‘CatalanGate’ Spyware Infections Tied to NSO Group
Citizen Lab uncovers multi-year campaign targeting autonomous region of Spain, called Catalonia.
More results...
Citizen Lab uncovers multi-year campaign targeting autonomous region of Spain, called Catalonia.
In this time of unprecedented cyberwar, organizations must protect the personal digital lives of their executives in order to reduce the company’s risk of direct or collateral damage.
Oftentimes, organizations view supply chains as an extension of their own business and require suppliers to adhere to codes of conduct, efficiency standards, and more. Today, this has expanded to environmental sustainability goals as well. Companies un…
Although we?ve made significant progress as a community in this regard, there are still instances in which the outcome of DNS spoofing attacks can go undetected. In this article, we describe a DNS spoofing attack that goes unnoticed by users.
WorldMatch, a games and content provider for global markets, collaborates with some of the biggest international casinos. Headquartered in Italy and in operation since 2003, the gaming provider boasts a portfolio of more than 200 games, 160 slot machin…
Obviously we?re proud to be a leader. Bot management is a contact sport, where being great is a requirement if you want to stop the persistent adversarial bots. So it?s rewarding to be recognized for the work we?re doing keeping the bad bots away from …
Protecting sensitive information is a recurring and widely known concern in the security community. As researchers, we know all too well how information can be used maliciously (I mean, come on ? it?s our job). Considering the size of the threat vector…
Just three weeks have gone by since Akamai officially welcomed Linode into our fold, and I?m encouraged by the excitement that so many have expressed about the combination of our two companies since we announced the acquisition in February. In conversa…
Conti is a notorious ransomware group that targets high-revenue organizations. They were first detected in 2020, and appear to be based in Russia. It is believed that the group is the successor to Ryuk ransomware group. According to Chainalysis, The ra…
Although Spring Cloud Functions are not as widespread as the Log4j library, and should provide a good separation from the hosting server, some draw the line between the two, due to the ease of exploitation over HTTP/s. This new vulnerability will defin…