A new version of the Necro malware has infiltrated over 11 million Android devices through apps available on Google Play, exploiting vulnerabilities in software development kits (SDKs) used by legitimate apps. This latest wave of attacks represents a serious threat to Android security, leveraging supply chain attacks to infect devices and deliver malicious payloads. The […]
In 2024, Android penetration testing remains crucial for ensuring the security of mobile devices, which are increasingly becoming targets for cyberattacks. As Android continues to dominate the mobile market, it is vital for individuals and organizations to proactively test their devices for vulnerabilities. By using specialized Android pentesting toolssecurity professionals can identify and mitigate potential […]
CocoaPods, a widely-used dependency manager for iOS and macOS applications, has been found to harbor three critical vulnerabilities, exposing almost all Apple devices to potential supply chain attacks. These vulnerabilities, which went unnoticed for nearly a decade, could have allowed attackers to inject malware into apps. Discovered by cybersecurity experts at EVA Information Security, these […]