Mobile Threat Watch Series

French Advisory Reveals Surge in Apple Spyware Activity

French CERT-FR reveals a rise in spyware attacks on Apple devices via iCloud, exploiting zero-day vulnerabilities and issuing delayed threat notifications.

Read More

PhantomCall Malware Disguised as Fake Chrome Apps Orchestrates Global Banking Fraud

PhantomCall malware uses fake Chrome apps to deceive Android users into granting high-risk permissions, allowing financial theft by hijacking communication channels globally. Read the full analysis.

Read More

Mobile Driver’s Licenses Bring New Digital ID Risks Alongside Convenience

Digital IDs and mobile driver's licenses offer convenience and security but come with risks like malware and privacy issues. Learn more about these challenges and their implications.

Read More

Mobile App Security Gaps Widen as Overconfidence Masks Real Risks

Mobile app security is increasingly compromised as rapid development prioritizes speed over protection, leaving developers vulnerable to significant threats like code tampering and data leakage.

Read More

iCloud Calendar Invites Abused to Phish PayPal Users via Legitimate Infrastructure

Attackers exploit iCloud Calendar invites, using Apple's servers to phish PayPal users by sending credible-looking event invitations that prompt recipients to call a support number.

Read More

Hidden VPN App Families Expose Users via Shared Secrets and Ownership Deception

VPN apps with over 700 million downloads on Google Play expose users to risks through shared secrets and security flaws, compromising privacy protections.

Read More

SIM Swapping Attacks Surge Globally, Fueled by Breaches and Leaks

SIM-swapping attacks surge globally, driven by breaches and leaks, with a significant rise since 2022. Learn more about this growing threat to mobile security.

Read More

Over 143,000 Malware Files Target Android and iOS Users in Q2 2025

Mobile malware surged with over 143,000 unique files targeting Android and iOS users in Q2 2025, highlighting growing mobile threats and security challenges.

Read More

Android Security Update Fixes Actively Exploited High-Severity Vulnerabilities

Android Security Update resolves high-severity vulnerabilities actively exploited. Stay informed on mobile threats and security measures in our latest blog post.

Read More

Malvertising on Meta Serves Android Users a Crypto-Stealing Trojan

Malvertising on Meta's ad platforms is tricking Android users into downloading a crypto-stealing trojan, highlighting the evolution of mobile malvertising and financial malware threats.

Read More

Mobile Development Speed Increasingly Outpaces Essential Security Measures

Rapid mobile app development often neglects essential security, leading to risks like insecure APIs and unpatched components, warns researchers. Read more on the increasing gap in mobile security.

Read More

Android Droppers Evolve to Deliver Spyware and SMS Stealers Under the Radar

Android dropper apps are evolving to deliver spyware and SMS stealers, bypassing detection and posing growing threats to mobile security, particularly in India and Asia.

Read More

Hackers Weaponize QR Codes to Lure Mobile Users into Malicious Links

Hackers are using QR codes to redirect mobile users to malicious sites, exploiting the convenience and trust in QR-based access. Learn about these new mobile threats.

Read More

Attackers Abuse Google Classroom to Launch Phishing Campaigns Against Mobile Users

Attackers exploit Google Classroom to send phishing invites, directing victims to WhatsApp for further fraud attempts. Read more about this alarming trend.

Read More

Mobile Social Engineering Escalates with Smishing, Vishing, and Quishing Trends

Mobile social engineering attacks like smishing, vishing, and quishing are on the rise, exploiting user trust and bypassing traditional security defenses. Discover the latest trends and threats.

Read More

“Ghost Tapping” Scam Loads Stolen Card Data onto Mobile Wallets

Discover the "ghost tapping" scam exploiting mobile wallets to load stolen card data onto burner phones for unauthorized transactions, increasing risks for consumers and financial institutions.

Read More

Threat Actors Refine Android Droppers to Stealthily Deploy Mobile Malware

Refined Android droppers are now bypassing defenses to deploy malware stealthily, posing increased risks to mobile security. Stay informed with the latest updates.

Read More

Anti-Tamper Protections Strengthen Mobile Apps Against Runtime Threats

Mobile apps without anti-tamper protections are vulnerable to runtime attacks, reverse engineering, and malicious repackaging, risking sensitive data and functionality.

Read More

South Asian APT Hackers Deploy Novel Android Malware Against Military-Adjacent Phones

South Asian APT hackers use advanced Android malware in targeted phishing campaigns against military-adjacent phones in South Asia. Read more on recent cyber threats and defenses.

