Trail of Bits Spinout iVerify Tackles Mercenary Spyware Threat

iVerify, a seed-stage startup spun out of security research outfit Trail of Bits, on Wednesday rolled out a mobile threat hunting platform to help businesses neutralize the threat from iOS and Android zero-days.
The company, which raised a $4 million round of funding led by Mischief Ventures, is positioning itself as the first mobile threat hunting play specifically focused on tackling sophisticated surveillance spyware made by mercenary hacking groups.
In an interview with SecurityWeek, iVerify chief executive Danny Rogers said the mobile Threat Hunter product will combine deep access to mobile devices with automated detection and expert analysis to scale mobile forensics projects.
iVerify, which was incubated at New York-based Trail of Bits as a consumer mobile app helping users spot misconfigurations and missing patches, expanded into the enterprise market with tooling to help defenders detect malware threats or know when employees aren't following security best practices like enabling biometric locks or updating mobile operating systems.
In addition to pinpointing non-compliant devices in a mobile fleet, Rogers said the threat hunter product will provide alerts on suspicious artifact and anomalous behaviors associated with advanced mercenary spyware attacks.
The product can be rolled out via email-based downloads or through SCIM, MDM, and SSO integrations.
iVerify is promising tooling for deep, always-on mobile forensic investigations that can scale across a large or geographically dispersed organization; rapid data collection from a mobile fleet;, on-device heuristics that flag suspicious activity for further analysis; and support from its team of security engineers and researchers to remediate detected threats.


This Cyber News was published on www.securityweek.com. Publication date: Wed, 06 Dec 2023 16:13:05 +0000


Cyber News related to Trail of Bits Spinout iVerify Tackles Mercenary Spyware Threat

