Meet Guardio - a powerful online protection tool that keeps you safe while you browse, shop, and live your digital life.
โ Blocks scam sites, phishing & malicious pop-ups
โ Alerts you instantly if your personal info or SSN is leaked
โ Protects your identity, accounts & mobile in real-time
๐ Try it for free for 7 days, no strings attached!
โ Blocks scam sites, phishing & malicious pop-ups
โ Alerts you instantly if your personal info or SSN is leaked
โ Protects your identity, accounts & mobile in real-time
๐ Try it for free for 7 days, no strings attached!
๐6๐คฎ4๐คก4๐2
PlayPraetor's evolving threat: How Chinese-speaking actors globally scale an Android RAT
https://www.cleafy.com/cleafy-labs/playpraetors-evolving-threat-how-chinese-speaking-actors-globally-scale-an-android-rat
https://www.cleafy.com/cleafy-labs/playpraetors-evolving-threat-how-chinese-speaking-actors-globally-scale-an-android-rat
Cleafy
PlayPraetor's evolving threat: How Chinese-speaking actors globally scale an Android RAT | Cleafy
The Cleafy Threat Intelligence Team has uncovered a large-scale Malware-as-a-Service (MaaS) operation orchestrated by Chinese-speaking Threat Actors. The operation has globally infected over 11,000 Android devices by deploying the PlayPraetor Remote Accessโฆ
โค11๐6๐ค1
Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed
https://zimperium.com/blog/behind-random-words-doubletrouble-mobile-banking-trojan-revealed
https://zimperium.com/blog/behind-random-words-doubletrouble-mobile-banking-trojan-revealed
Zimperium
Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed
true
โค13๐1
Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto/
McAfee Blog
Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto | McAfee Blog
Authored by Dexter Shin McAfeeโs Mobile Research Team discovered a new Android malware campaign targeting Hindi-speaking users, mainly in India. The
โค11๐2๐พ2๐1๐1
Guardioโs like your digital bodyguard - blocking scams, leaks, and shady stuff before it hits.
Think youโre safe online? Letโs put it to the test.
๐ Take our quick Security Quiz and see how protected you really are.
๐ซ Bye-bye scam sites & phishing traps
๐ Instant alerts if your info gets leaked
๐ฑ Real-time protection for all your devices
๐ Try Guardio free for 7 days - no strings, just safety.
Think youโre safe online? Letโs put it to the test.
๐ Take our quick Security Quiz and see how protected you really are.
๐ซ Bye-bye scam sites & phishing traps
๐ Instant alerts if your info gets leaked
๐ฑ Real-time protection for all your devices
๐ Try Guardio free for 7 days - no strings, just safety.
๐คก19โค8๐4๐ฉ1
JMS โ Mobile Docker, the container image used by JMS in their mobile-security trainings
Info: https://medium.com/@justmobilesec/just-mobile-security-jms-mobile-docker-ba1e6b7f131d
Docker: https://github.com/justmobilesec/just-mobile-security-mobile-docker
Info: https://medium.com/@justmobilesec/just-mobile-security-jms-mobile-docker-ba1e6b7f131d
Docker: https://github.com/justmobilesec/just-mobile-security-mobile-docker
Medium
Just Mobile Security (JMS) Mobile Docker
