SpyNote Spyware Returns with SMS Phishing Against Banking Customers

By Habiba Rashid
In its recent attack campaign, SpyNote Spyware is sending victims fake SMS messages urging them to install a new certified banking app.
This is a post from HackRead.com Read the original post: SpyNote Spyware Returns with SMS Phishing … Continue reading SpyNote Spyware Returns with SMS Phishing Against Banking Customers

Spying on a smartphone remotely by the authorities: feasibility and operation

French lawmakers agreed to a justice reform bill that includes a provision granting police the power to remotely activate suspects’ geolocation, microphone and camera (source).
Following the senators, the deputies also gave their green lig… Continue reading Spying on a smartphone remotely by the authorities: feasibility and operation

China-Linked Spyware Found in Google Play Store Apps, 2m Downloads

By Waqas
Mobile security solutions provider Pradeo’s security researchers have shared details of the spyware they discovered hiding on the…
This is a post from HackRead.com Read the original post: China-Linked Spyware Found in Google Play S… Continue reading China-Linked Spyware Found in Google Play Store Apps, 2m Downloads

Apple fixes zero-day vulnerabilities used to covertly deliver spyware (CVE-2023-32435)

Apple has released patches for three zero-day vulnerabilities (CVE-2023-32434, CVE-2023-32435, CVE-2023-32439) exploited in the wild. The first two have been reported by Kaspersky researchers Georgy Kucherin, Leonid Bezvershenko and Boris Larin followi… Continue reading Apple fixes zero-day vulnerabilities used to covertly deliver spyware (CVE-2023-32435)

Apple issues emergency patch to address alleged spyware vulnerability

The fix follows allegations from a Russian intelligence service that an intentional flaw in iPhones provided a gateway for American espionage.

The post Apple issues emergency patch to address alleged spyware vulnerability appeared first on CyberScoop.

Continue reading Apple issues emergency patch to address alleged spyware vulnerability

Dissecting TriangleDB, a Triangulation spyware implant

In researching Operation Triangulation, we set ourselves the goal to retrieve as many parts of the exploitation chain as possible. As of now, we have finished analyzing the spyware implant and are ready to share the details. Continue reading Dissecting TriangleDB, a Triangulation spyware implant