Remove Cryptocurrency Remove Data collection Remove Spyware
article thumbnail

Privacy Roundup: Week 12 of Year 2025

Security Boulevard

Android Apps Use Bluetooth and WiFi Scanning to Track Users Without GPS Cyber Insider Researchers found that 86% of apps they analyzed collect sensitive data, including location data stemming from scanning Wi-Fi network details, and collecting device identifiers.

article thumbnail

Advanced threat predictions for 2024

SecureList

This politician became the target of a previously undiscovered “zero-day” attack aimed at infecting his phone with spyware. This attack was highly targeted and showed particular interest in cryptocurrency companies, which may indicate that the ultimate goal of the attackers was financial gain.

Hacking 141
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spam and phishing in 2022

SecureList

These sites referenced public figures and humanitarian groups, offering to accept cash in cryptocurrency, something that should have raised a red flag in itself. By getting the user’s secret phrase, cybercriminals could get access to their cryptocurrency balance. Now, attackers have started collecting Bitcoin for charity.

Phishing 117
article thumbnail

Security Affairs newsletter Round 513 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

from Bybit, it is the largest cryptocurrency heist ever International Press Newsletter Cybercrime Mining Company NioCorp Loses $500,000 in BEC Hack Inside Black Bastas Exposed Internal Chat Logs: A Firsthand Look The Bleeding Edge of Phishing: darcula-suite 3.0

article thumbnail

Security Affairs newsletter Round 509 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA adds Apple products’ flaw to its Known Exploited Vulnerabilities catalog Aquabot variant v3 targets Mitel SIP phones Critical remote code execution bug found in Cacti framework Attackers actively exploit a critical zero-day in Zyxel CPE Series devices Attackers exploit SimpleHelp RMM Software flaws for initial access VMware fixed a flaw (..)