PrivacyDigest · @PrivacyDigest
237 followers · 740 posts · Server mas.to

Researchers find new bug ‘class’ in Apple devices | Computer Weekly

A group of in Apple products that stem from the exploit used by firm constitutes a whole new class of bug, say researchers at

computerweekly.com/news/365531

#Trellix #nso #spyware #FORCEDENTRY #vulnerabilities

Last updated 3 years ago

mecambioaMac :mastodon: · @mecambioamac
2 followers · 32 posts · Server mstdn.social

Trellix ayudó a corregir las vulnerabilidades CVE-2023-23520, CVE-2023-23530 y CVE-2023-23531en iOS 16.3 y macOS Ventura 13.2

mecambioamac.com/trellix-ayudo

#FORCEDENTRY #CyberSecurity #Trellix #ipados #iOS #macOS #ciberseguridad

Last updated 3 years ago

zoug · @zoug
205 followers · 45 posts · Server infosec.exchange

Ne manquez pas les deux épisodes de PBS consacrés à , le spyware du groupe . Un behind the scenes édifiant de l'enquête de .

pbs.org/wgbh/frontline/documen

@Mediapart avait reçu Sandrine Rigaud et Laurent Richard de Forbidden Stories, et des personnes infectées par Pegasus dont ses deux journalistes @EdwyPlenel et Lénaïg Bredoux, pour un À l'Air Libre consacré au sujet :

youtu.be/kAvRSYVIkxc

, le nom donné à l'exploit zero click récupéré par @citizenlab, a été analysé en profondeur par Google Project Zero. C'est une lecture vivement recommandée. La dernière phrase de la partie 1 : "The bootstrapping operations for the sandbox escape exploit are written to run on this logic circuit and the whole thing runs in this weird, emulated environment created out of a single decompression pass through a JBIG2 stream. It's pretty incredible, and at the same time, pretty terrifying."

googleprojectzero.blogspot.com

#frontline #pegasus #NS0 #forbiddenstories #FORCEDENTRY

Last updated 3 years ago

Tzafrir · @tzafrir
119 followers · 3071 posts · Server tooot.im

So the exploit is merely a method of taking PDF back to its PostScript roots?

#FORCEDENTRY

Last updated 4 years ago

Corben Dallas · @Corben78
138 followers · 3433 posts · Server mastodon.social

RT @jsrailton@twitter.com

🚨 UPDATE YOUR APPLE DEVICES NOW🚨

We caught a zero-click, zero day iMessage exploit used by NSO Group's spyware.

Target? Saudi activist.

We reported the exploit to @Apple@twitter.com, which just pushed an emergency update.

THREAD 1/
citizenlab.ca/2021/09/forceden

🐦🔗: twitter.com/jsrailton/status/1

#pegasus #FORCEDENTRY

Last updated 4 years ago

Guillaume Lours · @glours
258 followers · 5118 posts · Server framapiaf.org

RT @jsrailton@twitter.com

🚨 UPDATE YOUR APPLE DEVICES NOW🚨

We caught a zero-click, zero day iMessage exploit used by NSO Group's spyware.

Target? Saudi activist.

We reported the exploit to @Apple@twitter.com, which just pushed an emergency update.

THREAD 1/
citizenlab.ca/2021/09/forceden

🐦🔗: twitter.com/jsrailton/status/1

#pegasus #FORCEDENTRY

Last updated 4 years ago

Emzy · @emzy
327 followers · 1651 posts · Server bitcoinhackers.org

RT @jsrailton
🚨 UPDATE YOUR APPLE DEVICES NOW🚨

We caught a zero-click, zero day iMessage exploit used by NSO Group's spyware.

Target? Saudi activist.

We reported the exploit to @apple, which just pushed an emergency update.

THREAD 1/
citizenlab.ca/2021/09/forceden

#FORCEDENTRY #pegasus

Last updated 4 years ago