Sept. 7, 2023, 7:36 p.m. | John Scott-Railton

The Citizen Lab citizenlab.ca

Last week, while checking the device of an individual employed by a Washington DC-based civil society organization with international offices, Citizen Lab found an actively exploited zero-click vulnerability being used to deliver NSO Group’s Pegasus mercenary spyware.

actively exploited citizen lab civil civil society click device exploit exploited found international iphone lab nso nso group organization pegasus society spyware vulnerability washington week zero-click zero-click exploit zero-day zero-day exploit

More from citizenlab.ca / The Citizen Lab

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Senior Software Engineer, Security

@ Niantic | Zürich, Switzerland

Consultant expert en sécurité des systèmes industriels (H/F)

@ Devoteam | Levallois-Perret, France

Cybersecurity Analyst

@ Bally's | Providence, Rhode Island, United States

Digital Trust Cyber Defense Executive

@ KPMG India | Gurgaon, Haryana, India

Program Manager - Cybersecurity Assessment Services

@ TestPros | Remote (and DMV), DC