Android Apple Data Breach Vulnerabilities2 Min Read October 15, 2025 Samsung Sets Oct 21 Event to Unveil “Project Moohan,” Its Android XR Headset Rival to Vision Pro Samsung data breach Samsung has announced that it will host a new product unveiling event titled “Worlds Wide Open” on October 21…
Android Phishing Vulnerabilities Windows2 Min Read October 14, 2025 New Pixnapping Attack Steals 2FA Codes From Google Authenticator Within 30 Seconds Pixnapping, a novel class of side-channel attacks targeting Android devices that can covertly extract sensitive screen data, including…
Android Malware Phishing Ransomware2 Min Read October 13, 2025 Spain Arrests Alleged Leader of GXC Team Cybercrime Network Spanish authorities have arrested a 25-year-old Brazilian national accused of leading the “GXC Team” – a…
Android Ransomware Vulnerabilities2 Min Read October 10, 2025 Gemini Nano Block: Google Locks On-Device AI Access for Smartphones with Unlocked Bootloaders For certain advanced users and developers, unlocking the Android operating system on their smartphones is a common practice. Once unlocked, it…
Android Malware Mobile Security Phishing2 Min Read October 9, 2025 ClayRat Spyware Campaign Targets Android Users in Russia A rapidly evolving Android spyware campaign known as “ClayRat” has been discovered targeting Russian users through Telegram…
Android Malware ProSpy Scam Security Signal Social Engineering Spyware ToSpy ToTok UAE2 Min Read October 6, 2025 Spyware Disguised as Signal and ToTok Apps Targets UAE Android Users If you use messaging apps in the United Arab Emirates (UAE), cybersecurity researchers at ESET have identified two mobile spyware campaigns…
Android Malware Mobile TROJAN VPN3 Min Read October 6, 2025 New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to be likely led by the…
Android CVE-2025-59489 iOS Linux macOS Microsoft Mobile privilege escalation Windows3 Min Read October 6, 2025 Steam and Microsoft warn of Unity flaw exposing gamers to attacks A code execution vulnerability in the Unity game engine could be exploited to achieve code execution on Android and privilege escalation on…
Akira Android Apple Artificial Intelligence AWS Azure backdoor C2 CloudFlare command-and-control conti CVE-2021-43798 CVE-2023-21563 cve-2023-24932 CVE-2024-58260 CVE-2025-10547 CVE-2025-10725 CVE-2025-27915 cve-2025-30247 cve-2025-4008 CVE-2025-41250 CVE-2025-41251 CVE-2025-41252 CVE-2025-43400 cve-2025-49844 CVE-2025-52906 CVE-2025-57714 CVE-2025-59934 CVE-2025-59951 CVE-2025-61882 CVE-2025-9230 CVE-2025-9231 CVE-2025-9232 DDoS denial-of-service exploit firewall Google Cloud ics identity iOS leak macOS Malware Microsoft Mobile Nation-state PCI-DSS Phishing Privacy privilege escalation Ransomware Social Engineering Software Supply Chain spam Spyware state-sponsored Stealer VPN Windows XSS Zero-Day2 Min Read October 6, 2025 Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons…
Android Apple backdoor C2 Cisco command-and-control Malware Microsoft Mobile VPN Windows2 Min Read October 6, 2025 Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that has been attributed to search engine…
Android Apple Network Vulnerabilities3 Min Read October 4, 2025 New Study Warns Several Free iOS and Android VPN Apps Leak Data Millions who rely on free mobile Virtual Private Network (VPN) apps for online privacy may actually be putting their data at greater risk,…
Android Apple Malware Vulnerabilities2 Min Read October 3, 2025 Chinese-Speaking Cybercrime Group Hijacks IIS Servers for SEO Fraud A Chinese-speaking cybercrime group is hijacking trusted Internet Information Services (IIS) worldwide to run SEO scams that redirect users to…
Android Exploits Linux Vulnerabilities2 Min Read October 3, 2025 Researcher Details Zero-Day Linux/Android Kernel Flaw (CVE-2025-38352) researcher StreyPaws has published an in-depth analysis of CVE-2025-38352, a Time-of-Check to Time-of-Use (TOCTOU) race condition in the…
Android Apple Network Ransomware3 Min Read October 2, 2025 Free VPN Apps Found Riddled With Security Flaws A large-scale study of free virtual private network (VPN) apps has uncovered serious privacy and security risks that affect both consumers and…
Android Botnets Malware Ransomware2 Min Read September 30, 2025 New Android RAT Klopatra Targets Financial Data A previously unknown Android Remote Access Trojan (RAT) has been identified by security researchers, marking a significant advancement in the…
