Zephyrnet Logo

Tag: spyware

The Surge of On Device Fraud (ODF) in 2024 and why you should care about it | EU-Startups

On-device fraud is the number one topic that should keep you up at night if you run a digital business. A burgeoning threat which...

Top News

Meta Disrupts 8 Spyware Firms, 3 Fake News Networks

Meta has identified and interrupted six spyware networks linked to eight companies in Italy, Spain, and the United Arab Emirates, as well as three...

Meta Takes Down 8 Spyware Firms and Exposes 3 Fake News Networks

Meta, the parent company of Facebook, recently made headlines by taking down eight spyware firms and exposing three fake news networks. This significant move...

NSO Group Adds ‘MMS Fingerprinting’ Zero-Click Attack to Spyware Arsenal

A researcher at Swedish telecom and cybersecurity firm Enea has unearthed a previously unknown tactic that Israel's NSO Group has made available for use...

NSO Group Enhances Spyware Arsenal with ‘MMS Fingerprinting’ Zero-Click Attack

NSO Group Enhances Spyware Arsenal with 'MMS Fingerprinting' Zero-Click Attack In the ever-evolving world of cybersecurity, malicious actors are constantly finding new ways to exploit...

Hamas Cyberattacks Ceased After the Oct. 7 Terror Attack. But Why?

Cyber threat actors linked with Hamas have seemingly ceased activity ever since the terrorist attack in Israel on Oct. 7, confounding experts.Combination warfare is...

CISO Corner: DoD Regs, Neurodiverse Talent & Tel Aviv’s Light Rail

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

World Govs, Tech Giants Sign Spyware Responsibility Pledge

A coalition of dozens of countries including France, the UK, and the US, along with tech giants such as Google, Meta, and Microsoft, have...

ESET Research Podcast: ChatGPT, the MOVEit hack, and Pandora

ESET Research An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder...

Attack of the copycats: How impostor apps and fake app mods could bite you

Mobile Security WhatsApp, Telegram and Signal clones and mods remain a popular vehicle...

How to Stop Someone from Accessing Your Phone Remotely

Imagine this frightening scenario: you notice your phone battery draining faster than normal, the screen lighting up at odd times, and strange websites popping...

Why Spam Prevention is Crucial for for Data-Driven Business

There are many clear benefits of running a data-driven business. Unfortunately, those benefits can be quickly negated if you don’t make data integrity a...

‘Operation Triangulation’ Spyware Attackers Bypass iPhone Memory Protections

A previously undocumented hardware feature within Apple's iPhone System on a Chip (SoC) allows for exploitation of multiple vulnerabilities, eventually letting attackers bypass hardware-based...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?