A new mobile spyware platform called ZeroDayRAT is targeting iOS and Android users. Here's what you need to know.
Imagine police pulling you over for a routine traffic stop and then taking you to the station. After your release, you notice your phone behaving suspiciously. This is what happened to Serbian ...
The security researchers at Lookout recently discovered Russia’s Gamaredon Group using two Android spyware families, BoneSpy ...
A new Android spyware named 'KoSpy' is linked to North Korean threat actors who have infiltrated Google Play and third-party app store APKPure through at least five malicious apps. According to ...
What’s happened? Security researchers at Palo Alto Networks’ Unit 42 have uncovered an Android spyware campaign called Landfall. The malware exploited a zero-day vulnerability in Samsung Galaxy phones ...
Security researchers have discovered an Android spyware that targeted Samsung Galaxy phones during a nearly year-long hacking campaign. Researchers at Palo Alto Networks’ Unit 42 said the spyware, ...
UPDATE: This story was updated on 1-10-25 to include a statement from a Google spokesperson. A new advanced Android spyware threat called "FireScam" is using a fake Telegram Premium application to ...
LunaSpy Android spyware hides as an antivirus or banking protection app, spreading via messaging apps like Telegram. It fakes virus scans to trick you into granting permissions, then steals data, ...
In this photo illustration, the Facebook, Instagram, WhatsApp, TikTok, and Threads apps logo is displayed on a smartphone screen. iStock *A sophisticated Android spyware campaign, dubbed ClayRat, is ...
Hackers are spreading two families of mobile spyware around the United Arab Emirates (UAE) by masking them as the ToTok app. Ironically, thanks to the peculiar history and cultural standing it enjoys ...
UPDATE: Google’s spokesperson reached out with a statement. The company has confirmed “that users are automatically protected from known versions of this spyware by Google Play Protect, which is on by ...