Joker Malware Resurfaces; Over 500,000 Android Users Affected
Breaking into users’ devices via malicious applications is one of the common tactics used by malware authors. Recently, security experts from Pradeo uncovered a...
Over 300,000 Users Affected by 4 Android Banking Trojans
Security researchers from Threatfabric uncovered four different Android banking Trojans distributed via the Google Play Store between August and November 2021. The Trojans reportedly...
New Trojan ‘‘Android.Cynos.7.origin’’ Infects 9Mn Android Devices
Security researchers from Doctor Web have discovered a new Trojan that has infected over 9.3 million Android devices.
The Trojan, dubbed "Android.Cynos.7.origin," is a new...
‘SharkBot’ Android Trojan Found Targeting Banking Apps and Crypto Exchanges
A new botnet, dubbed “SharkBot,” is targeting Italy, the U.K., and the U.S., including banking applications and cryptocurrency exchanges.
The Cleafy TIR team discovered the...
Indian Bank Users Victim of Drinik Android Malware – Use Tax Refund as Bait
Indian Computer Emergency Response Team (CERT-In) released an advisory related to a new malware called Drinik.
The Android malware targets Indian Bank customers through a...
New Android Malware ‘TangleBot’ Phishing Users via COVID-19 Vaccine Lures
The spread of mobile malware has become rampant in the cyberthreat landscape. More threat actor groups are leveraging mobile malware to infect handsets and...
GriftHorse Android Trojan Scam Purloins Over 10 Million Euros
Zimperium zLabs recently discovered a global scam where the threat actors posing as Trojans have hidden behind malicious Android applications and stolen millions of...
Warning! Don’t Be Duped by Fake Cryptomining Android Apps
The exponential rise of cryptocurrency value attracted both investors and cybercriminals at large. A recent investigation by Lookout, an endpoint-to-cloud security firm, uncovered multiple...
Android Update! Patches for Four Zero-Day Vulnerabilities Released
The risks from cyber criminals exploiting zero-day vulnerabilities have become a continuous threat for organizations, as they could lead to critical data breaches and...
Google Fixes Critical Remote Code Execution Vulnerabilities in Android
Cybercriminals are always stalking unpatched vulnerabilities which can be exploited to penetrate targeted systems. Several popular products and services suffered cyberattacks due to unpatched...