Shift Your Mindset from Conflict to Collaboration to Succeed in Security

In the two decades I’ve spent in cybersecurity, I’ve observed and experienced the fighting spirit of security professionals: When tasked with safeguarding information assets, we envision ourselves erecting defenses to keep threat actors at bay, or we emulate malicious actions to find flaws in the organization’s security measures before attackers exploit them. We fight. Let’s…

Read more

March 29, 2023
Read More >>

Google TAG shares details about exploit chains used to install commercial spyware

Google’s Threat Analysis Group (TAG) discovered several exploit chains targeting Android, iOS, and Chrome to install commercial spyware. Google’s Threat Analysis Group (TAG) shared details about two distinct campaigns which used several zero-day exploits against Android, iOS and Chrome. The experts pointed out that both campaigns were limited and highly targeted. The threat actors behind […]

The post Google TAG shares details about exploit chains used to install commercial spyware appeared first on Security Affairs.

March 29, 2023
Read More >>