Apple sues NSO Group for spyware use.

Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.

Accessed on 24 November 2021, 1417 UTC.

Content supplied by email subscription to “Dark Reading Daily.”

Source:

https://mail.google.com/mail/u/0/#inbox/FMfcgzGllCfgCzrQftnDJDlGWrsthgKj

Please click link or scroll down to read your selections.

 
Follow Dark Reading:
 November 24, 2021
LATEST SECURITY NEWS & COMMENTARY
Apple Sues NSO Group for Spyware Use
The company seeks to hold Israeli firm NSO Group liable for the targeting of Apple users and requests a permanent injunction to ban its use of Apple products and services.
Holiday Scams Drive SMS Phishing Attacks
Attackers typically target consumers with malicious text messages containing obfuscated links, but experts say businesses are threatened as well.
How Sun Tzu’s Wisdom Can Rewrite the Rules of Cybersecurity
The ancient Chinese military strategist Sun Tzu would agree: The best defense is to avoid an attack in the first place.
Don’t Help Cybercriminals Dash With Your Customers’ Cash This Black Friday
Each security step, no matter how small, can have great impact in detecting and deterring cyber theft.
New Android Spyware Variants Linked to Middle Eastern APT
The new variants, improved for stealth and persistence, share code with other malware samples attributed to the C-23 APT.

MORE NEWS / MORE COMMENTARY

 
HOT TOPICS
 
10 Stocking Stuffers for Security Geeks
Check out our list of gifts with a big impact for hackers and other techie security professionals.
GoDaddy Breach Exposes SSL Keys of Managed WordPress Hosting Customers
The incident, which affected 1.2 million users, raises concerns about domain impersonation attacks and other malicious activities.
Why the ‘Basement Hacker’ Stereotype Is Wrong — and Dangerous
It engenders a false sense of superiority that spurs complacency among risk managers and executives, who in turn may underinvest in security teams, rely too much on automation, or both.

MORE

EDITORS’ CHOICE

Bug Bounties Surge as Firms Compete for Talent
Companies such as GItLab, which today increased its payment for critical bugs by 75%, are raising bounties and bonuses to attract top-notch researchers.
LATEST FROM THE EDGE

Why Should I Adopt a Zero Trust Security Strategy?
Zero Trust is the right approach for protecting your end users. Executing it in the right way will also help you comply with the NIST standards and upcoming federal mandates.
LATEST FROM DR TECHNOLOGY

Baffle’s Data Privacy Cloud Protects Data for Amazon Redshift Customers
Amazon Redshift customers can use Baffle’s Data Privacy Cloud to secure the data pipeline as source data is migrated to Redshift and used for data analytics.
Tech Resources
ACCESS TECH LIBRARY NOW
 
  • Cybersecurity Outlook 2022 Virtual Event

    Join Omdia, Black Hat and Dark Reading at this free, all-day virtual event offering expert insight on the cyber-threats and trends enterprises will face in the coming year. On December 8, Cybersecurity Outlook 2022 will look at some of the new threats …

  • Beyond Patch Management: Next-Generation Approaches to Finding and Fixing Vulnerable Code

    A good patch management process can help make your enterprise data more secure. But what does it do for vulnerabilities that haven’t been patched? Attackers are increasingly manipulating open-source, third-party components in software — do you have a process to …

MORE WEBINARS
FEATURED REPORTS
MORE REPORTS
 
 
CURRENT ISSUE
How Data Breaches Affect the Enterprise
DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS | TECH DIGEST
 
 
 
PRODUCTS & RELEASES

For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts.  Thanks for joining us today.

Russ Roberts

https://atomic-temporary-195915488.wpcomstaging.com