Oct. 25, 2023, 7:18 p.m. | SC Staff

SC Magazine feed for Threats www.scmagazine.com

Significant stealth capabilities have been exhibited by threat actors behind the Operation Triangulation campaign, which emerged in June and involved the exploitation of Apple iOS zero-day vulnerabilities to facilitate the deployment of the TriangleDB backdoor for data exfiltration, has been discovered to exhibit significant stealth capabilities, The Hacker News reports.

apple apple ios backdoor campaign capabilities covert data data exfiltration deployment endpointdevice-security exfiltration exploitation hacker ios june operation triangulation reports stealth threat threat actors threat intelligence triangledb triangulation vulnerabilities vulnerability management zero-day zero-day vulnerabilities

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States