A prominent Togolese human rights defender has been targeted with spyware by a threat actor known for striking victims in South Asia, marking the hacking group's first foray into digital surveillance in Africa. Amnesty International tied the covert attack campaign to a collective tracked as "Donot Team" (aka APT-C-35), which has been linked to cyber offensives in India and … [Read more...] about Indian-Made Mobile Spyware Targeted Human Rights Activist in Togo
Mobile
Ransomware disguised as a mobile version of Cyberpunk 2077
No sooner was Cyberpunk 2077 released for Windows and consoles than we came across a “beta version for Android” online. It was completely free to download from a site bearing the name cyberpunk2077mobile[.]com. The game’s actual developer has yet to announce any mobile version of the game, so we decided to investigate. Cyberpunk 2077 for Android? No, it’s ransomware The website … [Read more...] about Ransomware disguised as a mobile version of Cyberpunk 2077
Phishing giveaways of PUBG Mobile items
Free cheese exists only in mousetraps, but businesses everywhere have been desensitizing people to the idea of freemium cheese for years. The freemium approach is especially prevalent in the gaming industry. Game developers and publishers commonly offer users minor but genuinely free goodies — the expectation being that the gamers will get sucked in and end up spending on … [Read more...] about Phishing giveaways of PUBG Mobile items
Popular Mobile Browsers Found Vulnerable To Address Bar Spoofing Attacks
Graphic for illustrationCybersecurity researchers on Tuesday disclosed details about an address bar spoofing vulnerability affecting multiple mobile browsers, such as Apple Safari and Opera Touch, leaving the door open for spear-phishing attacks and delivering malware. Other impacted browsers include UCWeb, Yandex Browser, Bolt Browser, and RITS Browser. The flaws were … [Read more...] about Popular Mobile Browsers Found Vulnerable To Address Bar Spoofing Attacks
New Mobile Internet Protocol Vulnerabilities Let Hackers Target 4G/5G Users
High impact vulnerabilities in modern communication protocol used by mobile network operators (MNOs) can be exploited to intercept user data and carry out impersonation, fraud, and denial of service (DoS) attacks, cautions a newly published research.The findings are part of a new Vulnerabilities in LTE and 5G Networks 2020 report published by London-based cybersecurity firm … [Read more...] about New Mobile Internet Protocol Vulnerabilities Let Hackers Target 4G/5G Users
Sneaky Sasquatch Trailer — Apple Arcade
Think, steal, and sneak like a Sasquatch. Play the task-based adventure game Sneaky Sasquatch, now on Apple Arcade. Find it on the App Store: https://apple.co/2oUiOr1 Learn more about Apple Arcade: http://apple.co/AppleArcade Game featured: Sneaky Sasquatch by RAC7 Games Music featured: “Secret Agent Man” by Johnny Rivers https://apple.co/-secretagentman Subscribe to … [Read more...] about Sneaky Sasquatch Trailer — Apple Arcade
The commoditization of mobile espionage software
Threat Research Mobile stalkerware has all sorts of wide-ranging consequences. The creators of these types of apps can track user’s locations, see their social media usage and more. And they certainly open the door for abuse by governments hoping to spy on their citizens, parents looking to track their children or controlling spouses hoping to … [Read more...] about The commoditization of mobile espionage software
How to gain visibility into Mobile Devices
Introduction Falcon for Mobile is CrowdStrike’s EDR solution on mobile devices. Falcon for Mobile monitors and records activities taking place on Android and iOS, providing the visibility necessary to detect attackers, malicious insider activity, and corporate data leakage Falcon for Mobile allows organizations to benefit from powerful reporting, investigation, and threat … [Read more...] about How to gain visibility into Mobile Devices