🚨 Meet Guardio - a powerful online protection tool that keeps you safe while you browse, shop, and live your digital life.
✅ Blocks scam sites, phishing & malicious pop-ups
✅ Alerts you instantly if your personal info or SSN is leaked
✅ Protects your identity, accounts & mobile in real-time
🎁 Try it FREE for 7 days – plus get up to 72% discount! Give it a try now
✅ Blocks scam sites, phishing & malicious pop-ups
✅ Alerts you instantly if your personal info or SSN is leaked
✅ Protects your identity, accounts & mobile in real-time
🎁 Try it FREE for 7 days – plus get up to 72% discount! Give it a try now
👎25🤡10❤3💩3👍2🎉1🌚1
Debugging the Pixel 8 kernel via KGDB
How to use GDB over a serial connection for debugging the kernel on a Pixel 8
https://xairy.io/articles/pixel-kgdb
How to use GDB over a serial connection for debugging the kernel on a Pixel 8
https://xairy.io/articles/pixel-kgdb
❤17👍3🔥2🌚1
RedHook: A New Android Banking Trojan Targeting Users in Vietnam
https://cyble.com/blog/redhook-new-android-banking-targeting-in-vietnam/
https://cyble.com/blog/redhook-new-android-banking-targeting-in-vietnam/
Cyble
RedHook: A New Android Banking Trojan Targeting Users In Vietnam
RedHook is a new Android banking trojan targeting Vietnamese users via phishing sites posing as trusted financial and government institutions.
🌚8❤1
ToxicPanda: The Android Banking Trojan Targeting Europe
https://www.bitsight.com/blog/toxicpanda-android-banking-malware-2025-study
https://www.bitsight.com/blog/toxicpanda-android-banking-malware-2025-study
Bitsight
ToxicPanda Malware in 2025 | Bitsight TRACE Threat Research
What is ToxicPanda? Bitsight Trace dives into detail on the banking malware, from impact breadth, delivery, technical analysis, and more. Learn more now.
👍14🤩3
Meet Guardio - a powerful online protection tool that keeps you safe while you browse, shop, and live your digital life.
✅ Blocks scam sites, phishing & malicious pop-ups
✅ Alerts you instantly if your personal info or SSN is leaked
✅ Protects your identity, accounts & mobile in real-time
🎁 Try it for free for 7 days, no strings attached!
✅ Blocks scam sites, phishing & malicious pop-ups
✅ Alerts you instantly if your personal info or SSN is leaked
✅ Protects your identity, accounts & mobile in real-time
🎁 Try it for free for 7 days, no strings attached!
🌚6🤮4🤡4👎2
PlayPraetor's evolving threat: How Chinese-speaking actors globally scale an Android RAT
https://www.cleafy.com/cleafy-labs/playpraetors-evolving-threat-how-chinese-speaking-actors-globally-scale-an-android-rat
https://www.cleafy.com/cleafy-labs/playpraetors-evolving-threat-how-chinese-speaking-actors-globally-scale-an-android-rat
Cleafy
PlayPraetor's evolving threat: How Chinese-speaking actors globally scale an Android RAT | Cleafy
The Cleafy Threat Intelligence Team has uncovered a large-scale Malware-as-a-Service (MaaS) operation orchestrated by Chinese-speaking Threat Actors. The operation has globally infected over 11,000 Android devices by deploying the PlayPraetor Remote Access…
❤11🌚6🤔1
Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed
https://zimperium.com/blog/behind-random-words-doubletrouble-mobile-banking-trojan-revealed
https://zimperium.com/blog/behind-random-words-doubletrouble-mobile-banking-trojan-revealed
Zimperium
Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed
true
❤13🌚1
Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-malware-targets-indian-banking-users-to-steal-financial-info-and-mine-crypto/
McAfee Blog
Android Malware Targets Indian Banking Users to Steal Financial Info and Mine Crypto | McAfee Blog
Authored by Dexter Shin McAfee’s Mobile Research Team discovered a new Android malware campaign targeting Hindi-speaking users, mainly in India. The
❤11🌚2👾2👍1😁1
Guardio’s like your digital bodyguard - blocking scams, leaks, and shady stuff before it hits.
Think you’re safe online? Let’s put it to the test.
👉 Take our quick Security Quiz and see how protected you really are.
🚫 Bye-bye scam sites & phishing traps
🔔 Instant alerts if your info gets leaked
📱 Real-time protection for all your devices
🎁 Try Guardio free for 7 days - no strings, just safety.
Think you’re safe online? Let’s put it to the test.
👉 Take our quick Security Quiz and see how protected you really are.
🚫 Bye-bye scam sites & phishing traps
🔔 Instant alerts if your info gets leaked
📱 Real-time protection for all your devices
🎁 Try Guardio free for 7 days - no strings, just safety.
