Predator Spyware Silently Hides iPhone Camera and Mic Activity
Predator spyware leverages deep system hooks to suppress iOS camera and microphone activity dots, allowing covert surveillance on iPhones without user knowledge.
37 article(s)
Predator spyware leverages deep system hooks to suppress iOS camera and microphone activity dots, allowing covert surveillance on iPhones without user knowledge.
A Ukrainian national received a five-year sentence for providing stolen U.S. identities to North Korean IT operatives, enabling them to infiltrate dozens of American companies through an international web of deception.
A trio of Silicon Valley engineers—two sisters and a husband—are accused of orchestrating a daring theft of Google's confidential tech secrets, with some data allegedly making its way to Iran. The case exposes new vulnerabilities in the tech industry's fight against insider threats.
A Ukrainian hacker enabled North Korean IT workers to secretly work for US firms using stolen identities, bypassing sanctions and funding Pyongyang’s weapons program. This case exposes the vulnerabilities of remote work platforms and the growing intersection of cybercrime and national security.
Federal prosecutors have indicted two former Google engineers and an accomplice for allegedly stealing sensitive trade secrets related to Google's Tensor processor and funneling them to unauthorized locations, including Iran. The case exposes the insider risks facing Silicon Valley's tech giants.
Italy’s intelligence agencies are seeking cyber and engineering experts for a new era of digital threats. Explore the degrees and specializations in demand—and what this reveals about the future of espionage.
Italy’s intelligence agencies are undergoing a digital transformation, seeking hackers, cryptographers, and HPC specialists to combat emerging cyber threats and hybrid warfare. Explore the new professional roles at the heart of Italy’s cyber defense strategy.
Predator spyware has struck Angola, compromising journalists’ devices and sparking fresh debate on surveillance technology. Learn how the attack unfolded, who is at risk, and why international regulation is more critical than ever.
A new malware campaign, CRESCENTHARVEST, targets supporters of Iran’s protests by embedding info-stealing tools in protest-themed media files. Here’s how the operation unfolds and what it means for digital activists.
Italy’s intelligence agencies have opened a major 2026 recruitment campaign targeting cyber, cryptography, and open source intelligence experts. Here’s what’s at stake—and how to apply.