Tag: mobile
-
Android Banking Malware deVixor Actively Targeting Users with Ransomware Capabilities.
A sophisticated Android banking trojan known as deVixor has emerged as a significant threat to mobile users, combining financial data theft, device surveillance, and ransomware capabilities into a single malicious platform. Active since October 2025, the malware represents a concerning evolution in Android-based financial threats, targeting victims through fake automotive websites and leveraging Telegram infrastructure…
-
When the Marketing Graph Becomes the Target Map
Ad tech platforms likely know more about your executives than your security team does… and that information is available to anyone willing to pay for it. A recent investigation by Wired revealed that Google’s ad service hosted audience segments tied to highly sensitive groups, allowing marketers (and potential adversaries) to target mobile devices linked to..…
-
For application security: SCA, SAST, DAST and MAST. What next?
Tags: advisory, ai, application-security, automation, best-practice, business, cisa, cisco, cloud, compliance, container, control, cve, data, exploit, flaw, framework, gartner, government, guide, ibm, incident response, infrastructure, injection, kubernetes, least-privilege, ml, mobile, network, nist, resilience, risk, sbom, service, software, sql, supply-chain, threat, tool, training, update, vulnerability, waf<img loading="lazy" decoding="async" src="https://b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?quality=50&strip=all&w=1024" alt="Chart: Posture, provenance and proof." class="wp-image-4115680" srcset="https://b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?quality=50&strip=all 1430w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=300%2C168&quality=50&strip=all 300w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=768%2C431&quality=50&strip=all 768w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=1024%2C575&quality=50&strip=all 1024w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=1240%2C697&quality=50&strip=all 1240w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=150%2C84&quality=50&strip=all 150w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=854%2C480&quality=50&strip=all 854w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=640%2C360&quality=50&strip=all 640w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”575″ sizes=”auto, (max-width: 1024px) 100vw, 1024px” /> Sunil GentyalaOver the past year the community has admitted the obvious: the battleground is the software supply chain and…
-
Driving Passwordless Adoption with FIDO and Biometric Authentication
Tags: access, attack, authentication, awareness, banking, breach, business, cloud, compliance, container, control, credentials, cyber, data, defense, fido, finance, fraud, government, Hardware, iam, identity, insurance, login, mobile, passkey, password, phishing, risk, service, technology, threat, trainingDriving Passwordless Adoption with FIDO and Biometric Authentication madhav Tue, 01/13/2026 – 06:13 For decades, passwords have been the default mechanism for securing digital access. They are deeply embedded in enterprise systems and workflows, yet they were never designed to withstand today’s threat landscape. Cybersecurity Sarah Lefavrais – IAM Product Marketing Manager More About This…
-
India Remains Top Target for Mobile Attacks as Threats Surge 38%
New Delhi, January 12, 2026 India has emerged as the world’s top target for mobile attacks yet again, recording a steep 38% year-over-year increase in mobile threats, according to the India findings of the Zscaler ThreatLabz 2025 Mobile, IoT, and OT Threat Report released today. The country now accounts for a staggering 26% of […]…
-
Gmail Says Goodbye to Gmailify and POP3: What Users Need to Know