Read More

Delete Messages Containing “.XIN” to Avoid Mobile Phishing Risks

Delete messages with ".XIN" links to avoid mobile phishing risks that steal credentials and malware. Stay informed on mobile threat trends.

Read More

QR Code ‘Quishing’ Attacks Exploit Trust to Steal Data from Mobile Users

QR code attacks exploit user trust to redirect to phishing sites or install malware. Learn how these tactics bypass traditional defenses and what you can do to protect yourself.

Read More

Mobile Phishers Target Brokerage Customers in Ramp-and-Dump Scam

Mobile phishing attacks are rising, targeting digital identity wallets and demanding robust security measures to counter threats and comply with new EU regulations.

Read More

Digital Identity Wallets Face Growing Mobile Security and Regulatory Challenges

Digital identity wallets on mobile devices face rising security threats and upcoming EU regulations, urging developers to enhance protection measures.

Read More

Android Malware Abuses NFC to Steal Banking Credentials

Android malware exploits NFC to steal banking credentials through fake "card protection" apps, tricking users into revealing sensitive information. Read more about the threat and latest mobile security news.

Read More

SparkKitty Malware Sneaks into Trusted Mobile Apps to Harvest Sensitive Photos

SparkKitty Malware infiltrates trusted mobile apps to steal sensitive photos, risking exposure of recovery phrases and ID images on both Android and iOS.

Read More

VexTrio TDS System Spreading Fake VPNs and Optimizers via Official App Stores

VexTrio TDS is distributing fake VPNs and system optimizers via Google Play and Apple’s App Store, warns a recent Cyber Security News report.

Read More

Millions Affected in Massive Telecom Data Breach

French mobile operator suffers a cyberattack, exposing personal data of 6.4 million customers, including contact details and bank account numbers.

Read More

Surge in Compromised Credentials in 2025

Surge in compromised credentials in 2025 highlights the need for better mobile security measures to protect personal and enterprise accounts from phishing and malware attacks.

Read More

Data Breach Trends Highlight Mobile and Credential Risks

Data breaches often start on mobile devices, highlighting the need for robust mobile security and threat detection to minimize risks and costs.

Read More

Hackers Are Cracking Mobile Browsers to Bypass Security

Mobile browsers are being targeted by hackers injecting malicious code to trick users into installing fake apps, stealing credentials, and hijacking sessions.

Read More

Healthcare Faces Security Risks from Shared Mobile Devices

Healthcare organizations' shared mobile device programs face security risks due to poor practices, putting systems at risk of breaches and compliance issues. Read more about this growing concern.

Read More

Instagram Users Targeted by Sneaky New Phishing Scam

Instagram users are being targeted by a new phishing scam involving deceptive emails and DMs. Learn more about this threat and how to stay safe.

Read More

Plug-and-Play Malware Models Target Android Devices

Malware-as-a-service platforms are making Android attacks easier, allowing cybercriminals to rent ready-made malware kits and compromise devices with minimal skill.

Read More

Possible Mobile Service Disruptions Following Suspected Cyberattack

Telecom operator warns of potential mobile service disruptions in France after a suspected cyberattack on internal systems, causing temporary outages for business and consumer users.

Read More

Mobile App Vulnerabilities Can Have Wider Implications

App vulnerabilities in connected environments pose significant risks. Learn how a flaw in an automotive app highlights the importance of app permissions and regular updates.

Read More

Critical Security Flaw Could Let Hackers Bypass Logins

Newly found security flaw could let hackers bypass logins, posing significant risks to unpatched systems. Discover more on this critical vulnerability.

Read More

Email Attacks Continue to Evolve and Expand Their Impact

Email attacks are growing in sophistication and impact, targeting multiple platforms. Learn about recent trends and how to reduce overall risk.

Read More

Global Mobile Phishing Networks Are Getting Smarter

Mobile phishing networks are evolving with AI and automation, making them more dangerous. Organizations must strengthen defenses and educate users to stay protected.

Read More

Surveillance Vendor Exploits SS7 Flaw to Track Phones Worldwide

Surveillance vendor exploits SS7 flaw to track phones globally, raising concerns about telecom network vulnerabilities. Read more about this alarming security issue on TechCrunch.

Read More

Android Users Shouldn’t Disable Authentication Lock Feature, Even Though You Can

Google's new option to disable Android 15's authentication lock could increase device vulnerability, despite its convenience. Learn why keeping it enabled is crucial for security.

Read More