Plato Data Intelligence.
Vertical Search & Ai.

Tag: spyware

‘Operation Triangulation’ Spyware Attackers Bypass iPhone Memory Protections

A previously undocumented hardware feature within Apple's iPhone System on a Chip (SoC) allows for exploitation of multiple vulnerabilities, eventually letting attackers bypass hardware-based...

Canada on Guidelines to Tackle AI Tools’ Bias When Hiring

The Canadian government is working on a framework to tackle discrimination in the hiring processes within government departments, specifically addressing privacy and transparency issues. This...

Key findings from ESET Threat Report H2 2023 – Week in security with Tony Anscombe

Video How cybercriminals take advantage of the popularity of ChatGPT and other tools of its ilk to direct people to sketchy sites, plus...

Attackers Exploit 6-Year-Old Microsoft Office Bug to Spread Spyware

Attackers are exploiting a 6-year-old Microsoft Office remote code execution (RCE) flaw to deliver spyware, in an email campaign weaponized by malicious Excel attachments...

These aren’t the Android phones you should be looking for

When shopping for a new smartphone, you’re likely to look for the best bang for your buck. If you’re on the hunt for a...

ESET Threat Report H2 2023

ESET Research, Threat Reports A view of the H2 2023 threat landscape as seen by ESET telemetry and from the perspective of ESET...

European Parliament Faces Challenges in Cyber-Securing Election

Penka Hristovska Published on: December 13, 2023 The European Union’s Parliament isn’t quite yet ready for the upcoming June...

Dozens of Bugs Patched in Apple TVs and Watches, Macs, iPads, iPhones

On Dec. 11, Apple released patches for dozens of vulnerabilities affecting iPhones, Macs, Apple TVs, Apple Watches, and its Safari browser.The long list includes...

Cybercrime Orgs Increasingly Use Human Trafficking to Staff Scam Mills

Interpol has announced Operation Storm Makers II, a coordinated effort among 27 individual Asian countries targeting cyber-fraud operations engaging in human trafficking to perpetuate...

Silent but deadly: The rise of zero-click attacks

Mobile Security A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no action from you –...

Beware of predatory fin(tech): Loan sharks use Android apps to reach new depths

Since the beginning of 2023, ESET researchers have observed an alarming growth of deceptive Android loan apps, which present themselves as legitimate personal loan...

Shadowy Hack-for-Hire Group Behind Sprawling Web of Global Cyberattacks

A security vendor’s 11-month long review of non-public data obtained by investigative journalists at Reuters has corroborated previous reports tying an Indian hack-for-hire group...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?