Predators: Point This at Anyone’s Phone to Instantly Hack It

Omega Balla

When does selling spyware become a crime against humanity? “Mercenary Spyware” is a new grade of espionage tools that can track down terrorists or facilitate genocide, depending on who’s using it. And the people who make it don’t care who’s buying, as long as they have the cash.

In this episode we hear from Crofton Black at Lighthouse Reports who spent 6 months with a team of journalists researching a story.

Total
0
Shares
Previous Post

Ransomware Strikes New Zealand’s Regional Transportation Authority: Lessons in Cybersecurity Preparedness

Next Post

Cybersecurity Alert: Ransomware Attack Hits Colombian Ministries via Technology Provider

Related Posts

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

Threat actors with ties to China have been attributed to a novel campaign that compromised an ArcGIS system and turned it into a backdoor for more than a year. The activity, per ReliaQuest, is the handiwork of a Chinese state-sponsored hacking group called Flax Typhoon, which is also tracked as Ethereal Panda and RedJuliett. According to the U.S. government, it's assessed to be a publicly-traded
Read More

New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events

Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover (DTO) attacks and perform fraudulent transactions by preying on the elderly. Dutch mobile security company ThreatFabric said it discovered the campaign in August 2025 after users in Australia reported scammers managing Facebook groups promoting "active senior
Read More

New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

Cybersecurity researchers have disclosed details of a new malware family dubbed YiBackdoor that has been found to share "significant" source code overlaps with IcedID and Latrodectus. "The exact connection to YiBackdoor is not yet clear, but it may be used in conjunction with Latrodectus and IcedID during attacks," Zscaler ThreatLabz said in a Tuesday report. "YiBackdoor is able to execute
Read More