David Blanc
banner
speekha.bsky.social
David Blanc
@speekha.bsky.social
Mobile Security Expert at BPCE-SI. Former #Android lead developer. Definite Kotlin lover. Author of HttpMocker.
Reposted by David Blanc
Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices
Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices
thehackernews.com
February 12, 2026 at 7:26 AM
Reposted by David Blanc
Ouch, looks like 42% of all Android devices are running a version that is outdated and no longer receives patches. And only 7.5% are on the current release.

9to5google.com/2026/01/30/a...
Android 16 is on 7.5% of devices in latest distribution numbers update
Google has updated Android’s distribution numbers again, this time revealing that Android 16 is already on 7.5% of devices, with...
9to5google.com
February 10, 2026 at 10:29 AM
Reposted by David Blanc
Malicious App on The Google Play with 50K+ Downloads Deploy Anatsa Banking Malware
Malicious App on The Google Play with 50K+ Downloads Deploy Anatsa Banking Malware
A dangerous banking malware called Anatsa has been discovered spreading through the Google Play Store, reaching more than fifty thousand downloads before detection. The malicious application was cleverly hidden as a document reader, making it appear harmless to unsuspecting users searching for legitimate file management tools. This discovery highlights how cybercriminals continue to exploit official app stores as distribution channels for sophisticated financial threats targeting Android users worldwide. The Anatsa banking trojan is particularly concerning because it specifically targets banking credentials and sensitive financial information from infected devices. The malware operates as an installer that downloads and deploys the full Anatsa banking trojan payload once the initial application gains access to a device. Users who downloaded and installed this fake document reader application unknowingly gave the malware permission to operate with elevated access, creating a gateway for financial theft and personal data extraction . The distribution method through Google’s official marketplace made this attack particularly effective, as users typically trust applications found on authorized platforms. This represents a significant breach in app store security screening processes, demonstrating how malicious developers continue to evade detection systems. Zscaler ThreatLabz analysts identified this malicious application and immediately began tracking its distribution network and associated command-and-control infrastructure. The security researchers confirmed the malware’s connection to banking theft operations and provided detailed technical indicators to help other security teams detect infected devices. ThreatLabz has identified another malicious app on the Google Play Store disguised as a document reader. The app currently has over 50K downloads and serves as an installer for the Anatsa banking trojan. IOCs below: Google Play URL:… pic.twitter.com/fAuREdKiQF — Zscaler ThreatLabz (@Threatlabz) February 2, 2026 Their investigation revealed the attack chain and documented how the malware communicates with external servers to receive commands and exfiltrate stolen banking information. Analyzing the Malware’s Infection and Communication Mechanism Understanding how Anatsa establishes persistence on infected Android devices is crucial for users and security professionals seeking to prevent compromise. Once installed, the banking trojan integrates itself into the operating system and actively monitors user activity, particularly focusing on banking application interactions. When users open their banking applications or enter financial credentials, the malware captures this sensitive information through overlay attacks and credential logging techniques. The malware then communicates with command-and-control servers located at specific IP addresses, transmitting stolen banking details directly to threat actors. This direct connection to attacker-controlled infrastructure means compromised devices remain under active threat actor control, continuously feeding banking information and session tokens to criminal operations. Security researchers recommend users immediately remove any suspicious document reader applications, verify app authenticity through official channels, and enable multi-factor authentication on all banking accounts to mitigate potential compromise risks. Follow us on  Google News ,  LinkedIn , and  X  to Get More Instant Updates ,  Set CSN as a Preferred Source in  Google . The post Malicious App on The Google Play with 50K+ Downloads Deploy Anatsa Banking Malware appeared first on Cyber Security News .
cybersecuritynews.com
February 3, 2026 at 7:35 AM
Reposted by David Blanc
Fake apps, NFC skimming attacks, and other Android issues in 2026 | Kaspersky official blog
Fake apps, NFC skimming attacks, and other Android issues in 2026
How to safely use Android devices in the face of 2026's new security threats
www.kaspersky.co.uk
January 27, 2026 at 9:03 PM
Reposted by David Blanc
experienced engineers: one change, test, one change, test
junior engineers: batch everything because they're in a hurry
this is exactly backwards
the person least capable of batching is the one most likely to batch
January 28, 2026 at 1:33 AM
Reposted by David Blanc
New AI-Android Malware that Auto Clicks Ads from the Infected Devices
New AI-Android Malware that Auto Clicks Ads from the Infected Devices
A dangerous Android malware campaign has emerged, targeting users through mobile games and pirated streaming app modifications. The threat, known as Android.Phantom, employs machine learning technology to perform automated ad-click fraud on infected smartphones. Over 155,000 downloads of compromised games have been recorded, with additional infections spreading through modified versions of Spotify, YouTube, Netflix, and Deezer across unofficial platforms. Spotify Plus website (Source – Dr.Web) The malware propagates through several channels, including the official GetApps store for Xiaomi devices, where six infected games from developer SHENZHEN RUIREN NETWORK CO., LTD. were discovered. These apps initially launched without malicious code, but updates released in late September introduced the Android.Phantom trojan. GetApps distributing Trojans (Source – Dr.Web) Distribution extends beyond official stores to dedicated modding websites, Telegram channels attracting tens of thousands of subscribers, and Discord servers where administrators actively promote infected downloads. Dr.Web researchers noted that Android.Phantom operates using two distinct modes called phantom and signaling. The malware connects to attacker-controlled command servers that dictate its behavior patterns. Its sophisticated design incorporates TensorFlowJS, a machine learning framework that enables intelligent identification and automated clicking of advertising elements displayed within hidden browsers running on infected devices. The threat consists of multiple interconnected components. Android.Phantom.2.origin serves as the primary variant, later enhanced by Android.Phantom.5, which functions as a dropper delivering remote code loaders. These loaders retrieve additional click-fraud modules designed for specific advertising platforms. How the Machine Learning Attack Works The phantom mode represents the malware’s most advanced capability, utilizing artificial intelligence for fraudulent ad interactions. Android.Phantom.2.origin deploys a hidden browser based on WebView widget technology, loading target websites as directed by command servers. Spotify X with approximately 24,000 subscribers (Source – Dr.Web) The malware then injects JavaScript automation scripts alongside the TensorFlowJS framework. An AI model downloaded from external servers analyzes webpage screenshots captured from a virtual screen, identifying clickable advertisement components. This intelligent approach mimics genuine user behavior, making fraudulent clicks harder for advertising networks to detect compared to basic automated scripts. Follow us on  Google News ,  LinkedIn , and  X  to Get More Instant Updates ,  Set CSN as a Preferred Source in  Google . The post New AI-Android Malware that Auto Clicks Ads from the Infected Devices appeared first on Cyber Security News .
cybersecuritynews.com
January 22, 2026 at 8:45 AM
Reposted by David Blanc
"AI amplifies developer capability. It doesn’t replace the need for people who understand both the problem domain and the technical landscape."

