Security News

3 Google Play Store Apps Exploit Android Zero-Day Used by NSO Group
2020-01-07 08:41

Watch out! If you have any of the below-mentioned file managers and photography apps installed on your Android phone-even if downloaded from the official Google Store store⁠-you have been hacked and being tracked. These newly detected malicious Android apps are Camero, FileCrypt, and callCam that are believed to be linked to Sidewinder APT, a sophisticated hacking group specialized in cyber espionage attacks.

Here we go again: Software nasties slip into Google Play, exploit make-me-root Android flaw for maximum pwnage
2020-01-07 06:53

At least three malicious apps with device-hijacking exploits have made it onto the Google Play Store in recent weeks. The malicious apps were Camero, FileCrypt, and callCam, so check if you still have them installed.

App Found in Google Play Exploits Recent Android Zero-Day
2020-01-07 05:29

A malicious application in the Google Play store targeted a recently patched zero-day vulnerability that affects multiple Android devices, including Google's Pixel phones. Tracked as CVE-2019-2215, the vulnerability was disclosed as a zero-day in October by Google Project Zero security researcher Maddie Stone.

Hackers Continue to Exploit Cisco ASA Vulnerability Patched Last Year
2019-12-20 19:25

Cisco has warned customers that a vulnerability patched last year in its Adaptive Security Appliance (ASA) and Firepower Appliance products continues to be targeted by hackers. read more

How to protect your organization against ad-based JavaScript exploits
2019-12-19 20:39

Cybercriminals continue to exploit weaknesses in JavaScript to try to steal sensitive data from consumers through advertising, according to DEVCON.

Echobot IoT Botnet Casts a Wide Net with Raft of Exploit Additions
2019-12-16 16:44

13 new exploits have been added to the malware's bag of tricks.

Understanding the Risk of Zero-Day Exploits
2019-12-16 14:00

While the best protective measures can't protect your business completely from a zero-day attack, many of the same cybersecurity best practices are useful for protecting against zero-day exploits.

Supply Chain Account Takeover: How Criminals Exploit Third-Party Access
2019-12-03 14:00

It’s important for businesses of all sizes to not only view their suppliers’ attack surface as their own but also extend some of their security protections.

Google ups bug bounties for Android flaws, exploits
2019-11-22 13:30

Google has expanded the Android Security Rewards (ASR) program and increased the bug bounties it’s willing to award for certain kinds of exploits. About the Android Security Rewards Program ASR...