Android Zero-Day Vulnerabilities Actively Exploited In Attacks, Patch Now!

Android Zero-Day Vulnerabilities Actively Exploited In Attacks, Patch Now!

Two zero-day vulnerabilities have been discovered and are currently being exploited in targeted attacks. The vulnerabilities, CVE-2024-43047 and CVE-2024-43093, were disclosed in Android's latest security bulletin, prompting urgent calls for users to update their devices...
MediaTek Smartphone Chipsets Vulnerabilities Let Attackers Escalate Privileges

MediaTek Smartphone Chipsets Vulnerabilities Let Attackers Escalate Privileges

Recent security bulletins have disclosed high-severity vulnerabilities in MediaTek smartphone chipsets, which could enable attackers to escalate privileges and gain unauthorized access to the affected devices. These vulnerabilities, identified in various MediaTek components, pose significant...
Multiple Flaws Impacting Boot Chain Of Samsung Devices

Multiple Flaws Impacting Boot Chain Of Samsung Devices

The Android boot chain initiates with the "Boot ROM," which initializes the "bootloader." The bootloader then loads the kernel, which is responsible for managing system resources and launching the init process. Recently, cybersecurity researchers at QuarksLab...
ErrorFather Hackers Attacking Android Users To Take Control Of The Device

ErrorFather Hackers Attacking Android Users To Take Control Of The Device

Cerberus is an advanced Android banking trojan that emerged in 2019, primarily designed to steal sensitive "financial information." While this sophisticated trojan is commonly distributed via "malicious apps" and "phishing campaigns." Cybersecurity analysts at Cyble recently...
Google to Block Malicious Sideloaded Apps

Google to Block Malicious Sideloaded Apps Exclusively for Indian Users

Google has announced the launch of an enhanced fraud protection pilot for Android users in the country. This initiative aims to block malicious sideloaded apps that exploit sensitive permissions to commit financial fraud. According to...
SilentSelfie Exploited 25 Websites To Deploy Malicious Android Application

SilentSelfie Exploited 25 Websites To Deploy Malicious Android Application

Threat actors are increasingly exploiting websites to carry out various cyberattacks, and they do so by leveraging vulnerabilities in web applications and user behavior.  While the most common tactics are phishing, where attackers deceive users...
Octo2 Android Malware Attacking To Steal Banking Credentials

Octo2 Android Malware Attacking Users To Steal Banking Credentials

The mobile threat landscape has become increasingly dangerous, primarily following a significant rise in cyberattacks, which surged by 350% in 2023 due to the shift towards remote work.  Mobile devices are now prime targets for...
Necro Trojan Using Steganography Techniques To Hack 11 Million Android Devices

Necro Trojan Used Stego Techniques To Hack 11 Million Android Devices

Steganography enables the threat actors to hide secret information within ordinary, non-secret files or messages to avoid detection. The common forms include embedding text in images or audio files, and it is often used alongside...
1.3 Million Android TV Box Hijacked By Android.Vo1d Malware

1.3 Million Android TV Box Hijacked By Android.Vo1d Malware

An Android TV Box is a small device that connects to your TV and allows you to access a wide range of online content, apps, and services. It runs on the Android operating system, similar...
New Android Banking Malware TrickMo Attacking Users To Steal Login Credentials

New Android Banking Malware TrickMo Attacking Users To Steal Login Credentials

Banking malware is a type of malicious software that targets financial institutions and their customers. There is a rise in Android banking malware, which exploits vulnerabilities in the Android operating system to steal sensitive user...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...