TL;DR: Weโre sharing JMSโโโMobile Docker, the container image we use in our mobile-security trainings. Itโs based on the OWASP MASTG Toolsโฆ
๐ฅ15โค3๐1
Forwarded from The Bug Bounty Hunter
From Signal to the Android SDK: Chaining Path Traversal, Mimetype Confusion, Security Check Bypass and File Descriptor Bruteforce for Arbitrary File Access
https://blog.ostorlab.co/signal-arbitrary-file-read.html
https://blog.ostorlab.co/signal-arbitrary-file-read.html
blog.ostorlab.co
Ostorlab: Mobile App Security Testing for Android and iOS
This technical analysis reveals how sophisticated attack chainsโcombining path traversal, symbolic link manipulation, and Android SDK quirksโcan breach Signal Android's defenses to extract sensitive internal files, despite its legendary encryption remainingโฆ
๐13โค7
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G LTE Routers
Slides and demos: https://github.com/actuator/DEFCON-33
Slides and demos: https://github.com/actuator/DEFCON-33
GitHub
GitHub - actuator/DEFCON-33: Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTEโฆ
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers - actuator/DEFCON-33
๐ฅ17โค3๐3
Android backdoor spies on employees of Russian business
https://forum.drweb.com/index.php?showtopic=339295
https://forum.drweb.com/index.php?showtopic=339295
Dr.Web forum
Android-ะฑัะบะดะพั ัะฟะธะพะฝะธั ะทะฐ ัะพัััะดะฝะธะบะฐะผะธ ัะพััะธะนัะบะพะณะพ ะฑะธะทะฝะตัะฐ - ะะพะฒะพััะธ ะบะพะผะฟะฐะฝะธะธ
Android-ะฑัะบะดะพั ัะฟะธะพะฝะธั ะทะฐ ัะพัััะดะฝะธะบะฐะผะธ ัะพััะธะนัะบะพะณะพ ะฑะธะทะฝะตัะฐ - posted in ะะพะฒะพััะธ ะบะพะผะฟะฐะฝะธะธ: 12 ะฐะฒะณัััะฐ 2025 ะณะพะดะฐะะพะผะฟะฐะฝะธั ยซะะพะบัะพั ะะตะฑยป ัะพะพะฑัะฐะตั ะพ ัะฐัะฟัะพัััะฐะฝะตะฝะธะธ ะผะฝะพะณะพััะฝะบัะธะพะฝะฐะปัะฝะพะณะพ ะฑัะบะดะพัะฐ Android.Backdoor.916.origin ะดะปั ะผะพะฑะธะปัะฝัั
Android-ััััะพะนััะฒ, ะบะพัะพััะนโฆ
๐10โค4๐2๐ญ1
Gain Control of Rooted Android Devices by Exploiting One Vulnerability in KernelSU
https://zimperium.com/blog/the-rooting-of-all-evil-security-holes-that-could-compromise-your-mobile-device
https://zimperium.com/blog/the-rooting-of-all-evil-security-holes-that-could-compromise-your-mobile-device
Zimperium
The Root(ing) Of All Evil: Security Holes That Could Compromise Your Mobile Device
true
๐13โค4๐ฅ1๐คฎ1
PhantomCard: New NFC-driven Android malware emerging in Brazil
https://www.threatfabric.com/blogs/phantomcard-new-nfc-driven-android-malware-emerging-in-brazil
https://www.threatfabric.com/blogs/phantomcard-new-nfc-driven-android-malware-emerging-in-brazil
ThreatFabric
PhantomCard: New NFC-driven Android malware emerging in Brazil ๐ง๐ท
PhantomCard is a sophisticated Android malware leveraging NFC relaying techniques.
๐ฅ8๐คฃ7โค4๐2๐1
Exposes and Analyzes of ERMAC V3.0 Banking Trojan Full Source Code Leak
https://hunt.io/blog/ermac-v3-banking-trojan-source-code-leak
https://hunt.io/blog/ermac-v3-banking-trojan-source-code-leak
hunt.io
ERMAC V3.0 Banking Trojan: Full Source Code Leak and Infrastructure Analysis
Hunt.io uncovers the complete ERMAC V3.0 source code, revealing its infrastructure, vulnerabilities, and expanded form injection capabilities.
๐9๐3โค2๐คฃ1
Reversing Android Apps: Bypassing Detection Like a Pro
https://www.kayssel.com/newsletter/issue-12/
https://www.kayssel.com/newsletter/issue-12/
Kayssel
Reversing Android Apps: Bypassing Detection Like a Pro
Techniques to bypass root, Frida, and SSL protections in modern Android apps
โค20๐ฅ9๐1
Android Malware Promises Energy Subsidy to Steal Financial Data
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-malware-promises-energy-subsidy-to-steal-financial-data/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-malware-promises-energy-subsidy-to-steal-financial-data/
McAfee Blog
Android Malware Promises Energy Subsidy to Steal Financial Data | McAfee Blog
Authored by ZePeng Chen Recently, we identified an active Android phishing campaign targeting Indian users. The attackers impersonate a government
โค7๐4๐คฃ4
Lazarus Stealer : Android Malware for Russian Bank Credential Theft Through Overlay and SMS Manipulation
https://www.cyfirma.com/research/lazarus-stealer-android-malware-for-russian-bank-credential-theft-through-overlay-and-sms-manipulation/
https://www.cyfirma.com/research/lazarus-stealer-android-malware-for-russian-bank-credential-theft-through-overlay-and-sms-manipulation/
CYFIRMA
Lazarus Stealer : Android Malware for Russian Bank Credential Theft Through Overlay and SMS Manipulation - CYFIRMA
EXECUTIVE SUMMARY At CYFIRMA, we deliver actionable intelligence on emerging cyber threats impacting both individuals and organizations. This report analyzes...
๐12๐1
Step by Step Complete Beginners guide of iOS penetration testing
https://infosecwriteups.com/step-by-step-complete-beginners-guide-of-ios-penetration-testing-17092c0e0dc7
https://infosecwriteups.com/step-by-step-complete-beginners-guide-of-ios-penetration-testing-17092c0e0dc7
Medium
Step by Step Complete Beginners guide of iOS penetration testing
Greetings fellow hackers, my name is Sandy, Security Analyst and Bug bounty hunter.
๐9โค5๐3๐1
Full exploit chain of FiberGateway router via public wifi network
https://r0ny.net/FiberGateway-GR241AG-Full-Exploit-Chain/
https://r0ny.net/FiberGateway-GR241AG-Full-Exploit-Chain/
r0ny
FiberGateway GR241AG - Full Exploit Chain
During the year of 2023 Iโve identified that it was possible to obtain full control of the FiberGateway GR241AG router (root access), provided by a Portuguese ISP (Meo), via the public wifi network โMEO WiFiโ. This wifi network is enabled by default and canโฆ
๐6โค3๐ฅ2
Samsung S24 Exploit Chain Pwn2Own 2024 Walkthrough
https://medium.com/@happyjester80/samsung-s24-exploit-chain-pwn2own-2024-walkthrough-c7a3da9a7a26
https://medium.com/@happyjester80/samsung-s24-exploit-chain-pwn2own-2024-walkthrough-c7a3da9a7a26
Medium
Samsung S24 Exploit Chain Pwn2Own 2024 Walkthrough
ุจูุณูู
ู ุงููููููู ุงูุฑููุญูู
ูููฐูู ุงูุฑููุญููู
ู
๐11๐6๐ฅ4
Xiaomi 13 Pro Code Execution via GetApps DOM Cross-Site Scripting (XSS) from Pwn2Own 2023
https://medium.com/@happyjester80/xiaomi-13-pro-code-execution-via-getapps-dom-cross-site-scripting-xss-6590cf35fb27
https://medium.com/@happyjester80/xiaomi-13-pro-code-execution-via-getapps-dom-cross-site-scripting-xss-6590cf35fb27
Medium
Xiaomi 13 Pro Code Execution via GetApps DOM Cross-Site Scripting (XSS)
ุจูุณูู
ู ุงููููููู ุงูุฑููุญูู
ูููฐูู ุงูุฑููุญููู
ู
โค10๐8๐ป2๐2
Hidden Links: Analyzing Secret Families of VPN Apps
https://www.petsymposium.org/foci/2025/foci-2025-0008.pdf
https://www.petsymposium.org/foci/2025/foci-2025-0008.pdf
๐13
Android Document Readers and Deception: Tracking the Latest Updates to Anatsa
https://www.zscaler.com/blogs/security-research/android-document-readers-and-deception-tracking-latest-updates-anatsa
https://www.zscaler.com/blogs/security-research/android-document-readers-and-deception-tracking-latest-updates-anatsa
Zscaler
Anatsaโs Latest Updates | ThreatLabz
This analysis explores the latest updates to the Anatsa Android malware family.
๐9๐4