Remove Accountability Remove Blog Remove Mobile Remove Spyware
article thumbnail

CISA adds bugs exploited by commercial surveillance spyware to Known Exploited Vulnerabilities catalog

Security Affairs

CISA has added nine flaws to its Known Exploited Vulnerabilities catalog, including bugs exploited by commercial spyware on mobile devices. The exploits were used to install commercial spyware and malicious apps on targets’ devices. The experts pointed out that both campaigns were limited and highly targeted.

Spyware 80
article thumbnail

EU officials were targeted with Israeli surveillance software

Security Affairs

One of the officials targeted with the infamous spyware there is Didier Reynders, a senior Belgian statesman who has served as the European Justice Commissioner since 2019. The Pegasus spyware used the ForcedEntry zero-day exploit to compromise the recipients’ devices without their interaction. ” concludes the report.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA adds Zimbra bug exploited in attacks against NATO countries to its Known Exploited Vulnerabilities catalog

Security Affairs

The attacker can also use the compromised accounts to carry out lateral phishing attacks and further infiltrate the target organizations TA473 targeted US elected officials and staffers since at least February 2023. The threat actors created bespoke JavaScript payloads designed for each government targets’ webmail portal.

article thumbnail

3 reasons even Chromebook™ devices benefit from added security

Webroot

The respected technology blog TechRadar has even referred to 2021 as “the year of the Chromebook.”. Many third-party security solutions are designed to account for exactly this type of behavior. The post 3 reasons even Chromebook™ devices benefit from added security appeared first on Webroot Blog.

article thumbnail

A lightweight method to detect potential iOS malware

SecureList

Introduction In the ever-evolving landscape of mobile security, hunting for malware in the iOS ecosystem is akin to navigating a labyrinth with invisible walls. To date, the common methods for analyzing an iOS mobile infection are either to examine an encrypted full iOS backup, or to analyze the network traffic of the device in question.

Malware 114
article thumbnail

The phone monitoring app LetMeSpy disclosed a data breach

Security Affairs

“As a result of the attack, the criminals gained access to e-mail addresses, telephone numbers and the content of messages collected on accounts,” reads a statement published by the company. The company immediately launched an investigation into the incident and notified law enforcement and data protection watchdogs.

article thumbnail

Pegasus?—?The Humanitarian Costs of Insecure Code

Security Boulevard

A look at the nature and effects of legal, advanced spyware on application security. Pegasus is an advanced spyware that exploits vulnerable mobile apps to gain a foothold on iPhone and Android devices. The spyware allows governments to crack citizen’s mobile devices, track them, and observe their communications.

Spyware 52