all InfoSec news
Operation Triangulation campaign's covert measures detailed
SC Magazine feed for Threats www.scmagazine.com
Significant stealth capabilities have been exhibited by threat actors behind the Operation Triangulation campaign, which emerged in June and involved the exploitation of Apple iOS zero-day vulnerabilities to facilitate the deployment of the TriangleDB backdoor for data exfiltration, has been discovered to exhibit significant stealth capabilities, The Hacker News reports.
apple apple ios backdoor campaign capabilities covert data data exfiltration deployment endpointdevice-security exfiltration exploitation hacker ios june operation triangulation reports stealth threat threat actors threat intelligence triangledb triangulation vulnerabilities vulnerability management zero-day zero-day vulnerabilities