Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

TeamPCP Targets Telnyx Package in Latest Software Supply Chain Attack

March 27, 2026

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data

March 27, 2026

New Wave of AiTM Phishing Targets TikTok for Business

March 27, 2026
Facebook X (Twitter) Instagram
Saturday, March 28
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data
News

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data

Team-CWDBy Team-CWDMarch 27, 2026No Comments1 Min Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

Cybersecurity researchers have disclosed a new Android malware family called Perseus that’s being actively distributed in the wild with an aim to conduct device takeover (DTO) and financial fraud.
Perseus is built upon the foundations of Cerberus and Phoenix, at the same time evolving into a “more flexible and capable platform” for compromising Android devices through dropper apps distributed



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew Wave of AiTM Phishing Targets TikTok for Business
Next Article TeamPCP Targets Telnyx Package in Latest Software Supply Chain Attack
Team-CWD
  • Website

Related Posts

News

TeamPCP Targets Telnyx Package in Latest Software Supply Chain Attack

March 27, 2026
News

New Wave of AiTM Phishing Targets TikTok for Business

March 27, 2026
News

How Ceros Gives Security Teams Visibility and Control in Claude Code

March 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Don’t let “back to school” become “back to bullying”

September 11, 2025

Find your weak spots before attackers do

November 21, 2025

Children and chatbots: What parents should know

January 23, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.