Android Exploits Ransomware Vulnerabilities3 Min Read September 23, 2025 OnePlus leaves researchers on read over Android bug that exposes texts Security researchers report that OnePlus smartphone users remain vulnerable to a critical bug that allows any application to read SMS and MMS…
Android Apple Exploits Malware0 Min Read September 18, 2025 1 in 3 Android Apps Leak Sensitive Data A significant share of mobile applications are exposing sensitive information through insecure APIs, leaving users and businesses vulnerable…
Android Exploits Mobile Security Vulnerabilities2 Min Read September 15, 2025 Samsung Zero-Day Exploit CVE-2025-21043 Patched After Active Attacks on Android Devices Samsung has released security updates to patch a critical zero-day vulnerability actively exploited against Android devices. Tracked as…
Android Cyber Attack Cybersecurity Meta Samsung Security Vulnerability WhatsApp2 Min Read September 14, 2025 Samsung Fixes Image Parsing Vulnerability Exploited in Android Attacks Samsung has patched a serious security vulnerability that hackers were already using in live attacks against its Android devices. The issue,…
Android Apple Ransomware Web Security4 Min Read September 13, 2025 Why The Open Web Application Security Project (OWASP) Mobile Application Security (MAS) Project Is Critical The OWASP MAS project continues to lead the way in mobile application security. This article describes the resources and tools which have…
Android Exploits Vulnerabilities2 Min Read September 13, 2025 Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code Samsung has released its September 2025 security update, addressing a critical zero-day vulnerability that is being actively exploited in the…
Android Apple DDoS Malware Ransomware Windows3 Min Read September 10, 2025 Apple’s “Most Significant Upgrade” to iPhone Security Is Here Ddos September 10, 2025 Apple Security Engineering and Architecture (SEAR) has unveiled Memory Integrity Enforcement (MIE), an always-on,…
Android DDoS Network Vulnerabilities Windows3 Min Read September 10, 2025 This Patch Tuesday, SAP is the worst offender and Microsoft users can kinda chill September’s Patch Tuesday won’t require Microsoft users to rapidly repair rancid software, but SAP users need to move fast to…
Android Apple Linux Malware Ransomware Vulnerabilities Windows3 Min Read September 9, 2025 Microsoft Patch Tuesday, September 2025 Edition Microsoft Corp. today issued security updates to fix more than 80 vulnerabilities in its Windows operating systems and software. There are no…
Android Data Breach ICS/OT Linux Malware Network Phishing Ransomware Vulnerabilities Windows9 Min Read August 31, 2025 Weekly Cybersecurity News Recap : WhatsApp, Chrome 0-Day, AI Ransomware and Cyber Attacks Welcome to your Weekly Cybersecurity News Recap. This week, the digital world faced a fresh wave of threats, underscoring the relentless…
Android Apple Malware Phishing Vulnerabilities2 Min Read August 30, 2025 WhatsApp’s Zero-Click Vulnerability and Targeted Spyware Attacks A newly discovered critical vulnerability has put WhatsApp users across the globe on high alert. CVE-2025-55177, patched in August 2025, was a…
Android Apple Cloud Security Identity and Access Management Linux Ransomware Spotlight Vulnerability Management Windows5 Min Read August 28, 2025 Innovator Spotlight: ManageEngine Unifying IT Management and Security with ManageEngine In today’s digital landscape, IT can feel like juggling flaming torches, one…
Android Data Breach Malware Phishing Ransomware Windows4 Min Read August 27, 2025 HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay…
Android Malware Phishing Ransomware2 Min Read August 27, 2025 New Android Trojan Variant Expands with Ransomware Tactics A new version of the Hook Android banking Trojan has surfaced, showcasing one of the most extensive feature sets ever recorded for mobile…
Android Apple DDoS Ransomware Vulnerabilities2 Min Read August 25, 2025 25W Wireless Charging Arrives: Qi 2.2 Ushers in a New Era of Fast Power Ddos August 24, 2025 The Wireless Power Consortium (WPC) has officially introduced the Qi 2.2 wireless charging standard, offering devices…
Android Apple Cloud Security DDoS Network Phishing Privacy & Compliance Vulnerabilities4 Min Read August 25, 2025 Week in review: Covertly connected and insecure Android VPN apps, Apple fixes exploited zero-day Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Android VPN apps used by…
Android Malware2 Min Read August 25, 2025 ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure Cybersecurity researchers have detailed the inner workings of an Android banking trojan called ERMAC 3.0, uncovering serious shortcomings in…