Alias Description | Votes |
---|---|
Predator Spyware is a possible alias for Predator. Predator Spyware is a malicious software known for its extensive data-stealing and surveillance capabilities. It has been designed to exploit and damage devices, often infiltrating systems via suspicious downloads, emails, or websites without the user's knowledge. Once inside, it can steal personal | 5 |
Alias Description | Association Type | Votes |
---|---|---|
The Pegasus Malware is associated with Predator. Pegasus is a highly controversial and sophisticated malware, developed by Israel's NSO Group, designed to covertly monitor and extract data from iOS and Android smartphones. Once installed, Pegasus can intercept messages, emails, media, and passwords, and track location data, all while evading detec | Unspecified | 7 |
Alias Description | Association Type | Votes |
---|---|---|
The CVE-2023-41991 Vulnerability is associated with Predator. CVE-2023-41991 is a critical software vulnerability discovered within Apple's Security framework, as part of an exploit chain that included two additional vulnerabilities (CVE-2023-41992 and CVE-2023-41993) found in the WebKit browser engine and Apple's kernel framework. These flaws were reported by | Unspecified | 3 |
The CVE-2023-41993 Vulnerability is associated with Predator. CVE-2023-41993 is a software vulnerability discovered in Apple's WebKit browser engine. This flaw, along with two others (CVE-2023-41991 and CVE-2023-41992), was identified as being exploited in attacks in the wild, prompting Apple to release emergency security updates. These vulnerabilities allowed | Unspecified | 3 |
The CVE-2023-41992 Vulnerability is associated with Predator. CVE-2023-41992 is a significant vulnerability discovered in Apple's Kernel Framework, which provides APIs and support for kernel extensions and kernel resident device drivers. This flaw in software design or implementation allows local attackers to exploit it and escalate their privileges within the | Unspecified | 3 |
The CVE-2023-5217 Vulnerability is associated with Predator. CVE-2023-5217 is a high-severity zero-day vulnerability identified within the VP8 encoding of the open-source libvpx video codec library utilized by Google Chrome. The flaw, a heap buffer overflow, was capable of causing application crashes or allowing arbitrary code execution, thereby making it a s | Unspecified | 2 |
The CVE-2023-4762 Vulnerability is associated with Predator. CVE-2023-4762 is a software vulnerability, specifically a remote code execution flaw in the Chrome web browser. This vulnerability was identified by researchers from Google's Threat Analysis Group (TAG) in September 2023, around the same time Apple disclosed its own zero-day bugs. The vulnerability | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
Securityaffairs | 2 months ago | ||
Securityaffairs | 2 months ago | ||
DARKReading | 2 months ago | ||
InfoSecurity-magazine | 2 months ago | ||
BankInfoSecurity | 2 months ago | ||
Securityaffairs | 2 months ago | ||
DARKReading | 2 months ago | ||
InfoSecurity-magazine | 2 months ago | ||
Recorded Future | 3 months ago | ||
DARKReading | 4 months ago | ||
CERT-EU | 9 months ago | ||
Recorded Future | 4 months ago | ||
InfoSecurity-magazine | 6 months ago | ||
Securityaffairs | 7 months ago | ||
CERT-EU | 8 months ago | ||
Securityaffairs | 8 months ago | ||
CERT-EU | 8 months ago | ||
CERT-EU | 8 months ago | ||
CERT-EU | 8 months ago | ||
CERT-EU | 8 months ago |