Despite international sanctions, the Predator spyware remains resilient, evolving to evade detection while targeting high-value individuals globally. Initially developed by Cytrox, it utilizes both “1-click” and “zero-click” attack methods to gain complete access to devices. Recent findings reveal sophisticated multi-tiered infrastructure with advanced obfuscation tactics, indicating ongoing operations and a significant presence in multiple countries, especially Africa.

Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages
The cryptocurrency and blockchain ecosystem faces a surge in sophisticated malware targeting open-source supply chains, with 75% of malicious packages found on npm. Attackers exploit