www.caimito.net/en/blog/2025...
Why We've Tried to Replace Developers Every Decade Since 1969
Every decade brings new promises: this time, we'll finally make software development simple enough that we won't need so many developers. From COBOL to AI, the pattern repeats. Business leaders gro...
www.caimito.net
January 22, 2026 at 9:03 AM
Reposted by David Blanc
Upgrading requires a restart, which makes this a win-win: you get the latest protections, and any memory-resident malware is flushed at the same time.
Why iPhone users should update and restart their devices now
Apple has confirmed active exploitation, but full protections are limited to iPhones running iOS 26+ (yes, the one with Liquid Glass).
bit.ly
January 13, 2026 at 2:19 PM
Reposted by David Blanc
Vietnamese banks will be required to disable their mobile banking apps on rooted devices starting in March

Mobile apps will also be disabled if a debugger is attached to the device

www.vietnam.vn/en/may-andro...
Android phones imported from abroad will have difficulty running banking apps starting March 1st.
The new regulations will directly impact jailbroken iPhones and imported Android phones that have been tampered with to install Vietnamese language support or remove unwanted apps.
www.vietnam.vn
January 13, 2026 at 2:56 PM
Reposted by David Blanc
📣⚠️ New Q4 2025 malware report reveals a rise in Android banking trojans, resurgence of Joker malware on Google Play, and widespread use of backdoored apps.

