#android-banking-trojan

[ follow ]
#phishing
Information security
fromThe Hacker News
8 hours ago

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

New phishing kits are evolving, integrating advanced features for targeted attacks, while security vulnerabilities continue to pose significant risks online.
Information security
fromThe Hacker News
8 hours ago

ThreatsDay Bulletin: SMS Blaster Busts, OpenEMR Flaws, 600K Roblox Hacks and 25 More Stories

New phishing kits are evolving, integrating advanced features for targeted attacks, while security vulnerabilities continue to pose significant risks online.
Information security
fromSecurityWeek
1 week ago

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

Threat actors have shifted to new phishing platforms after Tycoon 2FA's disruption, reusing its tools and increasing overall phishing attacks.
#robinhood
Deliverability
fromTechRepublic
1 day ago

Hackers Abuse Robinhood Signup Process to Deliver Phishing Emails

Robinhood users received phishing emails that appeared legitimate, exploiting a flaw in the account creation process to steal login credentials.
Deliverability
fromSecurityWeek
2 days ago

Robinhood Vulnerability Exploited for Phishing Attacks

Cybercriminals exploited Robinhood's account creation process to send phishing emails, but no personal information or funds were compromised.
Deliverability
fromTechRepublic
1 day ago

Hackers Abuse Robinhood Signup Process to Deliver Phishing Emails

Robinhood users received phishing emails that appeared legitimate, exploiting a flaw in the account creation process to steal login credentials.
Deliverability
fromSecurityWeek
2 days ago

Robinhood Vulnerability Exploited for Phishing Attacks

Cybercriminals exploited Robinhood's account creation process to send phishing emails, but no personal information or funds were compromised.
#digital-privacy
Privacy technologies
fromYahoo Life
22 hours ago

15 Crucial Phone Settings to Keep Big Brother Out of Your Business

The average person unlocks their smartphone 150 times daily, creating a significant digital footprint that can compromise privacy.
fromCNET
2 days ago
Privacy technologies

The Tools That Convinced Me to Take Browser Security More Seriously

Privacy technologies
fromYahoo Life
22 hours ago

15 Crucial Phone Settings to Keep Big Brother Out of Your Business

The average person unlocks their smartphone 150 times daily, creating a significant digital footprint that can compromise privacy.
Privacy technologies
fromCNET
2 days ago

The Tools That Convinced Me to Take Browser Security More Seriously

Online platforms collect extensive data about users, often through cookies, which can lead to targeted advertising and privacy concerns.
#data-breach
Privacy professionals
fromTechRepublic
2 days ago

ADT Confirms Major Data Breach Exposing Millions of Names, Partial SSNs

ADT's home security systems were not compromised, but customer data including names and partial Social Security numbers was exposed in a data breach.
Healthcare
fromSecurityWeek
14 hours ago

Sandhills Medical Says Ransomware Breach Affects 170,000

Sandhills Medical Foundation experienced a data breach affecting nearly 170,000 individuals due to a ransomware attack discovered on May 8, 2025.
Privacy professionals
fromTechRepublic
2 days ago

ADT Confirms Major Data Breach Exposing Millions of Names, Partial SSNs

ADT's home security systems were not compromised, but customer data including names and partial Social Security numbers was exposed in a data breach.
Marketing tech
fromAndroid Authority
1 day ago

Google Messages is making it easier to spot RCS marketing spam

Google introduces rounded-square icons and verified checkmarks for RCS business chats to improve user experience and distinguish them from personal messages.
UK politics
fromwww.theguardian.com
1 day ago

UK braces for further leaks after more private health records appear on Chinese website

Confidential health records of UK Biobank volunteers have been listed on Alibaba, prompting government action and raising concerns about data re-identification risks.
Privacy professionals
fromSecurityWeek
2 days ago

Medtronic Hack Confirmed After ShinyHunters Threatens Data Leak

Medtronic confirmed a hack by ShinyHunters, claiming millions of records were stolen, but asserts no impact on patient safety or operations.
#ai
DevOps
fromDevOps.com
1 day ago

When AI Goes Really, Really Wrong: How PocketOS Lost All Its Data - DevOps.com

A misconfiguration and AI error led to the complete loss of PocketOS's car-rental customer data, but it was later recovered.
DevOps
fromDevOps.com
1 day ago

When AI Goes Really, Really Wrong: How PocketOS Lost All Its Data - DevOps.com

A misconfiguration and AI error led to the complete loss of PocketOS's car-rental customer data, but it was later recovered.
#social-media-scams
Online marketing
fromEngadget
2 days ago

The FTC says Americans lost at least $2.1 billion to social media scams in 2025

Americans lost $2.1 billion to social media scams in 2025, an eightfold increase since 2020.
Social media marketing
fromFortune
2 days ago

