Visibility into runtime threats against mobile apps and APIs still lacking

A new report from Osterman Research codifies the increasing dependence of businesses upon their mobile apps, and reveals a jarring disconnect between the strategic importance of apps versus the level of focus and resources applied to protect organizati… Continue reading Visibility into runtime threats against mobile apps and APIs still lacking

Understanding the Evolution of Cybercrime to Predict its Future

An analysis of the evolution of cybercrime from its beginnings in the 1990s to its billion-dollar presence today has one overriding theme: the development of cybercrime as a business closely mimics the evolution of legitimate business, and will continu… Continue reading Understanding the Evolution of Cybercrime to Predict its Future

Google Introduces DNS-over-HTTP/3 in Android

Google this week announced the rollout of DNS-over-HTTP/3 (DoH3) for Android 11 and newer devices.
An encrypted DNS protocol, DoH3 is expected to provide performance and safety improvements compared to alternatives, mainly through the QUIC transport la… Continue reading Google Introduces DNS-over-HTTP/3 in Android

Ongoing ‘Roaming Mantis’ Smishing Campaign Hits Over 70,000 Users in France

A Chinese threat actor named Roaming Mantis has been targeting Android users in France with the MoqHao malware in a new smishing campaign, security researchers with Sekoia warn.
read more Continue reading Ongoing ‘Roaming Mantis’ Smishing Campaign Hits Over 70,000 Users in France

Researchers Say Thai Pro-Democracy Activists Hit by Spyware

Cybersecurity researchers reported details Monday of cases where Thai activists involved in the country’s pro-democracy protests had their cell phones or other devices infected and attacked with government-sponsored spyware.
read more

Continue reading Researchers Say Thai Pro-Democracy Activists Hit by Spyware

Microsoft Patch Tuesday: 84 Windows Vulns, Including Already-Exploited Zero-Day

Microsoft has issued an urgent Patch Tuesday bulletin to warn of in-the-wild zero-day exploitation of a privilege escalation flaw in the Windows operating system.
read more

Continue reading Microsoft Patch Tuesday: 84 Windows Vulns, Including Already-Exploited Zero-Day

Can ‘Lockdown Mode’ Solve Apple’s Mercenary Spyware Problem?

News Analysis: Cybersecurity experts toss bouquets at Apple for removing attack surface from its flagship platforms and call on competing OS makers to match Cupertino’s attempts to neutralize the mercenary spyware business.
read more

Continue reading Can ‘Lockdown Mode’ Solve Apple’s Mercenary Spyware Problem?

Apple Adds ‘Lockdown Mode’ to Thwart .Gov Mercenary Spyware

Faced with a surge in state-sponsored mercenary spyware attacks targeting its flagship iOS platform, Apple plans to add a new ‘Lockdown Mode’ that significantly reduces attack surface and adds technical roadblocks to limit sophisticated software exploi… Continue reading Apple Adds ‘Lockdown Mode’ to Thwart .Gov Mercenary Spyware