$ page 29/35

Intellexa’s global corporate web shows how Predator spyware survives scrutiny

Recorded Future’s Intellexa report shows how Predator spyware survives through front companies, sanctions evasion pressure, and wider targeting.

8 min readMar 20

Surge in attacks on surveillance cameras linked to Iranian hackers

Iran-linked attacks on surveillance cameras show how exposed IoT devices can become high-value intelligence assets during conflict.

8 min readMar 20

Project Compass targets The Com with 30 arrests across youth cybercrime network

Europol’s Project Compass hits The Com with 30 arrests, exposing how youth cybercrime networks blend social engineering, extortion and ransomware.

8 min readMar 20

Russian intelligence targets messaging accounts instead of breaking encryption

CISA and the FBI warn Russian intelligence is phishing messaging app users, bypassing encryption by stealing accounts instead.

8 min readMar 20

DarkSword shows how the iPhone exploit market serves surveillance operations

DarkSword highlights a commercial iPhone exploit market where spyware vendors and state actors use chained flaws for covert surveillance.

9 min readMar 20

9 critical IP KVM flaws expose a dangerous new path to root access

Nine flaws in low-cost IP KVMs could give attackers unauthenticated root access and stealthy control over connected systems.

8 min readMar 20

Critical GNU InetUtils telnetd flaw raises urgent questions about legacy remote access risk

A reported GNU InetUtils telnetd flaw could enable unauthenticated root RCE, putting legacy Telnet-exposed systems at serious risk.

7 min readMar 20

New DarkSword iOS exploit used in infostealer attack on iPhones

A reported DarkSword iPhone campaign shows how iOS exploits and infostealers can expose personal data and crypto wallets alike.

8 min readMar 20

New Perseus Android malware checks user notes for secrets

Perseus shows how Android malware can turn plain text notes into a gold mine for passwords, seed phrases, and financial secrets.

8 min readMar 20

Shai-Hulud-like worm targets developers through npm and AI tools

Researchers warn a Shai-Hulud-like npm worm is targeting developers, stealing secrets, and abusing AI tooling in supply-chain attacks.

8 min readMar 20

Vulnerabilities in password managers put browser trust under scrutiny

Researchers say some password managers can leak or alter credentials through browser-side flaws, challenging how users interpret encryption claims.

8 min readMar 20

Fake AI assistants in Chrome Web Store steal passwords and spy on emails

Malicious AI-themed Chrome extensions are stealing passwords, hijacking sessions, and spying on email at alarming scale.

9 min readMar 20