Citizen Lab

ESET discovered an undocumented backdoor used by the infamous Stealth Falcon group - Cyber security news

ESET discovered an undocumented backdoor used by the infamous Stealth Falcon group

It’s Almost Impossible to Tell if Your iPhone Has Been Hacked - Cyber security news

It’s Almost Impossible to Tell if Your iPhone Has Been Hacked

NSO Group spyware used to target widow of Mexican journalist, researchers say - Cyber security news

NSO Group spyware used to target widow of Mexican journalist, researchers say

NSO Group spyware used against two Mexican journalists following assassination - Cyber security news

NSO Group spyware used against two Mexican journalists following assassination

StrongPity hacker group changes tactics to evade detection and remain persistent - Cyber security news

StrongPity hacker group changes tactics to evade detection and remain persistent

Burned malware returns: Fingers pointed towards Hacking Team - Cyber security news

Burned malware returns: Fingers pointed towards Hacking Team

Saudi Dissident Spyware Attack Belies Bigger Threat - Cyber security news

Saudi Dissident Spyware Attack Belies Bigger Threat

South African phones targeted by notorious ‘governments only’ spyware - Cyber security news

South African phones targeted by notorious ‘governments only’ spyware

An analysis of censorship in Chinese open source projects - Cyber security news

An analysis of censorship in Chinese open source projects

The New Threat of 'Leak-Flavored' Propaganda - Cyber security news

The New Threat of 'Leak-Flavored' Propaganda

Middleboxes in Turkish telecom redirecting users to nation-state spyware - Cyber security news

Middleboxes in Turkish telecom redirecting users to nation-state spyware

Monero Mining Malware Attack Linked to Egyptian Telecom Giant - Cyber security news

Monero Mining Malware Attack Linked to Egyptian Telecom Giant

Turkish ISP Swapped Downloads of Popular Software with Spyware-Infected Apps - Cyber security news

Turkish ISP Swapped Downloads of Popular Software with Spyware-Infected Apps

It's super cheap to launch an effective cyber-espionage scheme - Cyber security news

It's super cheap to launch an effective cyber-espionage scheme

Phishing Campaign Underscores Threat from Low Budget, Low Skilled Attackers - Cyber security news

Phishing Campaign Underscores Threat from Low Budget, Low Skilled Attackers

Security Planner: How to Protect Yourself - Cyber security news

Security Planner: How to Protect Yourself