Criminals are renting virtual phones to bypass bank security
Researchers at Group-IB warn about criminals using virtual Android devices to bypass modern security solutions. Cloud phones are virtual...
Researchers at Group-IB warn about criminals using virtual Android devices to bypass modern security solutions. Cloud phones are virtual...
Vojtěch Krejsa, the threat researcher at Gen who first flagged the stealer, calls VoidStealer’s bypass non-noisy. “The bypass requires neither...
Hewlett Packard Enterprise fixes critical authentication bypass in Aruba AOS-CX Pierluigi Paganini March 11, 2026 Hewlett Packard Enterprise (HPE) fixed...
Tycoon 2FA, a major phishing kit and platform that allowed low-skilled cybercriminals to bypass multifactor authentication and conduct large-scale adversary-in-the-middle...
Phishing campaign exploits OAuth redirection to bypass defenses Pierluigi Paganini March 03, 2026 Microsoft researchers warn that threat actors abuse...
Exploitation of a maximum severity authentication bypass zero-day vulnerability affecting Cisco Catalyst SD-WAN Controller and Manager has been reported....
CISA alerts to critical auth bypass CVE-2026-1670 in Honeywell CCTVs Pierluigi Paganini February 19, 2026 CISA warns Honeywell CCTVs are...
Multiple Endpoint Manager bugs patched by Ivanti, including remote auth bypass Pierluigi Paganini February 12, 2026 Ivanti patched over a...
Fortinet patches actively exploited FortiOS SSO auth bypass (CVE-2026-24858) Pierluigi Paganini January 28, 2026 Fortinet released fixes for a critical...
PackageGate bugs let attackers bypass protections in NPM, PNPM, VLT, and Bun Pierluigi Paganini January 28, 2026 Koi researchers found...
Fortinet warns of active FortiCloud SSO bypass affecting updated devices Pierluigi Paganini January 23, 2026 Fortinet confirmed attacks are bypassing...
Machine learning–powered Android Trojans bypass script-based Ad Click detection Pierluigi Paganini January 22, 2026 A new Android click-fraud trojan family...