Americans lost $2.1 billion to social media scams last year, 8 times more than in 2020. Facebook alone cost users more than texts and emails combined | Fortune

Social media scams have cost Americans billions, with significant losses reported during the pandemic and Meta apps being the primary targets.
Online marketing
fromEngadget
2 days ago

The FTC says Americans lost at least $2.1 billion to social media scams in 2025

Americans lost $2.1 billion to social media scams in 2025, an eightfold increase since 2020.
Social media marketing
fromFortune
2 days ago

Americans lost $2.1 billion to social media scams last year, 8 times more than in 2020. Facebook alone cost users more than texts and emails combined | Fortune

Social media scams have cost Americans billions, with significant losses reported during the pandemic and Meta apps being the primary targets.
London startup
fromwww.independent.co.uk
2 days ago

More than 500,000 Lloyds and Halifax customers may have been affected by glitch

The Independent provides critical journalism on key issues without paywalls, relying on donations to support their reporting efforts.
Germany news
fromSecurityWeek
2 days ago

Germany Suspects Russia Is Behind Signal Phishing That Targeted Top Officials

Germany suspects Russia behind phishing attacks on Signal targeting politicians and journalists, with investigations ongoing into espionage allegations.
#cybersecurity
Careers
fromEntrepreneur
5 days ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Privacy professionals
fromTheregister
3 days ago

Burglar alarm biz gets burgled, ShinyHunters pursues ransom

ADT confirmed a cyber intrusion by ShinyHunters, claiming over 10 million records were stolen, while ADT reported a limited data breach.
Information security
fromThe Hacker News
10 hours ago

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

DEEP#DOOR is a Python-based backdoor framework that enables persistent access and sensitive information harvesting from compromised systems.
Information security
fromTheregister
3 hours ago

FBI: China's hacker-for-hire ecosystem 'out of control'

China's hacker-for-hire ecosystem, linked to state security, poses significant cybersecurity threats and operates with profit-driven motives.
Careers
fromEntrepreneur
5 days ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Information security
fromSecuritymagazine
22 hours ago

New Research: AI-Driven Cybercrime Led to a 389% Increase in Ransomware Victims

Cybercriminals are using AI to enhance efficiency, leading to fewer brute force attempts and a rise in exploitation and ransomware incidents.
Privacy professionals
fromTheregister
3 days ago

Burglar alarm biz gets burgled, ShinyHunters pursues ransom

ADT confirmed a cyber intrusion by ShinyHunters, claiming over 10 million records were stolen, while ADT reported a limited data breach.
Information security
fromThe Hacker News
10 hours ago

New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud Credentials

DEEP#DOOR is a Python-based backdoor framework that enables persistent access and sensitive information harvesting from compromised systems.
Information security
fromTheregister
3 hours ago

FBI: China's hacker-for-hire ecosystem 'out of control'

China's hacker-for-hire ecosystem, linked to state security, poses significant cybersecurity threats and operates with profit-driven motives.
fromSecurityWeek
1 day ago

38 Vulnerabilities Found in OpenEMR Medical Software

"In the most severe cases, SQL injection vulnerabilities combined with modest database privileges could have led to full database compromise, PHI exfiltration at scale, and remote code execution on the server."
Healthcare
Information security
fromSecurityWeek
4 hours ago

AI Fuels 'Industrial' Cybercrime as Time-to-Exploit Shrinks to Hours

Industrialized cybercrime utilizes AI and automation for efficient, sophisticated attacks, necessitating defenders to adopt similar technologies for effective countermeasures.
#mirax
Information security
fromSecurityWeek
2 weeks ago

Mirax RAT Targeting Android Users in Europe

A new remote access trojan named Mirax targets Android users in Europe, enabling extensive control and data theft through sophisticated techniques.
Information security
fromSecurityWeek
2 weeks ago

Mirax RAT Targeting Android Users in Europe

A new remote access trojan named Mirax targets Android users in Europe, enabling extensive control and data theft through sophisticated techniques.
Privacy professionals
fromTechCrunch
2 days ago

Paragon is not collaborating with Italian authorities probing spyware attacks, report says | TechCrunch

WhatsApp and Apple notified targets of government spyware in Italy, leading to an ongoing investigation into Paragon Solutions' involvement.
Privacy technologies
fromThe Local Germany
4 days ago

As phishing attacks hit Germany - how secure is Signal messenging app?