🤡19❤8🌚4💩1
JMS — Mobile Docker, the container image used by JMS in their mobile-security trainings
Info: https://medium.com/@justmobilesec/just-mobile-security-jms-mobile-docker-ba1e6b7f131d
Docker: https://github.com/justmobilesec/just-mobile-security-mobile-docker
Info: https://medium.com/@justmobilesec/just-mobile-security-jms-mobile-docker-ba1e6b7f131d
Docker: https://github.com/justmobilesec/just-mobile-security-mobile-docker
Medium
Just Mobile Security (JMS) Mobile Docker
TL;DR: We’re sharing JMS — Mobile Docker, the container image we use in our mobile-security trainings. It’s based on the OWASP MASTG Tools…
🔥15❤3🌚1
Forwarded from The Bug Bounty Hunter
From Signal to the Android SDK: Chaining Path Traversal, Mimetype Confusion, Security Check Bypass and File Denoscriptor Bruteforce for Arbitrary File Access
https://blog.ostorlab.co/signal-arbitrary-file-read.html
https://blog.ostorlab.co/signal-arbitrary-file-read.html
blog.ostorlab.co
Ostorlab: Mobile App Security Testing for Android and iOS
This technical analysis reveals how sophisticated attack chains—combining path traversal, symbolic link manipulation, and Android SDK quirks—can breach Signal Android's defenses to extract sensitive internal files, despite its legendary encryption remaining…
👍13❤7
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G LTE Routers
Slides and demos: https://github.com/actuator/DEFCON-33
Slides and demos: https://github.com/actuator/DEFCON-33
GitHub
GitHub - actuator/DEFCON-33: Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE…
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers - actuator/DEFCON-33
🔥17❤3🌚3
Android backdoor spies on employees of Russian business
https://forum.drweb.com/index.php?showtopic=339295
https://forum.drweb.com/index.php?showtopic=339295
Dr.Web forum
Android-бэкдор шпионит за сотрудниками российского бизнеса - Новости компании
Android-бэкдор шпионит за сотрудниками российского бизнеса - posted in Новости компании: 12 августа 2025 годаКомпания «Доктор Веб» сообщает о распространении многофункционального бэкдора Android.Backdoor.916.origin для мобильных Android-устройств, который…
🌚10❤4😁2🌭1
Gain Control of Rooted Android Devices by Exploiting One Vulnerability in KernelSU
https://zimperium.com/blog/the-rooting-of-all-evil-security-holes-that-could-compromise-your-mobile-device
https://zimperium.com/blog/the-rooting-of-all-evil-security-holes-that-could-compromise-your-mobile-device
Zimperium
The Root(ing) Of All Evil: Security Holes That Could Compromise Your Mobile Device
true
🌚13❤4🔥1🤮1
PhantomCard: New NFC-driven Android malware emerging in Brazil
https://www.threatfabric.com/blogs/phantomcard-new-nfc-driven-android-malware-emerging-in-brazil
https://www.threatfabric.com/blogs/phantomcard-new-nfc-driven-android-malware-emerging-in-brazil
ThreatFabric
PhantomCard: New NFC-driven Android malware emerging in Brazil 🇧🇷
PhantomCard is a sophisticated Android malware leveraging NFC relaying techniques.
🔥8🤣7❤4🎃2👍1
Exposes and Analyzes of ERMAC V3.0 Banking Trojan Full Source Code Leak
https://hunt.io/blog/ermac-v3-banking-trojan-source-code-leak
https://hunt.io/blog/ermac-v3-banking-trojan-source-code-leak
hunt.io
ERMAC V3.0 Banking Trojan: Full Source Code Leak and Infrastructure Analysis
Hunt.io uncovers the complete ERMAC V3.0 source code, revealing its infrastructure, vulnerabilities, and expanded form injection capabilities.
🌚9👍3❤2🤣1
Reversing Android Apps: Bypassing Detection Like a Pro
https://www.kayssel.com/newsletter/issue-12/
https://www.kayssel.com/newsletter/issue-12/
Kayssel
Reversing Android Apps: Bypassing Detection Like a Pro
Techniques to bypass root, Frida, and SSL protections in modern Android apps
❤20🔥9🌚1
Android Malware Promises Energy Subsidy to Steal Financial Data
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-malware-promises-energy-subsidy-to-steal-financial-data/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/android-malware-promises-energy-subsidy-to-steal-financial-data/
McAfee Blog
Android Malware Promises Energy Subsidy to Steal Financial Data | McAfee Blog
Authored by ZePeng Chen Recently, we identified an active Android phishing campaign targeting Indian users. The attackers impersonate a government
❤7👍4🤣4
Lazarus Stealer : Android Malware for Russian Bank Credential Theft Through Overlay and SMS Manipulation
https://www.cyfirma.com/research/lazarus-stealer-android-malware-for-russian-bank-credential-theft-through-overlay-and-sms-manipulation/
https://www.cyfirma.com/research/lazarus-stealer-android-malware-for-russian-bank-credential-theft-through-overlay-and-sms-manipulation/
CYFIRMA
Lazarus Stealer : Android Malware for Russian Bank Credential Theft Through Overlay and SMS Manipulation - CYFIRMA
EXECUTIVE SUMMARY At CYFIRMA, we deliver actionable intelligence on emerging cyber threats impacting both individuals and organizations. This report analyzes...
👍12🌚1
Step by Step Complete Beginners guide of iOS penetration testing
https://infosecwriteups.com/step-by-step-complete-beginners-guide-of-ios-penetration-testing-17092c0e0dc7
https://infosecwriteups.com/step-by-step-complete-beginners-guide-of-ios-penetration-testing-17092c0e0dc7
Medium
Step by Step Complete Beginners guide of iOS penetration testing
Greetings fellow hackers, my name is Sandy, Security Analyst and Bug bounty hunter.
🌚9❤5👍3👎1
Full exploit chain of FiberGateway router via public wifi network
https://r0ny.net/FiberGateway-GR241AG-Full-Exploit-Chain/
https://r0ny.net/FiberGateway-GR241AG-Full-Exploit-Chain/
r0ny
FiberGateway GR241AG - Full Exploit Chain
During the year of 2023 I’ve identified that it was possible to obtain full control of the FiberGateway GR241AG router (root access), provided by a Portuguese ISP (Meo), via the public wifi network “MEO WiFi”. This wifi network is enabled by default and can…
🌚6❤3🔥2