Reports have emerged that the ruler of Dubai, Sheikh Mohammed bin Rashid al-Maktoum, used agents of both Dubai and the United Arab Emirates to hack into and monitor the phones of his ex-wife, her legal advisors, staff, and other contacts in the midst of a custody battle concerning their two
This week, Apple released an urgent update that mitigates a critical vulnerability exploited by the Pegasus mobile software. The flaw, which is tracked as CVE-2021-30860, was first discovered by security researchers at the University of Toronto’s Citizen Lab when analyzing the iPhone of a Saudi activist who had been targeted
Authorities have opened an investigation into the Israeli company, NSO Group, behind the Pegasus spyware. Officials from multiple different agencies within the Israeli government visited NSO Group’s offices as part of the new investigation amid claims that the firm is selling its powerful spyware to threat actors who then commit
NGO Amnesty International has called for a moratorium on surveillance technology produced by an Israeli firm used against a long list of journalists, activists, and heads of state. The spyware called Pegasus, and its usage have exposed a global human rights crisis, according to Amnesty. The NGO is now warning
Project Pegasus: Global news organizations reveal expansive investigation of NSO Group “zero click” surveillance software
Seventeen news organizations around the globe have launched Project Pegasus, a hard-hitting investigative report of the Israel-based NSO group. The news project is eponymously concerned with Pegasus, the cyberespionage tool developed by the NSO Group.
On Tuesday, Amnesty International stated that French President Emmanual Macron was included on a list of 14 current or former heads of state who were potentially targeted for hacking through a product called Pegasus made by the Israeli spyware firm NSO Group. The organization called the incident an unprecedented revelation
“Colleagues of slain Javier Valdez Cárdenas, known for investigating drug cartels, were targeted just days after his death. Of six messages analyzed (though more were received), several contained links shortened with bit.ly that ultimately pointed to known exploit URLs, while others included links directly containing previously–identified NSO Group exploit domains.