Signal, a secure messaging app, faces phishing attacks linked to Russian groups, raising concerns about its security despite its end-to-end encryption.
Apple
fromTechRepublic
3 weeks ago

New Apple Scam Hits Millions of iPhone Users Worldwide, Draining Bank Accounts

Apple warns iPhone users about a surge in social engineering scams targeting bank accounts through panic-inducing messages.
Information security
fromComputerWeekly.com
5 hours ago

Almost half of UK businesses hit by cyber attacks | Computer Weekly

Cyber security threats in the UK are significant, with many organizations experiencing breaches or attacks, highlighting the need for robust security measures.
Apple
fromMail Online
3 weeks ago

Warning to all iPhone users over new scam draining bank accounts

iPhone users are warned about a scam involving fake Apple Pay alerts that drain bank accounts.
Privacy professionals
fromTechCrunch
3 days ago

Critical infrastructure giant Itron says it was hacked | TechCrunch

Itron confirmed a cyberattack in April, with hackers accessing some systems but no signs of further intrusions detected.
#malware
fromThe Hacker News
3 weeks ago
Information security

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

A new version of SparkCat malware targets cryptocurrency users on mobile platforms, concealing itself in benign apps and evolving its technical capabilities.
Information security
fromThe Hacker News
3 days ago

Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More

New malware fast16 predates Stuxnet, targeting high-precision software to subtly alter calculations, potentially causing significant failures.
Information security
fromTechRepublic
1 week ago

Fake Google Antigravity Installer Can Steal Accounts in Minutes

A fake Google Antigravity download exposes user accounts to compromise by delivering malware alongside the legitimate application.
Information security
fromThe Hacker News
3 weeks ago

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

A new version of SparkCat malware targets cryptocurrency users on mobile platforms, concealing itself in benign apps and evolving its technical capabilities.
#spyware
Privacy professionals
fromTechCrunch
6 days ago

Another spyware maker caught distributing fake Android snooping apps | TechCrunch

Morpheus spyware, created by IPS, uses fake apps to steal data, highlighting the growing demand for surveillance technology by law enforcement.
fromZDNET
2 months ago
Privacy technologies

Is spyware hiding on your phone? How to find out and remove it - fast

Privacy professionals
fromTechCrunch
6 days ago

Another spyware maker caught distributing fake Android snooping apps | TechCrunch

Morpheus spyware, created by IPS, uses fake apps to steal data, highlighting the growing demand for surveillance technology by law enforcement.
fromZDNET
2 months ago
Privacy technologies

Is spyware hiding on your phone? How to find out and remove it - fast

Information security
fromTechCrunch
1 day ago

Sri Lanka discloses another missing payment, days after hackers stole $2.5M from its finance ministry | TechCrunch

Sri Lanka is investigating missing payments and cyber thefts linked to hackers targeting its financial systems.
#ransomware
Information security
fromFuturism
4 days ago

Ransomware Negotiator Pleads Guilty to Deploying Ransomware Himself

A ransomware negotiator conspired with hackers, betraying clients and facilitating attacks against multiple companies.
Information security
fromFuturism
4 days ago

Ransomware Negotiator Pleads Guilty to Deploying Ransomware Himself

A ransomware negotiator conspired with hackers, betraying clients and facilitating attacks against multiple companies.
Information security
fromWIRED
2 days ago

The Race Is on to Keep AI Agents From Running Wild With Your Credit Cards

The FIDO Alliance is developing standards to secure AI agent transactions against digital security threats.
Privacy technologies
fromZDNET
1 month ago

5 telltale signs that your phone has been compromised (and how to combat them)

Phone hacking can be detected through signs like battery drain, slow performance, unfamiliar logins, and reduced storage space.
Information security
fromSecurityWeek
2 days ago

Dozens of Open VSX Extension Clones Linked to GlassWorm Malware

Over 70 extensions in the Open VSX marketplace are likely linked to GlassWorm malware, designed to steal sensitive information and deploy malware.
#android
Information security
fromTechzine Global
2 weeks ago

Android trojan linked to Cambodia following anomalous DNS spike

A banking Trojan operating from Cambodia registers 35 new domains monthly, targeting users in 21 countries and exploiting fake apps for fraud.
Information security
fromTechRepublic
2 weeks ago

Microsoft: Third-Party Android Vulnerability Leaves Over 50M Users Exposed

A critical flaw in the EngageLab SDK allowed malicious apps to exploit trusted permissions, affecting over 50 million Android users.
Information security
fromTechzine Global
2 weeks ago

Android trojan linked to Cambodia following anomalous DNS spike

A banking Trojan operating from Cambodia registers 35 new domains monthly, targeting users in 21 countries and exploiting fake apps for fraud.
Information security
fromTechRepublic
2 weeks ago

Microsoft: Third-Party Android Vulnerability Leaves Over 50M Users Exposed

A critical flaw in the EngageLab SDK allowed malicious apps to exploit trusted permissions, affecting over 50 million Android users.
Information security
fromSecurityWeek
3 days ago

Malicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: Google

Google's research reveals an increase in indirect prompt injection attacks on AI, though their sophistication remains relatively low.
Information security
fromTechzine Global
2 days ago

Malicious Python package poses new supply chain threat

The open-source package elementary-data was compromised, leading to the publication of a malicious version that stole sensitive user credentials.
Information security
fromSecurityWeek
3 days ago

Incomplete Windows Patch Opens Door to Zero-Click Attacks

Incomplete patching of Windows vulnerabilities led to new zero-click attack vectors, enabling credential theft without user interaction.
Information security
fromThe Hacker News
2 days ago

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

Microsoft acknowledged active exploitation of a high-severity security flaw in Windows Shell, now patched, allowing unauthorized access to sensitive information.
Information security
fromThe Hacker News
3 days ago

Fake CAPTCHA IRSF Scam and 120 Keitaro Campaigns Drive Global SMS, Crypto Fraud

Telecommunications fraud campaign uses fake CAPTCHA to trick users into sending costly international text messages, generating illicit revenue for fraudsters.
Information security
fromTechRepublic
3 days ago

Truecaller Faces New Pressure in India as Growth Matures - TechRepublic

Truecaller reached 500 million monthly active users but faces growth challenges in India due to increased competition and changing user needs.
Privacy technologies
fromTechCrunch
1 month ago

Google introduces a new way for users to sideload Android apps that still protects against scams | TechCrunch

Google introduces an 'advanced flow' setting allowing Android users to disable app verification requirements and sideload unverified apps while maintaining some anti-scam protections.
#android-security
Information security
fromTechRepublic
1 week ago

Over 800 Android Apps Targeted in PIN-Stealing Trojan Campaign

Hackers exploit Android's overlay feature to capture PINs and monitor user interactions across over 800 apps using banking trojans.
fromZDNET
1 month ago
Privacy technologies

Is that message spam or real? This Android trick helps you ID the scams

Information security
fromTechRepublic
1 week ago

Over 800 Android Apps Targeted in PIN-Stealing Trojan Campaign

Hackers exploit Android's overlay feature to capture PINs and monitor user interactions across over 800 apps using banking trojans.
Privacy technologies
fromZDNET
1 month ago

Is that message spam or real? This Android trick helps you ID the scams

Android's Circle to Search feature uses AI to identify scam messages by analyzing their content and alerting users to potential fraud.
Information security
fromSecurityWeek
1 week ago

Dozens of Malicious Crypto Apps Land in Apple App Store

Over two dozen fake cryptocurrency apps targeting iOS users have been found in the Apple App Store, aimed at stealing recovery phrases and private keys.
#android-malware
Information security
fromThe Hacker News
1 month ago

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data

Perseus, a new Android malware evolved from Cerberus and Phoenix, actively targets users through dropper apps for device takeover and financial fraud, with primary focus on Turkey and Italy.
Information security
fromThe Hacker News
1 month ago

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Six new Android malware families discovered with data theft and financial fraud capabilities, including PixRevolution targeting Brazil's Pix payment system with real-time transaction hijacking.
Information security
fromThe Hacker News
1 month ago

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data

Perseus, a new Android malware evolved from Cerberus and Phoenix, actively targets users through dropper apps for device takeover and financial fraud, with primary focus on Turkey and Italy.
Information security
fromThe Hacker News
1 month ago

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Six new Android malware families discovered with data theft and financial fraud capabilities, including PixRevolution targeting Brazil's Pix payment system with real-time transaction hijacking.
Information security
fromTheregister
1 month ago

Snoops plant info-stealing malware on iPhones, Google warns

DarkSword exploit kit targets iOS 18.4-18.7, exploiting six vulnerabilities to deploy backdoors stealing messages, location data, cryptocurrency wallets, and account credentials from iPhone users.
Information security
fromThe Hacker News
2 months ago

Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users

Massiv is an Android trojan that enables device takeover and credential theft via overlays, screen streaming, keylogging, SMS interception, and remote control for financial fraud.
fromZDNET
2 months ago

Phone acting weird? 5 red flags that could point to hackers

Your mobile phone is a treasure trove of personal and confidential information. That's why it's a prime target for hackers who want to compromise or steal your data. Through malicious apps and websites, phishing attacks, and other threats, an attacker can gain control of your device through spyware. But how can you tell if your phone has been hacked or tapped?
Information security
Information security
fromThe Hacker News
2 months ago

New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft

ZeroDayRAT is a commercial mobile spyware platform enabling real-time surveillance, data exfiltration, and financial theft on Android and iOS via a seller-provided builder and control panel.
[ Load more ]