Google is ending Gmailify and POP-based fetching in Gmail, pushing users toward forwarding or IMAP in the mobile app to keep third-party mail accessible. The post Gmail Says Goodbye to Gmailify and POP3: What Users Need to Know appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-gmail-ends-gmailify-pop3/
-
New “Penguin” Platform Sells Pig-Butchering Kits, PII, and Stolen Accounts
The industrialization of pig butchering scams has reached a critical tipping point. A sprawling Pig Butchering-as-a-Service (PBaaS) economy has emerged across Southeast Asia, offering turnkey scam platforms, stolen identities, pre-registered SIM cards, mobile applications, payment infrastructure, and shell company formation services. PBaaS enable fraudsters to scale romance and investment fraud operations with unprecedented ease and minimal…
-
Product showcase: TrackerControl lets Android users see who’s tracking them
TrackerControl is an open-source Android application designed to give users visibility into and control over the hidden data within mobile apps. Many apps routinely … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/09/product-showcase-trackercontrol-for-android/
-
ChatGPT is losing market share as Google Gemini gains ground
New data suggests that ChatGPT is losing its market share to Gemini on the web. It’s unclear if Gemini is also gaining ground in the mobile space. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/artificial-intelligence/chatgpt-is-losing-market-share-as-google-gemini-gains-ground/
-
Brightspeed investigates breach as crims post stolen data for sale
Crimson Collective claims ‘sophisticated attack’ that allows them to ‘disconnect every user from their mobile service’ First seen on theregister.com Jump to article: www.theregister.com/2026/01/06/brightspeed_investigates_breach/
-
Certificate Life Cycle Management: Emerging Trends to Watch in 2026
It normally begins as any other day. Your website is live. Your APIs are responding. Customers are checking out, logging in, and going about their lives. Then suddenly it all comes to an end. The homepage refuses to load. APIs start generating TLS errors. Mobile apps can’t connect. Support tickets are pouring in. Revenue isRead…
-
NDSS 2025 Exploiting the Complexity Of Modern CSS For Email And Browser Fingerprinting
Session 8A: Email Security Authors, Creators & Presenters: Leon Trampert (CISPA Helmholtz Center for Information Security), Daniel Weber (CISPA Helmholtz Center for Information Security), Lukas Gerlach (CISPA Helmholtz Center for Information Security), Christian Rossow (CISPA Helmholtz Center for Information Security), Michael Schwarz (CISPA Helmholtz Center for Information Security) PAPER Cascading Spy Sheets: Exploiting the Complexity…
-
How Leboncoin Blocks Millions of Malicious Requests Every Day
Learn how Leboncoin blocks 9.5M malicious requests daily with DataDome’s plug”‘and”‘play, AI-driven protection across web & mobile to safeguard user data & brand. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/how-leboncoin-blocks-millions-of-malicious-requests-every-day/
-
Arkose Labs Android SDK: Enhanced Protection with Mobile Integrity Check
Arkose Labs offers comprehensive mobile SDKs for both Android and iOS, delivering enterprise-grade fraud prevention across major platforms. Now, we’re enhancing our Android SDK with Mobile Integrity Check”, powered by Google Play Integrity API”, to detect compromised devices, modified applications, and emulator-based attacks that evade traditional detection methods. This critical advancement works alongside our bot…
-
La Poste and La Banque Postale Hit by Cyberattack, Online Services Disrupted
French postal and banking services faced fresh disruptions on Thursday, January 1, 2026, following a cyberattack that temporarily rendered the websites and mobile applications of La Poste and La Banque Postale largely inaccessible, according to reports from French radio RFI. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/la-poste-la-banque-postale-cyberattack-2026/
-
Sunken Ships: Will Orgs Learn From Ivanti EPMM Attacks?
