Tag Android

Phone Location Tracking: Why It’s Out of Control and How You Can Take Action

Title: Analyzing App Location Permissions Amid Privacy Concerns In a growing focus on privacy, both Android and iOS platforms offer users insight into app permissions related to location data. Users are now able to manage their choices regarding whether an application can access their location consistently, only when in use,…

Read MorePhone Location Tracking: Why It’s Out of Control and How You Can Take Action

Kurdish Websites Targeted in Watering Hole Attack Distributing Malicious APKs and Spyware

In a recent cybersecurity incident, approximately 25 websites associated with the Kurdish minority have fallen victim to a sophisticated watering hole attack designed to collect sensitive information over an extended period of time, reportedly lasting more than 18 months. French cybersecurity firm Sekoia disclosed the details of the campaign, labeled…

Read MoreKurdish Websites Targeted in Watering Hole Attack Distributing Malicious APKs and Spyware

Chinese Hackers Attack Taiwan and U.S. NGOs Using MgBot and MACMA Malware

A Beijing-linked state-sponsored hacking group known as Daggerfly has targeted organizations in Taiwan and a U.S. non-governmental organization (NGO) operating in China, deploying an upgraded suite of malware tools in its most recent campaign. This sophisticated operation highlights the group’s engagement in internal espionage activities, as reported today by Symantec’s…

Read MoreChinese Hackers Attack Taiwan and U.S. NGOs Using MgBot and MACMA Malware

Android Malware Wpeeper Conceals C2 Servers within Compromised WordPress Sites

Emerging Malware Threat Targets Android Devices Using Compromised WordPress Sites Cybersecurity experts have identified a newly discovered malware strain specifically targeting Android devices, exploiting compromised WordPress sites to obscure its command-and-control (C2) communications and evade detection. This malware, referred to as Wpeeper, is characterized as an ELF binary that utilizes…

Read MoreAndroid Malware Wpeeper Conceals C2 Servers within Compromised WordPress Sites

Google Addresses Newly Discovered Android Kernel Vulnerability Actively Being Exploited

Google has recently mitigated a significant security vulnerability within the Android kernel, a flaw that is reportedly being actively exploited. The vulnerability, designated as CVE-2024-36971, has serious implications, allowing for remote code execution within the kernel. In its August 2024 Android security bulletin, Google indicated that this vulnerability might be…

Read MoreGoogle Addresses Newly Discovered Android Kernel Vulnerability Actively Being Exploited

Microsoft Addresses 61 Vulnerabilities, Including Two Actively Exploited Zero-Day Threats

Microsoft Addresses 61 Security Vulnerabilities in May Patch Update In its latest Patch Tuesday update for May 2024, Microsoft has resolved 61 newly identified security vulnerabilities across its software products, amongst them two zero-day flaws that have been actively exploited in the wild. These updates follow a proactive security strategy…

Read MoreMicrosoft Addresses 61 Vulnerabilities, Including Two Actively Exploited Zero-Day Threats

Microsoft Uncovers Four OpenVPN Vulnerabilities Paving the Way for Potential RCE and LPE Attacks

OpenVPN Vulnerabilities Disclosed by Microsoft: A Potential Attack Vector Microsoft recently announced the discovery of four medium-severity security vulnerabilities within the open-source OpenVPN software, which could be exploited in conjunction to enable remote code execution (RCE) and local privilege escalation (LPE). The implications of these flaws are significant, as they…

Read MoreMicrosoft Uncovers Four OpenVPN Vulnerabilities Paving the Way for Potential RCE and LPE Attacks

Researchers Identify 10 Issues in Google’s Quick Share File Transfer Tool

New Security Vulnerabilities Found in Google’s Quick Share Tool Recent research has revealed the existence of up to ten security vulnerabilities within Google’s Quick Share data transfer application, utilized across both Android and Windows platforms. These flaws pose a significant risk, as they could potentially be exploited to initiate a…

Read MoreResearchers Identify 10 Issues in Google’s Quick Share File Transfer Tool

Russian Hackers Target Safari and Chrome Vulnerabilities in Major Cyberattack

Multiple Exploit Campaigns Target Apple Safari and Google Chrome Users Recent analysis by cybersecurity experts has revealed that nation-state actors have leveraged previously patched vulnerabilities in Apple Safari and Google Chrome to distribute information-stealing malware to mobile users. The campaigns, which took place between November 2023 and July 2024, specifically…

Read MoreRussian Hackers Target Safari and Chrome Vulnerabilities in Major Cyberattack