Tag: spyware
-
75 zero-days seen in 2024 as nations, spyware vendors continue exploitation
by
in SecurityNewsGoogle’s Threat Intelligence team published its annual zero-day report on Tuesday, finding that 75 vulnerabilities were exploited in the wild in 2024, down from 98 in the prior year. First seen on therecord.media Jump to article: therecord.media/google-zero-day-report-2024
-
97 zero-days exploited in 2024, over 50% in spyware attacks
by
in SecurityNewsGoogle’s Threat Intelligence Group (GTIG) says attackers exploited 75 zero-day vulnerabilities in the wild last year, over 50% of which were linked to spyware attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/google-97-zero-days-exploited-in-2024-over-50-percent-in-spyware-attacks/
-
Government hackers are leading the use of attributed zero-days, Google says
by
in SecurityNewsGovernments like China and North Korea, along with spyware makers, used the most recorded zero-days in 2024. First seen on techcrunch.com Jump to article: techcrunch.com/2025/04/29/government-hackers-are-leading-the-use-of-attributed-zero-days-google-says/
-
Citizen Lab says exiled Uyghur leaders targeted with Windows spyware
by
in SecurityNewsThe researchers said the attackers behind the campaign had “deep understanding of the target community.” First seen on techcrunch.com Jump to article: techcrunch.com/2025/04/28/citizen-lab-says-exiled-uyghur-leaders-targeted-with-windows-spyware/
-
âš¡ Weekly Recap: iOS Zero-Days, 4Chan Breach, NTLM Exploits, WhatsApp Spyware & More
by
in SecurityNewsCan a harmless click really lead to a full-blown cyberattack?Surprisingly, yes, and that’s exactly what we saw in last week’s activity. Hackers are getting better at hiding inside everyday actions: opening a file, running a project, or logging in like normal. No loud alerts. No obvious red flags. Just quiet entry through small gaps, like…
-
New Android spyware is targeting Russian military personnel on the front lines
by
in SecurityNewsTrojanized mapping app steals users’ locations, contacts, and more. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/04/russian-military-personnel-on-the-front-lines-targeted-with-new-android-spyware/
-
Apple Zero-Days Under ‘Sophisticated Attack,’ but Details Lacking
by
in SecurityNewsThe technology giant said two zero-day vulnerabilities were used in attacks on iOS devices against specific targeted individuals, which suggests spyware or nation-state threat activity. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/apple-zero-days-sophisticated-attacks
-
SpyMax Android Spyware: Full Remote Access to Monitor Any Activity
by
in SecurityNewsThreat intelligence experts at Perplexity uncovered an advanced variant of the SpyMax/SpyNote family of Android spyware, cleverly disguised as the official application of the Chinese Prosecutor’s Office (检察院). This malicious software was targeting Chinese-speaking users in mainland China and Hong Kong in what appears to be a sophisticated cyber espionage campaign. Exploiting Android Accessibility Services…
-
Will politicization of security clearances make US cybersecurity firms radioactive?
by
in SecurityNews
Tags: access, business, ceo, cisa, cisco, ciso, credentials, crowdstrike, cybersecurity, disinformation, election, government, infrastructure, intelligence, law, microsoft, network, office, risk, spyware, strategy, threatWhat brought this on: This is mostly a reaction to a White House order on Wednesday that tied security clearances to supporting political concepts. The order chastised Chris Krebs, the former head of Trump’s Cybersecurity and Infrastructure Security Agency (CISA). “Krebs’ misconduct involved the censorship of disfavored speech implicating the 2020 election and COVID-19 pandemic. CISA, under…
-
NSO lawyer names Mexico, Saudi Arabia, and Uzbekistan as spyware customers accused of 2019 WhatsApp hacks
by
in SecurityNewsThis is the first time representatives for the spyware maker have publicly named its government customers. First seen on techcrunch.com Jump to article: techcrunch.com/2025/04/16/nso-lawyer-names-mexico-saudi-arabia-and-uzbekistan-as-spyware-customers-accused-of-2019-whatsapp-hacks/
-
NSO lawyer names Mexico, Saudi Arabia, and Uzbekistan as spyware customers behind 2019 WhatsApp hacks
by
in SecurityNewsThis is the first time representatives for the spyware maker have publicly named its government customers. First seen on techcrunch.com Jump to article: techcrunch.com/2025/04/16/nso-lawyer-names-mexico-saudi-arabia-and-uzbekistan-as-spyware-customers-behind-2019-whatsapp-hacks/
-
US to sign Pall Mall pact aimed at countering spyware abuses
by
in SecurityNewsThe U.S. plans to sign an international agreement designed to govern the use of commercial spyware, the State Department said Thursday. First seen on therecord.media Jump to article: therecord.media/us-to-sign-pall-mall-process-code-of-practice-spyware
-
Judges strike skeptical note of NSO Group’s argument to dismiss case from El Salvadoran journos
by
in SecurityNewsDada et al v. NSO Group has been one of many cases where alleged spyware victims have run into jurisdictional hurdles. First seen on cyberscoop.com Jump to article: cyberscoop.com/nso-group-spyware-case-el-salvadoran-journalists/
-
China-Linked Hackers Continue Harassing Ethnic Groups With Spyware
