Android Banking Trojan SOVA Comes Back With New Features Including Ransomware

Read Time:4 Second

SOVA v4 features new capabilities and is reportedly targeting more than 200 mobile applications

Read More

CVE-2021-0975 (android)

Read Time:16 Second

In USB Manager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure of installed packages with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-180104273

Read More

CVE-2021-0735 (android)

Read Time:16 Second

In PackageManager, there is a possible way to get information about installed packages ignoring limitations introduced in Android 11 due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-188913056

Read More

CVE-2021-0734 (android)

Read Time:18 Second

In Settings, there is a possible way to determine whether an app is installed without query permissions, due to side channel information disclosure. This could lead to local information disclosure of an installed package, without proper query permissions, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-189122911

Read More

What happened to the Lapsus$ hackers?

Read Time:21 Second

[Editor’s note: This article originally appeared on the CSO Germany website on July 29.]

Claire Tills, senior research engineer at Tenable, describes the methods of the hacking group Lapsus$ as bold, illogical and poorly thought out. The criminals attacked renowned companies such as MicrosoftSamsungNvidia, Vodafone, Ubisoft and Okta. They stole data and sometimes used ransomware to extort their victims.

To read this article in full, please click here

Read More

Hacking Starlink

Read Time:9 Second

This is the first—of many, I assume—hack of Starlink. Leveraging a string of vulnerabilities, attackers can access the Starlink system and run custom code on the devices.

Read More