Despite international sanctions, the Predator spyware remains resilient, evolving to evade detection while targeting high-value individuals globally. Initially developed by Cytrox, it utilizes both “1-click” and “zero-click” attack methods to gain complete access to devices. Recent findings reveal sophisticated multi-tiered infrastructure with advanced obfuscation tactics, indicating ongoing operations and a significant presence in multiple countries, especially Africa.

This invisible malware hijacks checkout pages using trusted Google URLs, and you’ll never see it coming
Malicious attackers have found a new way of bypassing antivirus programs by infiltrating browsers with malware that is activated during the checkout process on ecommerce