Trail of Bits Spinout iVerify Tackles Mercenary Spyware Threat - iVerify, a seed-stage startup spun out of security research outfit Trail of Bits, on Wednesday rolled out a mobile threat hunting platform to help businesses neutralize the threat from iOS and Android zero-days. The company, which raised a $4 million ...
2 years ago Securityweek.com Cuba
Citizen Lab details ongoing battle against spyware vendors - Citizen Lab senior researcher Bill Marczak said that while the organization has achieved some important wins against spyware proliferation, the progress is inevitably hindered by vendors that continually adapt their technologies and practices. The ...
2 years ago Techtarget.com
Spyware isn't going anywhere, and neither are its tactics - The illegal use of spyware to target high-profile or at-risk individuals is a global problem, as highlighted by this article from The Register that Talos' Nick Biasini just contributed to. As we've written about, many Private Sector Offensive Actors ...
2 years ago Blog.talosintelligence.com CVE-2024-23222
Intellexa and Cytrox: From fixer-upper to Intel Agency-grade spyware - Cisco Talos has a new, in-depth analysis of timelines, operating paradigms and procedures adopted by spyware vendor Intellexa. Talos' analysis revealed that rebooting an iOS or Android device may not always remove the Predator spyware produced by ...
2 years ago Blog.talosintelligence.com
US Uses Visa Restrictions in Struggle Against Spyware - The United States will impose visa restrictions on foreign individuals who have been involving the misuse of spyware, the latest effort by the Biden Administration to address the dangers of the commercial software that often is used by governments ...
2 years ago Securityboulevard.com
Intellexa Spyware Adds Persistence with iOS or Android Device - In the shadowy realm of commercial spyware, the spotlight turns to the notorious Intellexa spyware and its Predator/Alien solution, as dissected by Cisco Talos in their comprehensive May 2023 report. This expose navigates the labyrinthine intricacies ...
2 years ago Gbhackers.com
Hackers abuse Zoom remote control feature for crypto-theft attacks - A hacking group dubbed 'Elusive Comet' targets cryptocurrency users in social engineering attacks that exploit Zoom's remote control feature to trick users into granting them access to their machines. "For organizations handling particularly ...
9 months ago Bleepingcomputer.com
Is Your Organization Infected by Mobile Spyware? - The surge in mobile device usage within organizations has inevitably opened the floodgates to a new kind of cyber threat-mobile spyware. The growing dependence on mobile technology has made it imperative for organizations to recognize and mitigate ...
2 years ago Blog.checkpoint.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
7 months ago Cybersecuritynews.com
What is Spyware? How It Works and How to Protect Yourself Against It - Spyware is a type of malicious software that is designed to collect sensitive data from victims without their knowledge or consent. It is typically installed on computers without the user’s knowledge or consent, and collects sensitive information ...
3 years ago Heimdalsecurity.com
ICE Signs $2 Million Contract With Spyware Maker Paragon Solutions | WIRED - Measures have included placing spyware vendors like NSO Group and Intellexa on the so-called Entity List to prevent any US companies from doing business with them; enacting a visa restriction policy against multiple individuals “who have been ...
1 year ago Wired.com
Apple Warns Users Targeted by Mercenary Spyware - Apple this week updated its spyware threat notification system to alert and assist users it identifies as targeted by mercenary spyware attacks. To date, Apple has spotted and alerted users in more than 150 countries that they were targeted in these ...
1 year ago Darkreading.com
US announces visa ban on those linked to commercial spyware - Secretary of State Antony J. Blinken announced today a new visa restriction policy that will enable the Department of State to ban those linked to commercial spyware from entering the United States. As part of this effort, the Biden Administration ...
2 years ago Bleepingcomputer.com
Kaspersky Details Method for Detecting Spyware in iOS - Researchers with cybersecurity firm Kaspersky are detailing a lightweight method for detecting the presence of spyware, including The NSO Group's notorious Pegasus software, in Apple iOS devices. The new method, which calls for looking for traces of ...
2 years ago Securityboulevard.com
Apple warns people of mercenary attacks via threat notification system - Apple has reportedly sent alerts to individuals in 92 nations on Wednesday, April 10, to say it's detected that they may have been a victim of a mercenary attack. The company says it has sent out these types of threat notifications to over 150 ...
1 year ago Malwarebytes.com
AMD, Apple, Qualcomm GPUs leak AI data in LeftoverLocals attacks - A new vulnerability dubbed 'LeftoverLocals' affecting graphics processing units from AMD, Apple, Qualcomm, and Imagination Technologies allows retrieving data from the local memory space. Tracked as CVE-2023-4969, the security issue enables data ...
2 years ago Bleepingcomputer.com CVE-2023-4969
U.S. rolls out visa restriction policy on people who misuse spyware to target journalists, activists - WASHINGTON - The Biden administration announced Monday it is rolling out a new policy that will allow it to impose visa restrictions on foreign individuals involved in the misuse of commercial spyware. The administration's policy will apply to people ...
2 years ago Pbs.org
Google says spyware vendors behind most zero-days it discovers - Commercial spyware vendors were behind 80% of the zero-day vulnerabilities Google's Threat Analysis Group discovered in 2023 and used to spy on devices worldwide. Zero-day vulnerabilities are security flaws the vendors of impacted software do not ...
2 years ago Bleepingcomputer.com
US to Roll Out Visa Restrictions on People Who Misuse Spyware to Target Journalists, Activists - The Biden administration announced Monday it is rolling out a new policy that will allow it to impose visa restrictions on foreign individuals involved in the misuse of commercial spyware. The administration's policy will apply to people who've been ...
2 years ago Securityweek.com
Attackers Could Eavesdrop on AI Conversations on GPUs - Researchers at cybersecurity research and consulting firm Trail of Bits have discovered a vulnerability that could allow attackers to read GPU local memory from affected Apple, Qualcomm, AMD and Imagination GPUs. In particular, the ...
2 years ago Techrepublic.com
DARPA awards $1 million to Trail of Bits for AI Cyber Challenge - We're excited to share that Trail of Bits has been selected as one of the seven exclusive teams to participate in the small business track for DARPA's AI Cyber Challenge. Our team will receive a $1 million award to create a Cyber Reasoning System and ...
1 year ago Securityboulevard.com
Paragon Spyware Exploited WhatsApp Zero-day Vulnerability to Attack High-value Targets - Researchers have uncovered extensive evidence linking Israeli firm Paragon Solutions to a sophisticated spyware operation that exploited a zero-day vulnerability in WhatsApp to target journalists and civil society members. The investigation confirmed ...
10 months ago Cybersecuritynews.com
Clayrat spyware targets Android users with advanced surveillance capabilities - Clayrat spyware has emerged as a significant threat targeting Android devices, leveraging advanced surveillance capabilities to compromise user privacy and security. This sophisticated malware is designed to infiltrate Android smartphones, enabling ...
4 months ago Infosecurity-magazine.com