Oct. 25, 2023, 7:18 p.m. | SC Staff

SC Magazine feed for Threats www.scmagazine.com

Significant stealth capabilities have been exhibited by threat actors behind the Operation Triangulation campaign, which emerged in June and involved the exploitation of Apple iOS zero-day vulnerabilities to facilitate the deployment of the TriangleDB backdoor for data exfiltration, has been discovered to exhibit significant stealth capabilities, The Hacker News reports.

apple apple ios backdoor campaign capabilities covert data data exfiltration deployment endpointdevice-security exfiltration exploitation hacker ios june operation triangulation reports stealth threat threat actors threat intelligence triangledb triangulation vulnerabilities vulnerability management zero-day zero-day vulnerabilities

DevSecOps Engineer

@ Material Bank | Remote

Instrumentation & Control Engineer - Cyber Security

@ ASSYSTEM | Bridgwater, United Kingdom

Security Consultant

@ Tenable | MD - Columbia - Headquarters

Management Consultant - Cybersecurity - Internship

@ Wavestone | Hong Kong, Hong Kong

TRANSCOM IGC - Cybersecurity Engineer

@ IT Partners, Inc | St. Louis, Missouri, United States

Manager, Security Operations Engineering (EMEA)

@ GitLab | Remote, EMEA