X

Vous n'êtes pas connecté

  - SECURITYAFFAIRS.CO - A La Une - 15/Jul 17:14

Android Malware Konfety evolves with ZIP manipulation and dynamic loading

A new Konfety Android malware variant uses a malformed ZIP and obfuscation to evade detection, posing as fake apps with no real functionality. Zimperium zLabs researchers are tracking a new, sophisticated Konfety Android malware variant that uses an “evil-twin” tactic and duplicate package names to avoid detection. The new Konfety malware variants use malformed ZIP, […]

Articles similaires

Sorry! Image not available at this time

Android malware Konfety uses malformed APKs to evade detection

bleepingcomputer.com - 15/Jul 13:10

A new variant of the Konfety Android malware emerged with a malformed ZIP structure along with other obfuscation methods that allow it to evade...

Sorry! Image not available at this time

Android malware Konfety uses malformed APKs to evade detection

bleepingcomputer.com - 15/Jul 13:10

A new variant of the Konfety Android malware emerged with a malformed ZIP structure along with other obfuscation methods that allow it to evade...

Sorry! Image not available at this time

XwormRAT Hackers Leverage Code Injection for Sophisticated Malware Deployment

itsecuritynews.info - 09/Jul 11:40

A sophisticated new distribution method for XwormRAT malware that leverages steganography techniques to hide malicious code within legitimate files....

Sorry! Image not available at this time

Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware Techniques

itsecuritynews.info - 11/Jul 11:05

SLOW#TEMPEST malware uses dynamic jumps and obfuscated calls to evade detection. Unit 42 details these techniques and how to defeat them with...

Sorry! Image not available at this time

Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware Techniques

itsecuritynews.info - 11/Jul 11:05

SLOW#TEMPEST malware uses dynamic jumps and obfuscated calls to evade detection. Unit 42 details these techniques and how to defeat them with...

Sorry! Image not available at this time

SparkKitty Malware Attacking iOS and Android Device Users to Steal Photos From Gallery

itsecuritynews.info - 09/Jul 11:39

A sophisticated Trojan malware known as SparkKitty has been actively targeting iOS and Android devices since early 2024, infiltrating both official...

Sorry! Image not available at this time

New malware uses AI to bypass protection

it-online.co.za - 10/Jul 09:38

Kathy Gibson reports – Researchers have uncovered new malware threats that use artificial intelligence (AI) to bypass existing malware detection....

Sorry! Image not available at this time

TECNO Camon 40 Pro Now Available in Sandy Titanium Color

wn.com - 15/Jul 07:39

<p>Pakistan (UrduPoint / Pakistan Point News - 15th Jul, 2025) TECNO has introduced the Camon 40 Pro <strong>Sandy Titanium</strong>...

Sorry! Image not available at this time

TECNO Camon 40 Pro Now Available in Sandy Titanium Color

wn.com - 15/Jul 07:39

<p>Pakistan (UrduPoint / Pakistan Point News - 15th Jul, 2025) TECNO has introduced the Camon 40 Pro <strong>Sandy Titanium</strong>...

Sorry! Image not available at this time

North Korea-linked actors spread XORIndex malware via 67 malicious npm packages

securityaffairs.co - 15/Jul 09:48

North Korea-linked hackers uploaded 67 malicious npm packages with XORIndex malware, hitting 17K+ downloads in ongoing supply chain attacks. North...