{"id":111379,"date":"2024-08-28T21:05:06","date_gmt":"2024-08-28T21:05:06","guid":{"rendered":"https:\/\/quixnet.net\/commercial-spyware-vendor-exploits-used-by-kremlin-backed-hackers-google-says-ars-technica\/"},"modified":"2024-08-28T21:05:06","modified_gmt":"2024-08-28T21:05:06","slug":"commercial-spyware-vendor-exploits-used-by-kremlin-backed-hackers-google-says-ars-technica","status":"publish","type":"post","link":"https:\/\/quixnet.net\/wpinstance\/commercial-spyware-vendor-exploits-used-by-kremlin-backed-hackers-google-says-ars-technica\/","title":{"rendered":"Commercial spyware vendor exploits used by Kremlin-backed hackers, Google says &#8211; Ars Technica"},"content":{"rendered":"<div>\n<ol>\n<li><a target=\"_blank\" href=\"https:\/\/news.google.com\/rss\/articles\/CBMiuwFBVV95cUxNRE9OU1JSMWxQeHZ0QmxJOHpzcVBoX2Q2NThCbFMtN2piZzNXYXBueXpyMGRJX2xDdHNUZEFXSUp0a0ZWbnFQLV9yc0lpYlE3YmhNRlh3a1BzOVpkd1lOZWxmM05oVmpERjdhdjNqX2lydTh6UnNhQVpFanFYaUFOR2QwUjY0dFFKSTFSY0FMUGttRm85M0Foa0VIYkVoTDNOcEhPREplQlFmeGNGM2V0TVg1ZDJueUw4aEkw?oc=5\" rel=\"noopener\">Commercial spyware vendor exploits used by Kremlin-backed hackers, Google says<\/a><font color=\"#6f6f6f\">Ars Technica<\/font><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/news.google.com\/rss\/articles\/CBMizwFBVV95cUxOTW02bmNXSVc2Q3BzMEU2UW9CVzRRcmNOR2FaeHRvdTJKMW5JY3VmRXYyUUZYMk9TZzVZR1BlYVlkQ2ZFaU0wWlQ2MG15WUtFTldnMFNVOE8yZkVHSVg2WmpLNHNXNzA5TmFIZTU1SWFkSGQ1QjhSTDJXb2E3UjgwYWI5bFZKQXRLSzR4NW81SzU1dmg5QVlocFJfbmlQaDU4WVBqa2p3T1FzdWNuX1AtRG1PdS1NblBWdnprTk4zWUxyWG5fSkg5bHFlR3Rad1k?oc=5\" rel=\"noopener\">State-backed attackers and commercial surveillance vendors repeatedly use the same exploits<\/a><font color=\"#6f6f6f\">The Keyword<\/font><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/news.google.com\/rss\/articles\/CBMifkFVX3lxTFBKSUNFRmhuQTFsOW5RMkhzbnhUejdrM0tWOXVrbF9wRkYza0FpN29MWGJfT2tFdWxzaG5NUUVUTEVRQTh4WjNKSG9UbGxlZGZJRkw4dnowVi1wc1VPN3E1ajZrN1dyamVGQXNjU2c1dUQydllOMGlQdHF0QUU0Zw?oc=5\" rel=\"noopener\">Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack<\/a><font color=\"#6f6f6f\">The Hacker News<\/font><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/news.google.com\/rss\/articles\/CBMidkFVX3lxTFBCQlJzcjdJZ0FSeUdILVJMc0ljOXVzNEtRcXF3ZGhIM2xERjc5TTVJOVRjZzM4S2xxYUxyTmdXMGI2SWVxTm5MTWo5RDJvQ0JRU0U0X0lrdmNXaWF1LXZnY21YOWZPeVdTM2VLZHptRGVEZnVES1E?oc=5\" rel=\"noopener\">Powerful Spyware Exploits Enable a New String of &lsquo;Watering Hole&rsquo; Attacks<\/a><font color=\"#6f6f6f\">WIRED<\/font><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/news.google.com\/rss\/articles\/CBMivAFBVV95cUxOZXZjaFAtTzVRNjBNVHo5eWY3bF9mYXhHRmZDR0lXRm9HalJURm80ZkI5d0FTdVBxcUNsbU52bkVFVGZpMnRJcHo5VkZlTTlLWndjak5CUXZMZk14bjlKMXFnbFlyN1NYM280QnBvM1ROa0xXNktRVUo1SUJXNTFTNmUtUWhsVkcyY1htaktWM1M5SnNPTGlBZzlobVlZd2VUWF9MV0Y3OTVOcURUMFJ0eVcwRTEzdDFSenlsddIBwgFBVV95cUxPRHdWVzV1YkI5ZEJET2V0dWs0anV6MU9sbms0VXRSdjFfN2ZoVzNTYXRTWUsxR056Y3NsMHdqbHljZ0dVZTRiT3Fhck4tSjVPQzRBSmxLNUp1aTBFbEZmdHd0REtQTXlPRW9tSUxKNlRZU2lWUmJXMmRRUEtZb3pWOVlMVE1VRDhuc2Y1dU1MRkc0dlNUaXRzWWdkZHIyZGlIYVQzQWVNZTdpbkRwNWtPN2pWMGR2ZjFkcmJ2VF9pdDQzQQ?oc=5\" rel=\"noopener\">Russian APT29 hackers use iOS, Chrome exploits created by spyware vendors<\/a><font color=\"#6f6f6f\">BleepingComputer<\/font><\/li>\n<\/ol>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Commercial spyware vendor exploits used by Kremlin-backed hackers, Google saysArs Technica State-backed attackers and commercial surveillance vendors repeatedly use the same exploitsThe Keyword Russian Hackers Exploit Safari and Chrome Flaws in High-Profile CyberattackThe Hacker News Powerful Spyware Exploits Enable a New String of &lsquo;Watering Hole&rsquo; AttacksWIRED Russian APT29 hackers use iOS, Chrome exploits created by [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[8],"tags":[],"class_list":{"0":"post-111379","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-technology","7":"entry"},"_links":{"self":[{"href":"https:\/\/quixnet.net\/wpinstance\/wp-json\/wp\/v2\/posts\/111379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quixnet.net\/wpinstance\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quixnet.net\/wpinstance\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quixnet.net\/wpinstance\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/quixnet.net\/wpinstance\/wp-json\/wp\/v2\/comments?post=111379"}],"version-history":[{"count":0,"href":"https:\/\/quixnet.net\/wpinstance\/wp-json\/wp\/v2\/posts\/111379\/revisions"}],"wp:attachment":[{"href":"https:\/\/quixnet.net\/wpinstance\/wp-json\/wp\/v2\/media?parent=111379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quixnet.net\/wpinstance\/wp-json\/wp\/v2\/categories?post=111379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quixnet.net\/wpinstance\/wp-json\/wp\/v2\/tags?post=111379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}