article thumbnail

Experts found a macOS version of the sophisticated LightSpy spyware

Security Affairs

Researchers spotted a macOS version of the LightSpy surveillance framework that has been active in the wild since at least January 2024. LightSpy can steal files from multiple popular applications like Telegram, QQ, and WeChat, as well as personal documents and media stored on the device.

Spyware 82
article thumbnail

150,000 Verkada security cameras hacked—to make a point

Malwarebytes

Hackers were able to gain access to camera feeds from Verkada, a tech company that specializes in video security and physical access control, to demonstrate how prevalent surveillance is, reports say. It is also a metaphor used to illustrate surveillance technology. This isn’t Verkada’s first bout with negative publicity.

Hacking 90
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cloudastructure Signs Letter of Intent to Acquire IPG

CyberSecurity Insiders

MIAMI–( BUSINESS WIRE )–Cloudastructure, the award-winning cloud video surveillance provider, has signed a Letter of Intent to purchase rapidly growing IoT cybersecurity company IPG. Please direct media inquiries to Kathleen Hannon at kathleen@cloudastructure.com or Luly Schlingman at lschlingman@iotgearbox.com.

IoT 52
article thumbnail

Cloudastructure: 2021 – Year to Date Review

CyberSecurity Insiders

MIAMI–( BUSINESS WIRE )–Shareholders entrusted Cloudastructure with $30 million via a RegA+ to expand their cloud-based video surveillance platform empowered with Artificial Intelligence and Machine Learning analytics. As a result of that team’s efforts, Cloudastructure’s video surveillance platform now includes: People Detection.

article thumbnail

The War in Technology: A Digital Iron Curtain Goes Up

SecureWorld News

And it might have been prepared for this moment, years ago, as a surveillance tool. It's easy to put surveillance on telecoms if you have a foothold," Kubecka said. The Kremlin's directives against online platforms can be vague or confusing and on-the-ground reports from Russia about how social media and other apps are working vary.

article thumbnail

Advanced threat predictions for 2022

SecureList

The targets included government and military agencies, defense contractors, political parties and consultancies, logistics companies, energy firms, universities, law firms and media companies. This year, the use of surveillance software developed by private vendors has come under the spotlight, as discussed above.

Mobile 134
article thumbnail

Jumpstart your adoption of Zero Trust with these three steps

SC Magazine

Start with business applications that currently lack enhanced protection or have inefficient security architectures in front of them. The post Jumpstart your adoption of Zero Trust with these three steps appeared first on SC Media. Identify new apps that do not use legacy remote access.

VPN 64