishing Sites
A newly discovered Android malware, Btmob RAT, has been identified as a major threat to mobile users. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/btmob-rat/
-
Apple issues emergency patches to contain an ‘extremely sophisticated attack’ on targeted individuals
Security researcher uncovers the exploit: The vulnerability was discovered by Bill Marczak, a senior researcher at Citizen Lab, a digital rights research group at the University of Toronto’s Munk School.Marczak took to social media to urge users to update their devices immediately, stating: “Update your iPhones”¦ again! iOS 18.3.1 out today with a fix for…
-
FinStealer Malware Targets Leading Indian Bank’s Mobile Users, Stealing Login Credentials
Tags: banking, credentials, credit-card, cyber, cybersecurity, finance, india, login, malware, mobile, phishing, threatA new cybersecurity threat has emerged, targeting customers of a prominent Indian bank through fraudulent mobile applications. Dubbed >>FinStealer,
-
Apple and Google take down malicious mobile apps from their app stores
Apple and Google have pulled as many as 20 apps from their respective apps for carrying a data-stealing malware. First seen on techcrunch.com Jump to article: techcrunch.com/2025/02/10/apple-and-google-take-down-malicious-apps-from-their-app-stores/
-
DeepSeek App Transmits Sensitive User and Device Data Without Encryption
A new audit of DeepSeek’s mobile app for the Apple iOS operating system has found glaring security issues, the foremost being that it sends sensitive data over the internet sans any encryption, exposing it to interception and manipulation attacks.The assessment comes from NowSecure, which also found that the app fails to adhere to best security…
-
DeepSeek iOS App Leaks Data to ByteDance Servers Without Encryption
DeepSeek iOS app”, a highly popular AI assistant recently crowned as the top iOS app since its January 25 release”, has been discovered to transmit sensitive user data to ByteDance servers without encryption. The security flaws, uncovered by mobile app security firm NowSecure, have prompted swift reactions from governments, enterprises, and cybersecurity experts worldwide. The…
-
MobSF Framework Zero-Day Vulnerability Allows Attackers to Trigger DoS in Scan Results
A recently discovered zero-day vulnerability in the Mobile Security Framework (MobSF) has raised alarms in the cybersecurity community. The vulnerability, which allows attackers to cause a partial Denial of Service (DoS) on scan results and the iOS Dynamic Analyzer functionality, was disclosed on GitHub yesterday by Ajin Abraham, under the advisory GHSA-jrm8-xgf3-fwqr. Technical Overview The vulnerability,…
-
Mobile Malware Targeting Indian Banks Exposes 50,000 Users
Indian banking malware attack exposes 50,000 users, stealing financial data via SMS interception and phishing First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/mobile-malware-indian-banks/
-
Italian founder of migrant rescue group ‘targeted with spyware’
Luca Casarini is most prominent person to come forward since WhatsApp said that 90 people, across two dozen countries, had probably been hackedThe Italian founder of the NGO Mediterranea Saving Humans, who has been a vocal critic of Italy’s alleged complicity in abuses suffered by migrants in Libya, has revealed WhatsApp informed him his mobile…
-
Activists critical of Italian PM may have had their phones targeted by Paragon spyware, says WhatsApp
Messaging app announces that 90 people, residing in two dozen countries, may have had their devices hacked The Italian founder of the NGO Mediterranea Saving Humans, who has been a vocal critic of Italy’s alleged complicity in abuses suffered by migrants in Libya, has revealed WhatsApp informed him his mobile phone was targeted by military-grade…
-
Warnung vor neuer PDF-Mishing-Kampagne
Tags: mobileKriminelle nutzen gezielt präparierte PDF-Dokumente, um mobile Endgeräte anzugreifen und sich Zugang zu sensiblen Daten von Unternehmen, Behörden und Organisationen zu verschaffen. Diese raffinierte Methode hat bereits Ziele in über 50 Ländern getroffen mit teils gravierenden Folgen. First seen on itsicherheit-online.com Jump to article: www.itsicherheit-online.com/news/cybersecurity/warnung-vor-neuer-pdf-mishing-kampagne/
-
Why API Security is Essential for the Hospitality Sector: Safeguarding Your Guests and Your Rewards
Trust is the cornerstone of the hospitality industry. Guests rely on you to safeguard their personal data, payment information, and loyalty rewards. However, in today’s digital landscape, this trust faces constant risks. APIs, which serve as the unseen connections among various systems and applications, are particularly vulnerable to cyber threats. A single flaw can compromise…
-
New SLAP and FLOP CPU Attacks Expose Data From Apple Computers, Phones
New CPU side-channel attacks named SLAP and FLOP can be exploited to remotely steal data from Apple mobile and desktop devices. The post New SLAP and FLOP CPU Attacks Expose Data From Apple Computers, Phones appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/new-slap-and-flop-cpu-attacks-expose-data-from-apple-computers-phones/
-
Critical Vulnerability in SonicWall Secure Mobile Access (SMA) 1000 Series Appliances
Summary A critical vulnerability (CVE-2025-23006) has been identified in SonicWall Secure Mobile Access (SMA) 1000 Series Appliances, potentially allowing for remote code execution (RCE). This First seen on research.kudelskisecurity.com Jump to article: research.kudelskisecurity.com/2025/01/29/critical-vulnerability-in-sonicwall-secure-mobile-access-sma-1000-series-appliances/
-
Malicious PDFs Used in Large-Scale Phishing Operation
A new report from Fernando Ortega, a malware researcher at Zimperium, exposes an advanced phishing campaign targeting mobile First seen on securityonline.info Jump to article: securityonline.info/malicious-pdfs-used-in-large-scale-phishing-operation/
-
Apple Patches First Exploited iOS Zero-Day of 2025
Apple has released fixes for dozens of vulnerabilities in its mobile and desktop products, including an iOS zero-day exploited in attacks. The post Apple Patches First Exploited iOS Zero-Day of 2025 appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/apple-patches-first-exploited-ios-zero-day-of-2025/

