Headlines
Exploring the Subterfuge: Unveiling the Stealth Techniques of the 'Operation Triangulation' iOS AttackiOS,OperationTriangulation,StealthTechniques,Subterfuge,Attack

Exploring the Subterfuge: Unveiling the Stealth Techniques of the ‘Operation Triangulation’ iOS Attack

Malware and Threats Stealth Techniques Used in ‘Operation Triangulation’ iOS Attack Dissected A recent report by Kaspersky, a Russian cybersecurity vendor, has exposed the stealth techniques used in the iOS zero-click attacks known as ‘Operation Triangulation.’ The attacks targeted the iPhones of dozens of Kaspersky senior employees earlier this year and focused on exercising stealth…

Read More
"APT41 hackers wreak havoc in Asia-Pacific with sophisticated stealth techniques"cybersecurity,APT41,Asia-Pacific,hacking,stealthtechniques

“APT41 hackers wreak havoc in Asia-Pacific with sophisticated stealth techniques”

Earth Longzhi, a suspected subgroup of the Chinese cyber threat group APT41, has resurged after months of inactivity, launching a new campaign against organizations across Southeast Asia. Researchers from Trend Micro have revealed that Earth Longzhi is now utilizing newer and better stealth tactics in espionage campaigns against government agencies, enterprises, healthcare, technology, and manufacturing…

Read More