Hack-for-hire groups target iPhone and Android users using phishing attacks, exposing data and highlighting a growing trend ...
Security researchers exposed a spying campaign by a hack-for-hire group that used Android spyware and phishing to steal ...
A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with ...
A single unauthenticated connection gives attackers a full shell; credential theft observed in under three minutes on honeypot servers.
Threat actors can extract Google API keys embedded in Android applications to gain access to Gemini AI endpoints and ...
To protect the Pixel modem from zero-day attacks, Google focused on the DNS parser. As cellular features have migrated to ...
PM This week in cybersecurity: botnets, RCE flaws, AI-driven attacks, stealers, and more. Fast, no-fluff roundup.
A spear-phishing campaign which spread across the Middle East between 2023 and 2024 has now been linked to Bitter APT group ...
Samsung is sunsetting its own chat app while Apple adds end-to-end encryption to its already-live RCS, hinting that the final texting firewall might soon drop. Meanwhile, Cloudflare drafts a ...
Rowhammer attacks have been around since 2014, and mitigations are in place in most modern systems, but the team at gddr6.fail has found ways to apply the attack to current-generation GPUs.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results