The April/May zero-day exploitations of Ivanti’s mobile device management platform meant unprecedented pwning of thousands of orgs by a Chinese APT, and history will probably repeat itself. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/sunken-ships-ivanti-epmm-attacks
-
Microsoft Copilot is rolling out GPT 5.2 as “Smart Plus” mode
Microsoft is rolling out GPT 5.2 to Copilot on the web, Windows, and mobile as a free upgrade, and it’ll coexist with the GPT 5.1 model. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-copilot-is-rolling-out-gpt-52-as-smart-plus-mode/
-
Microsoft Copilot is rolling out GPT 5.2 as “Smart Plus” mode
Microsoft is rolling out GPT 5.2 to Copilot on the web, Windows, and mobile as a free upgrade, and it’ll coexist with the GPT 5.1 model. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-copilot-is-rolling-out-gpt-52-as-smart-plus-mode/
-
Tipps für CISOs, die die Branche wechseln wollen
Tipps für CISOs mit “Vertical-Switch-Ambitionen”.In der Außenperspektive sollte es für Menschen, die es zum Chief Information Security Officer gebracht haben, eigentlich kein Problem sein, die Branche zu wechseln. In der Realität stellen viele Sicherheitsentscheider allerdings regelmäßig fest, dass das Gegenteil der Fall ist: Wenn man einmal in einer bestimmten Branche tätig ist, gestaltet es sich…
-
Why Mobile-First SaaS Needs Passwordless Authentication for Field Teams
Learn why passwordless authentication is essential for mobile-first SaaS used by field teams to improve security, speed, and productivity. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/12/why-mobile-first-saas-needs-passwordless-authentication-for-field-teams/
-
Italy fines Apple $116 million over App Store privacy policy issues
Italy’s competition authority (AGCM) has fined Apple Euro98.6 million ($116 million) for using the App Tracking Transparency (ATT) privacy framework to abuse its dominant market position in mobile app advertising. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/italy-fines-apple-116-million-over-app-store-tracking-privacy-practices/
-
Italy fines Apple $116 million over App Store privacy policy issues
Italy’s competition authority (AGCM) has fined Apple Euro98.6 million ($116 million) for using the App Tracking Transparency (ATT) privacy framework to abuse its dominant market position in mobile app advertising. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/italy-fines-apple-116-million-over-app-store-tracking-privacy-practices/
-
Italy fines Apple $116 million over App Store privacy policy issues
Italy’s competition authority (AGCM) has fined Apple Euro98.6 million ($116 million) for using the App Tracking Transparency (ATT) privacy framework to abuse its dominant market position in mobile app advertising. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/italy-fines-apple-116-million-over-app-store-tracking-privacy-practices/
-
Best API Vulnerability Scanner in 2026
APIs (Application Programming Interfaces) have become the digital backbone of modern enterprises, seamlessly linking mobile applications, cloud platforms, and partner ecosystems. As their adoption rapidly progresses, APIs have also emerged as one of the most attractive entry points for hackers, thus signifying the importance of an API Vulnerability Scanner. By 2026, API security will have……
-
DDoS incident disrupts France’s postal and banking services ahead of Christmas
France’s La Poste confirmed that a distributed denial-of-service (DDoS) attack was the source of problems with its websites and mobile applications. First seen on therecord.media Jump to article: therecord.media/la-poste-france-ddos-disruption-days-before-christmas
-
South Korea to require facial recognition for new mobile numbers
South Korea will begin requiring facial recognition when signing up for a new mobile phone number in a bid to fight scams, the Ministry of Science and ICT announced. First seen on therecord.media Jump to article: therecord.media/south-korea-facial-recognition-phones
-
Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale
Threat actors have been observed leveraging malicious dropper apps masquerading as legitimate applications to deliver an Android SMS stealer dubbed Wonderland in mobile attacks targeting users in Uzbekistan.”Previously, users received ‘pure’ Trojan APKs that acted as malware immediately upon installation,” Group-IB said in an analysis published last week. “Now, adversaries increasingly deploy First seen on…
-
WhatsApp accounts targeted in ‘GhostPairing’ attack
Defending WhatsApp: Users can check which devices are paired via WhatsApp via Settings > Linked Devices. A rogue device link will appear here. Despite having access to a user’s WhatsApp account, the attacker can’t revoke their device access, which must be initiated by the primary device. Another tip is to enable two-step PIN verification. This…
-
WhatsApp accounts targeted in ‘GhostPairing’ attack
Defending WhatsApp: Users can check which devices are paired via WhatsApp via Settings > Linked Devices. A rogue device link will appear here. Despite having access to a user’s WhatsApp account, the attacker can’t revoke their device access, which must be initiated by the primary device. Another tip is to enable two-step PIN verification. This…

