Today > 1 Critical | 2 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
Predator spyware's infrastructure has resurfaced with modifications to evade detection and anonymize users, despite previous exposure and sanctions. The spyware continues to pose significant risks, especially to high-profile individuals in countries like the Democratic Republic of the Congo and Ang…