article thumbnail

Even North Korea has an antivirus program—but it’s used for spying

The Parallax

Researchers announced on May 1 that when they inspected the ingredients of the North Korean antivirus software for Windows computers, they found a mix of spyware and old code stolen from an antivirus vendor. Jaku is a known spyware-botnet combination, spread over BitTorrent.

Spyware 187
article thumbnail

Going to TechCrunch Disrupt 2023 is cheaper when you bundle

TechCrunch

How to Build Intelligent Startup Ops that Will Scale with Your Business Seven industry stages at TechCrunch Disrupt 2023 New this year: We’re filling seven stages with salon-like programs that focus on the industries that matter most to the tech world today. It’s a rare opportunity to explore cross-sector collaborations under one roof.

Spyware 200
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Daily Crunch: Months after rejecting a $17B bid, Zendesk sells to private equity group for $10.2B

TechCrunch

That’s what happened this week with Ro , which laid off 18% of its full-time workforce to “manage expenses, increase the efficiency of [its] organization, and better map our resources to [its] current strategy.” TechCrunch+ is our membership program, which helps founders and startup teams get ahead. Big Tech Inc.

Spyware 255
article thumbnail

Daily Crunch: After filing for bankruptcy, crypto lender Voyager Digital says it will ‘maintain operations’

TechCrunch

TechCrunch+ is our membership program, which helps founders and startup teams get ahead. government that North Korean hackers are targeting some of the country’s healthcare organizations with their ransomware. Can we do it? Do we have additional options to retain her? Advancing AI. You can sign up here.). Big Tech Inc.

Spyware 232
article thumbnail

CVE-2023-41064, CVE-2023-4863, CVE-2023-5129: Frequently Asked Questions for ImageIO and WebP/libwebp Zero-Day Vulnerabilities

Tenable

On September 7, researchers at Citizen Lab published a blog post detailing their discovery of an iPhone zero-click, zero-day exploit chain in Apple iOS used to deploy a spyware known as Pegasus. ImageIO or Image I/O is a framework that allows programs to read and write image file formats, including WebP. What is WebP or libwebp?

article thumbnail

Hidden inside Dark Caracal’s espionage apps: Old tech

The Parallax

Dark Caracal’s custom-developed mobile spyware, which the report’s authors call Pallas, is the first documented global advanced persistent threat , or APT, on a mobile device. While some antivirus software [programs] focus on detecting known exploits, these apps were fully functional except for the Trojanized part.”.

Malware 170
article thumbnail

A Look at the 5 Most Common Types of Cyberattacks

Tenable

There's also the interruption of business to consider, as well as damage to the network and IT infrastructure — both of which can seriously hurt your organization's financial bottom line. Once these programs gain access to a targeted system, they can steal, destroy, encrypt or corrupt valuable databases, files and applications. .

Malware 101