Some of you may have heard of Pegasus (by the Israel-based NGO Group) as one of the most popular flyby malware, which can self-install in a mobile device without any action taken from your side, and stay undetected unless an in-depth digital forensic investigation is conducted. What you may not know, instead, is that its usage has been endorsed by many governments and even by the judiciary system and law enforcement authorities. Here is an example (and don't think that this is only a problem in Poland): https://lnkd.in/eBytV-cs
Andrea Ravaioli’s Post
More Relevant Posts
-
Is the Finance industry the most targeted by cyber-attackers? Briefly said, the answer is no. Source: https://lnkd.in/gxJvHEHS
To view or add a comment, sign in
-
-
What is DWELL TIME? Dwell time is calculated as the number of days an attacker is present in a compromised environment before they are detected. You can expect this number to be higher when an attack is perpetrated by an Advanced Persistent Threat. The average number in 2023 is reported by Mandiant to be 10 days, and when defenders detect adversary intrusions internally, they do so faster than the overall median dwell time. Can you think how much information can be exfiltrated and possibly altered in 10 days? Source: Special Report: Mandiant M-Trends 2024
To view or add a comment, sign in
-
-
Do you know what an Advanced Persistent Threat (APT) is? Evidently inspired by Intelligence Agencies, they are neither tools nor techniques: the terms is used to describe a category of malicious threat actors aiming at remaining undetected for as long as possible while exfiltrating information and, sometimes, compromising systems. The median "dwell-time", the time an APT attack goes undetected, differs widely between regions. FireEye reported the mean dwell-time for 2018 in the Americas as 71 days, EMEA as 177 days, and APAC as 204 days. https://lnkd.in/eZGkrpsi
Advanced persistent threat - Wikipedia
en.wikipedia.org
To view or add a comment, sign in
-
A while ago I explained why my profile photo (set as "public") is incomplete. It is deliberate as face recognition technologies allow all the sort of scary scenarios. One example? As Erik Prince describes, soon drone empowered by face recognition and GPS technologies will be able to act as sicarios as seen in gangster movies. They might kill or temporarily impair their targets, depending by how their owner programmed them.
Off Leash podcast Drones and the changing nature of warfare. https://lnkd.in/e9Kr3GXk
Drones are Dominating the Battlefield, and America Should be Worried
https://www.youtube.com/
To view or add a comment, sign in
-
Have you heard of a new feature of Window 11 called "Recall"? Presently only available in new "Copilot+PCs", it is basically a key and screen logger saving locally all you do. Most certainly very attractive to hackers, you can turn it off but there are ways they can turn it back on... https://lnkd.in/eMEeYEfx
Windows' new Recall feature: A privacy and security nightmare? - Help Net Security
https://www.helpnetsecurity.com
To view or add a comment, sign in
-
I've been very positively impressed by this comprehensive guide in managing data protection risk published (in English) by the data protection supervisory authority of Spain - The AEPD. A reference-grade publication strongly recommended to anyone in the business of data privacy/protection. https://lnkd.in/eCPyDb6d
1716260319708
media.licdn.com
To view or add a comment, sign in
-
Microsoft platforms and products are ubiquitous, trusted by companies of all sizes and industries and even by Government agencies around the world. You'd think one of the reason of success is that THEY ARE SAFE. Read and think again: https://lnkd.in/eu6fd7X4
To view or add a comment, sign in
-
I don't know but I am ashamed to say, so here you go a (wrong) guess and you might even trust it! And no, it is not me: it is Chat GPT! https://lnkd.in/emZjPfGb
Privacy activists slap OpenAI with GDPR complaint
theregister.com
To view or add a comment, sign in
-
Do you think you can avoid malware/spyware installations just by not taking action or just by deleting a suspect sms or email message? Try to answer and then read this: https://lnkd.in/ebX_XfV2
What is a Zero Click Attack? - Check Point Software
checkpoint.com
To view or add a comment, sign in