Remove Groups Remove Malware Remove Security Remove Spyware
article thumbnail

Why stopping stalkerware confounds cybersecurity experts

The Parallax

SAN FRANCISCO—The greatest trick stalkerware, one of the most dangerous forms of malware , ever played was convincing the world that it didn’t exist. Until recently, cybersecurity experts could overlook stalkerware because of the personal nature of how it spreads, its muddled legal status—and how it is detected.

Spyware 230
article thumbnail

Cybersecurity Snapshot: NIST’s Cybersecurity Framework Gets Major Update, as Advisories on APT29 and ALPHV Blackcat Get Rolled Out

Tenable

Check out what’s new in NIST’s makeover of its Cybersecurity Framework. Plus, the latest guidance on cyberattack groups APT29 and ALPHV Blackcat. Also, how to assess the cybersecurity capabilities of a generative AI LLM. And the most prevalent malware in Q4. 1 - NIST’s Cybersecurity Framework 2.0 And much more!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

‘eXotic Visit’ Spyware Campaign Target Android Users in India and Pakistan

Ooda Loop

‘EXotic Visit’, an Android malware campaign has been targeting users located in South Asia from the Google Play Store. The cybersecurity firm Slovak has been tracking the campaign since November 2021 using the moniker Virtual Invaders. No known threat actor group is linked to the campaign.

Spyware 59
article thumbnail

Apple releases security updates for iOS, iPadOS and macOS, fixing two actively exploited zero-days

TechCrunch

Apple has released security updates for iPhones, iPads and Macs to patch against two vulnerabilities, which the company says are being actively exploited to hack people. following a vulnerability disclosure by security researchers at Google’s Threat Analysis Group, which investigates […] © 2023 TechCrunch.

Analysis 331
article thumbnail

Even North Korea has an antivirus program—but it’s used for spying

The Parallax

Malware and antivirus software usually go together like tacos and pickles. Researchers announced on May 1 that when they inspected the ingredients of the North Korean antivirus software for Windows computers, they found a mix of spyware and old code stolen from an antivirus vendor. READ MORE ON SECURITY AND GEOPOLITICS.

Spyware 187
article thumbnail

Hidden inside Dark Caracal’s espionage apps: Old tech

The Parallax

Its success was predicated not on “zero-day” vulnerabilities or new forms of malicious software, but rather on older, known malware delivered via an all-too-familiar method: phishing. The malware included hacked versions of end-to-end encrypted communication apps Signal and WhatsApp.

Malware 170
article thumbnail

Learn the Language of Vulnerability Assessment: Key Security Terms You Should Know

Tenable

When you're new to vulnerability assessment (VA) – or any other area of cybersecurity, for that matter – some aspects of the process might seem unfamiliar or confusing. This is particularly true of the jargon; cybersecurity and technology as a whole have a long list of specialized terminology. . Here’s a brief introduction.

Malware 89