Is it possible to analyse network traffic to find out if spyware is uploading images, location or messages?

I was thinking about spyware and wondered if you could sniff for suspcious network traffic from spyware.
Mobile spyware usually uploads messages, location and images, is it possible to analyse network traffic and detect these actions?
I ca… Continue reading Is it possible to analyse network traffic to find out if spyware is uploading images, location or messages?

APT trends report Q3 2021

The APT trends reports are based on our threat intelligence research and provide a representative snapshot of what we have discussed in greater detail in our private APT reports. This is our latest installment, focusing on activities that we observed during Q3 2021. Continue reading APT trends report Q3 2021

How likely is it that i need to worry about malware/hackers being able to infect a .iso [closed]

I downloaded an .iso for a Linux distro called pop os from the official website and installed it.
However a week after installing it, I started to notice the camera flash randomly (maybe on 3 or so occasions). I’m sure I didn’t download an… Continue reading How likely is it that i need to worry about malware/hackers being able to infect a .iso [closed]

Can attacker who is previous visitor to my home network put factory reset resistant spyware on my pc and phone from the WAN side?

I am amateur/barely novice to home networking trying to narrow down, if at all possible, angles of intrusion.
Attacker connects to home network after I willingly give password. Before they connect I:

disconnect my pc (laptop Windows 10) f… Continue reading Can attacker who is previous visitor to my home network put factory reset resistant spyware on my pc and phone from the WAN side?

‘A lot’ of firms are developing offensive cyber techniques, hoping for investment

Aggressive cyber tools remain a topic of interest for “a lot of companies” pitching their technology to investors thanks to interest from government agencies and clients trying to test their defensive techniques, according to a former U.S. National Security Agency employee turned investor. Ron Gula, co-founder of the cyber investment firm Gula Tech Adventures and co-founder of Tenable Network Security, said Monday during CyberWeek, a summit presented by Scoop News Group, that an array of firms seeking investment are developing offensive software tools designed for intelligence agencies, along with federal and local police. Security personnel for years have crafted defensive tools out of known hacking techniques, using everything from phishing tests to leaked CIA hacking tools to hack clients in a way that’s designed to probe their defenses rather than steal data. Companies pitching this kind of software need to walk the fine line between intelligence gathering and law enforcement. There […]

The post ‘A lot’ of firms are developing offensive cyber techniques, hoping for investment appeared first on CyberScoop.

Continue reading ‘A lot’ of firms are developing offensive cyber techniques, hoping for investment

Amnesty Intl. accuses Indian cyber security firm of spyware attacks

By Waqas
According to Amnesty International, it found evidence that attackers testing the spyware were using the IP address of Indian cyber security firm Innefu Labs.
This is a post from HackRead.com Read the original post: Amnesty Intl. accuses Indian… Continue reading Amnesty Intl. accuses Indian cyber security firm of spyware attacks

Cherie Blair and the Dubai ruler who spied on his ex-wife’s phone with Pegasus spyware

The UK High Court has determined that the ruler of Dubai, Sheikh Mohammed Al Maktoum, had his ex-wife’s smartphone hacked with the notorious Pegasus spyware, sold by the equally notorious NSO Group.

But what I find particularly fascinating is who bl… Continue reading Cherie Blair and the Dubai ruler who spied on his ex-wife’s phone with Pegasus spyware

Spies used Android malware to try collecting intelligence from a Togolese activist, Amnesty says

A threat group known for using Android-based malware to target victims in Southeast Asia has been detected in Africa for the first time, according to Amnesty International research released Wednesday. Attackers tried to trick a Togolese activist into installing Android spyware via a series of WhatsApp messages and emails. The spyware would have allowed attackers to access a wealth of information including files stored on the device, WhatsApp messages as well as access to the phone’s camera and microphone. Spies targeted the human rights advocate, who Amnesty refused to name as a security precaution, between December 2019 and January 2020 during the lead-up to the country’s presidential election. Human rights experts and opposition leaders accused incumbent president Faure Gnassingbé of using police force to silence and brutalize protestors, disrupting election results. Groups including Amnesty International and the United Nations have called for a moratorium on the sale of surveillance technology, […]

The post Spies used Android malware to try collecting intelligence from a Togolese activist, Amnesty says appeared first on CyberScoop.

Continue reading Spies used Android malware to try collecting intelligence from a Togolese activist, Amnesty says