Apple sues NSO Group for spyware use.

Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.

Accessed on 24 November 2021, 1417 UTC.

Content supplied by email subscription to “Dark Reading Daily.”

Source:

https://mail.google.com/mail/u/0/#inbox/FMfcgzGllCfgCzrQftnDJDlGWrsthgKj

Please click link or scroll down to read your selections.

TechWeb
 
Follow Dark Reading:
 November 24, 2021
LATEST SECURITY NEWS & COMMENTARY
Apple Sues NSO Group for Spyware Use

The company seeks to hold Israeli firm NSO Group liable for the targeting of Apple users and requests a permanent injunction to ban its use of Apple products and services.
Holiday Scams Drive SMS Phishing Attacks

Attackers typically target consumers with malicious text messages containing obfuscated links, but experts say businesses are threatened as well.
How Sun Tzu’s Wisdom Can Rewrite the Rules of Cybersecurity

The ancient Chinese military strategist Sun Tzu would agree: The best defense is to avoid an attack in the first place.
Don’t Help Cybercriminals Dash With Your Customers’ Cash This Black Friday

Each security step, no matter how small, can have great impact in detecting and deterring cyber theft.
New Android Spyware Variants Linked to Middle Eastern APT

The new variants, improved for stealth and persistence, share code with other malware samples attributed to the C-23 APT.

MORE NEWS / MORE COMMENTARY

 
HOT TOPICS
 
10 Stocking Stuffers for Security Geeks

Check out our list of gifts with a big impact for hackers and other techie security professionals.
GoDaddy Breach Exposes SSL Keys of Managed WordPress Hosting Customers

The incident, which affected 1.2 million users, raises concerns about domain impersonation attacks and other malicious activities.
Why the ‘Basement Hacker’ Stereotype Is Wrong — and Dangerous

It engenders a false sense of superiority that spurs complacency among risk managers and executives, who in turn may underinvest in security teams, rely too much on automation, or both.

MORE

EDITORS’ CHOICE

Bug Bounties Surge as Firms Compete for Talent

Companies such as GItLab, which today increased its payment for critical bugs by 75%, are raising bounties and bonuses to attract top-notch researchers.
LATEST FROM THE EDGE

Why Should I Adopt a Zero Trust Security Strategy?

Zero Trust is the right approach for protecting your end users. Executing it in the right way will also help you comply with the NIST standards and upcoming federal mandates.
LATEST FROM DR TECHNOLOGY

Baffle’s Data Privacy Cloud Protects Data for Amazon Redshift Customers

Amazon Redshift customers can use Baffle’s Data Privacy Cloud to secure the data pipeline as source data is migrated to Redshift and used for data analytics.
Tech Resources
ACCESS TECH LIBRARY NOW
 
  • Cybersecurity Outlook 2022 Virtual Event

    Join Omdia, Black Hat and Dark Reading at this free, all-day virtual event offering expert insight on the cyber-threats and trends enterprises will face in the coming year. On December 8, Cybersecurity Outlook 2022 will look at some of the new threats …

  • Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code

    A good patch management process can help make your enterprise data more secure. But what does it do for vulnerabilities that haven’t been patched? Attackers are increasingly manipulating open-source, third-party components in software — do you have a process to …

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
 
 
CURRENT ISSUE

How Data Breaches Affect the Enterprise
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
 
 
 
PRODUCTS & RELEASES

For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts.  Thanks for joining us today.

Russ Roberts

https://cyber-security-intelligence.org