Threat actors rely on the ‘versioning’ technique to evade malware detections of malicious code uploaded to the Google Play Store. Google Cybersecurity Action Team (GCAT) revealed that threat actors are using a technique called versioning to evade malware detection implemented to detect malicious code uploaded to the Google Play Store. The technique is not new […]
The post Attackers use dynamic code loading to bypass Google Play store’s malware detections appeared first on Security Affairs.
This article has been indexed from Security Affairs
Read the original article: