Topic: malicious apps
-
Uncover Malicious OAuth Apps in Microsoft 365 with Cazadora
Auditing OAuth applications in Microsoft 365 is critical due to the high risk of malicious apps, which can severely compromise security. Use an open-source script to identify suspicious apps by checking for indicators like mimicry of user names, generic names, or anomalous reply URLs. Huntress re...
Read More » -
Delete These 12 Android Apps Spying on Your Conversations
ESET security researchers discovered twelve apps containing VajraSpy spyware, which can secretly record conversations and steal sensitive data through deceptive tactics. The malware spreads via fake profiles on messaging platforms that build fake romantic relationships to trick users into install...
Read More » -
Your Android's 2FA and Messages Aren't Safe From Hackers
A security flaw called Pixnapping allows malicious apps to intercept sensitive data like two-factor codes and private messages without requiring special permissions by exploiting screen display mechanisms. The attack works by forcing targeted apps to show confidential information on screen, where...
Read More » -
The Hidden Danger of BYOD: Your Personal Device is the Weakest Link
A large majority of organizations globally use Bring Your Own Device policies, but only half formally authorize them, leading to significant security vulnerabilities in remote and hybrid work environments. Unsecured personal devices pose risks like data leakage, malware infections, and shadow IT,...
Read More » -
Beware the 'Pixnapping' Android Attack: What It Is & Why It Matters
Pixnapping is a new Android attack method that uses transparent screen layers to stealthily capture and reconstruct on-screen pixel data, including sensitive two-factor authentication codes. Google has released a partial patch to restrict the blur function enabling this exploit, but researchers f...
Read More » -
Google Relaxes Android Sideloading Restrictions
Google is introducing an "advanced flow" to give experienced Android users more control over sideloading apps, balancing safety and freedom with clear, repeated warnings about risks. The company is requiring developer verification for apps distributed outside the Play Store to combat security thr...
Read More »