Operation NoVoice: Android Malware Found in 50+ Apps Can Hijack Devices
McAfee’s mobile research team has uncovered a large-scale Android malware campaign we’re tracking as Operation NoVoice. The campaign was distributed through more than 50 apps...
McAfee’s mobile research team has uncovered a large-scale Android malware campaign we’re tracking as Operation NoVoice. The campaign was distributed through more than 50 apps...
TrendAI™ Research at RSAC 2026: Advancing Defense Across AI‑Driven and Cyber‑Physical Threats | Trend Micro (US) Content has been added...
Authored By: Ahmad Zubair Zahid McAfee’s mobile research team identified and investigated an Android rootkit campaign tracked as Operation Novoice. The malware described...
In this episode, Tom Eston and co-host Scott Wright discuss research showing that Tire Pressure Monitoring Systems (TPMS) can...
Rapid7’s research reveals China-linked kernel implants deep inside telecom signaling infrastructure. Here’s what BPFdoor is, how it evolved, and...
Attribution analysis Based on technical artifacts, infrastructure overlaps, and victimology, TrendAI™ Research attributes this campaign to Pawn Storm with high confidence. This...
Sanchit Vir Gogia, chief analyst at Greyhound Research, said the move goes beyond product consolidation. “This is not a clean...
Sonatype Security Research has identified a potential compromise of a trusted npm maintainer account that has now published two...
In July 2024, Google approached Wiz with a $23 billion acquisition offer. Wiz declined. By 2026, reports suggest Google...
Sonatype Security Research has identified two hijacked npm packages in the React Native ecosystem that receive more than 30,000...
Hackers targeted Poland’s National Centre for Nuclear Research Pierluigi Paganini March 13, 2026 Hackers targeted Poland’s National Centre for Nuclear...
Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of...
Tenable Research revealed “LeakyLooker,” a set of nine novel cross-tenant vulnerabilities in Google Looker Studio. These flaws could have...
New research from Broadcom's Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding...
NisosExposing a Fraudulent DPRK Candidate Executive Summary Since early 2023, Nisos has provided our clients with critical insights and...