Phishing Through the App Store: The Silent Surge of Crypto Wallet Impersonators

Introduction The digital convenience promised by mobile apps comes with a concealed cost. As users entrust their smartphones with increasing volumes of sensitive data, threat actors have adapted their methods, embedding malicious payloads within applications masquerading as trusted tools. In a recent wave of phishing campaigns uncovered by the cybersecurity firm Cyble, a new breed … Read more

Meta and Yandex Exploited Android Localhost to De-Anonymize Browsing Activity

Meta and Yandex, two of the world’s most influential data-driven platforms, have been implicated in a tracking method that subverts core privacy protections in Android. The method, discovered by academic researchers from Radboud University, KU Leuven, and IMDEA Networks, relies on the exploitation of localhost communications. This technique enables installed apps to receive and correlate … Read more