Read: hackread.com/q4-2025-malw...

#CyberSecurity #Android #Malware #MobileThreats #Trojan
Q4 2025 Malware Trends: Telegram Backdoor, Banking Trojans Surge, Joker Returns to Google Play
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
hackread.com
January 13, 2026 at 12:42 PM
Reposted by David Blanc
Watch out as the Astaroth banking Trojan is now spreading via #WhatsApp messages in a Brazil-focused campaign, using friendly-looking ZIP files to auto-infect contacts and steal banking credentials and data.

Read: hackread.com/astaroth-ban...

#Astaroth #Malware #Cybersecurity #Banking #Brazil
Astaroth Banking Trojan Targets Brazilians via WhatsApp Messages
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
hackread.com
January 8, 2026 at 9:17 PM
Reposted by David Blanc
WhatsApp Vulnerabilities Leaks User’s Metadata Including Device’s Operating System
WhatsApp Vulnerabilities Leaks User’s Metadata Including Device’s Operating System
cybersecuritynews.com
January 5, 2026 at 5:15 PM
Reposted by David Blanc
Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks
Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks
thehackernews.com
January 5, 2026 at 5:55 PM
Reposted by David Blanc
Mobile devices are the main gateway to our money, identity, and personal lives. And with mobile users 39% more likely to click a link on their phone than on their laptop, protecting your device is more important than ever.

Learn more in our Android threat report.
https://bit.ly/4pLuoOq
December 17, 2025 at 2:55 PM
Reposted by David Blanc
Threat actors are abusing the legitimate device-linking feature to hijack WhatsApp accounts via pairing codes in a campaign dubbed GhostPairing.
WhatsApp device linking abused in account hijacking attacks
Threat actors are abusing the legitimate device-linking feature to hijack WhatsApp accounts via pairing codes in a campaign dubbed GhostPairing.
www.bleepingcomputer.com
December 17, 2025 at 7:14 PM
Reposted by David Blanc
'Cellik' Android RAT Leverages Google Play Store
'Cellik' Android RAT Leverages Google Play Store
The remote access Trojan lets an attacker remotely control a victim's phone and can generate malicious apps from inside the Play Store.
www.darkreading.com
December 17, 2025 at 10:06 PM
Reposted by David Blanc
Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
thehackernews.com
December 18, 2025 at 9:38 AM
Reposted by David Blanc
New Android Malware Mimic as mParivahan and e-Challan Attacking Android Users to Steal Login Credentials
New Android Malware Mimic as mParivahan and e-Challan Attacking Android Users to Steal Login Credentials
cybersecuritynews.com
December 15, 2025 at 2:31 PM
Reposted by David Blanc
Apple 0-Day Vulnerabilities Exploited in Sophisticated Attacks Targeting iPhone Users
Apple 0-Day Vulnerabilities Exploited in Sophisticated Attacks Targeting iPhone Users
cybersecuritynews.com
December 13, 2025 at 2:54 AM
Reposted by David Blanc
New DroidLock malware locks Android devices and demands a ransom
New DroidLock malware locks Android devices and demands a ransom
A new Android malware called DroidLock has emerged with capabilities to lock screens for ransom payments, erase data, access text messages, call logs, contacts, and audio data.
www.bleepingcomputer.com
December 10, 2025 at 10:35 PM
Reposted by David Blanc
Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features
Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features
thehackernews.com
December 8, 2025 at 11:33 AM
Reposted by David Blanc
Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware
Malicious Document Reader App in Google Play With 50K Downloads Installs Anatsa Malware
cybersecuritynews.com
December 8, 2025 at 5:49 PM
Reposted by David Blanc
Google has released the December 2025 Android security bulletin, addressing 107 vulnerabilities, including two flaws actively exploited in targeted attacks.
Google fixes two Android zero days exploited in attacks, 107 flaws
Google has released the December 2025 Android security bulletin, addressing 107 vulnerabilities, including two flaws actively exploited in targeted attacks.
www.bleepingcomputer.com
December 2, 2025 at 2:37 PM