Threat actors are trolling online forums and spreading malicious apps to target Uyghurs, Taiwanese, Tibetans, and other individuals aligned with interests that China sees as a threat to its authority. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/china-continues-harassing-ethnic-groups-spyware
-
Spyware Maker NSO Group Is Paving a Path Back Into Trump’s America
by
in SecurityNewsThe Israeli spyware maker, still on the US Commerce Department’s “blacklist,” has hired a new lobbying firm with direct ties to the Trump administration, a WIRED investigation has found. First seen on wired.com Jump to article: www.wired.com/story/nso-group-the-vogel-group-lobbying-trump-administration/
-
Whatsapp plugs bug allowing RCE with spoofed filenames
by
in SecurityNewsWhatsapp makes for a popular attack vector: Whatsapp has been frequently targeted in the past for its popularity as an encrypted chatting platform. With over 10 billion downloads on Google Play Store alone, the platform makes for a lucrative target for threat actors.A similar security oversight was reported in July 2024 to be affecting the…
-
NCSC issues warning over Chinese Moonshine and BadBazaar spyware
by
in SecurityNewsTwo spyware variants are being used to target the mobile devices of persons of interest to Chinese intelligence, including individuals in the Taiwanese, Tibetan and Uyghur communities First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366622023/NCSC-issues-warning-over-Chinese-Moonshine-and-BadBazaar-spyware
-
As spyware market continues to expand, diplomatic Pall Mall Process hits a pivot point
by
in SecurityNewsThe Pall Mall Process, a diplomatic initiative designed to reform the commercial spyware and hacking market, has added more nations as it confronts an industry that is more complex than ever. First seen on therecord.media Jump to article: therecord.media/pall-mall-process-commercial-spyware-hacking-paris-diplomacy
-
NCSC shares technical details of spyware targeting Uyghur, Tibetan and Taiwanese groups
by
in SecurityNewsThe U.K.’s National Cyber Security Centre and international cybersecurity and intelligence agencies on Wednesday said hackers are deploying two forms of previously identified spyware to snoop on Uyghur, Tibetan and Taiwanese individuals and civil society organizations. First seen on therecord.media Jump to article: therecord.media/ncsc-shares-details-on-spyware-targeting-uyghur-tiben-taiwanese-groups
-
21 Countries Sign Onto Voluntary Pact to Stem the Proliferation of Spyware
by
in SecurityNewsTwenty-one countries signed onto the Pall Mall Process, an effort a year in the making that was created to develop a framework nations could adopt to address the proliferation and malicious use of spyware by governments that want it to track human rights workers, activists, journalists, and other such targets. First seen on securityboulevard.com Jump…
-
Voluntary ‘Pall Mall Process’ seeks to curb spyware abuses
by
in SecurityNews
Tags: spywareThe 21 signatories support a number of steps, such as banning vendors who behave illegally, in a document agreed to last week in Paris. First seen on cyberscoop.com Jump to article: cyberscoop.com/voluntary-pall-mall-process-seeks-to-curb-spyware-abuses/
-
Everest Ransomware Gang’s Leak Site Hacked and Defaced
by
in SecurityNewsTechCrunch has uncovered a concerning development in consumer-grade spyware: a stealthy Android monitoring app that employs password-protected uninstallation to prevent removal. This app, which abuses built-in Android features like overlay permissions and device admin access, exemplifies the escalating technical sophistication of stalkerware tools designed for covert surveillance. While rebooting into >>safe mode
-
Maryland pharmacist used keyloggers to spy on coworkers for a decade, victim alleges
by
in SecurityNewsA Maryland pharmacist installed spyware on hundreds of computers at a major teaching hospital and recorded videos of staff over the course of a decade, a class-action lawsuit alleges. First seen on therecord.media Jump to article: therecord.media/maryland-pharmacist-keylogger-spying-lawsuit
-
New Android Spyware Tricks Users by Demanding Passwords for Uninstallation
A newly identified Android spyware app is elevating its tactics to remain hidden and unremovable by leveraging a password prompt for uninstallation. This unsettling feature effectively blocks users from removing the app unless the correct password”, set by the person who installed the spyware”, is entered. How the Spyware Works The spyware, which TechCrunch decided…
-
Das gehört in Ihr Security-Toolset
by
in SecurityNews
Tags: access, ai, antivirus, authentication, backup, breach, business, cloud, compliance, control, cyberattack, cybersecurity, data, data-breach, defense, detection, edr, firewall, gartner, governance, iam, identity, incident response, intelligence, iot, malware, mfa, ml, mobile, network, password, ransomware, risk, saas, service, software, spyware, threat, tool, update, vulnerability, vulnerability-managementLesen Sie, welche Werkzeuge essenziell sind, um Unternehmen gegen Cybergefahren abzusichern.Sicherheitsentscheider sind mit einer sich kontinuierlich verändernden Bedrohungslandschaft, einem zunehmend strengeren, regulatorischen Umfeld und immer komplexeren IT-Infrastrukturen konfrontiert. Auch deshalb wird die Qualität ihrer Sicherheits-Toolsets immer wichtiger.Das Problem ist nur, dass die Bandbreite der heute verfügbaren Cybersecurity-Lösungen überwältigend ist. Für zusätzliche Verwirrung sorgen dabei nicht…