BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
β€’
Β© 2026
β€’
blacktemple.net
  1. Feed
  2. /Tags
  3. /mobile-malware

Tag: mobile-malware

highMalware & Threats

Trojanized Red Alert App Targets Israeli Users via Fake Government SMS

Researchers at Acronis uncovered a trojanized version of Israel's Red Alert rocket warning app being distributed through fake government SMS messages. The malware maintains full alert functionality while secretly harvesting GPS data, SMS messages, and contact lists from infected Android devices.

Mar 8, 2026Hackread
mobile-malwaretrojanspyware
🏴Play
πŸ‡ΊπŸ‡ΈGoogleπŸ‡ΊπŸ‡ΈApple
criticalMalware & Threats

Critical VMware RCE Exploited, Major Breaches Hit LexisNexis and AkzoNobel

CISA confirmed active exploitation of a VMware Aria Operations RCE vulnerability, adding it to the KEV catalog. Major data breaches impacted LexisNexis and AkzoNobel, while threat actors continue leveraging OAuth flows and compromised infrastructure for attacks.

Mar 4, 2026BleepingComputer, Graham Cluley, Checkpoint Research, Malwarebytes Labs, SecureList (Kaspersky)
vmwarecisa-kevdata-breach
🏴Play
πŸ‡ΊπŸ‡ΈLexisNexisπŸ‡ΊπŸ‡ΈMeta PlatformsπŸ‡ΊπŸ‡ΈGoogle
mediumData Breaches & Incidents

Data Breach Intelligence: New Mobile Surveillance Malware, Victim Notification Gaps, and 2026 Threat Evolution

A new malware-as-a-service called ZeroDayRAT claims comprehensive surveillance capabilities on Android and iOS devices. Security researcher Troy Hunt highlights ongoing issues with breach notification delays affecting victims.

Feb 24, 2026Hackread, Troy Hunt
mobile-malwaredata-breachessurveillance
πŸ‡¦πŸ‡ͺTelegram
highIndustry & Policy

Security Roundup: AI Agents Break Guardrails, Supply Chain Attacks, and Rising DDoS Threat

AI agents ignore security controls, supply chain attack hits npm, advanced phishing bypasses MFA, and DDoS attacks reach alarming levels in this week's security developments.

Feb 20, 2026Dark Reading, Infosecurity Magazine
ai-securitysupply-chain-attacksphishing
πŸ‡ΊπŸ‡ΈGoogle