Russian Cyberattacks Linked to Missile Strikes: ATT&CK Advisory Council Exposes Predator Bypassing iOS Security Indicators
New Technique Allows Predator Spyware to Bypass Apple’s Recording Indicators
A recently discovered technique used by Predator spyware allows it to bypass Apple’s recording indicators on iOS devices. By installing a single hook to intercept and silently discard sensor activity updates, the malware can suppress both camera and microphone indicators simultaneously during covert recording.
Technique Requires Prior Full Device Compromise
This capability requires prior full device compromise and does not rely on new iOS vulnerabilities. The technique uses kernel-level access to modify thread state and exploit Objective-C nil messaging.
Russian Cyberattacks Shift Focus to Intelligence Gathering
In a separate development, Ukrainian cybersecurity officials have revealed that Russian cyberattacks against the country’s energy grid have shifted from causing immediate disruptions to gathering intelligence to support and guide missile strikes.
Intrusions Help Map Facilities and Monitor Repair Efforts
These intrusions help map facilities, monitor repair efforts, and evaluate recovery timelines both before and after physical attacks.
US Department of the Treasury Launches Cybersecurity Initiative
The US Department of the Treasury has announced a public-private initiative to improve cybersecurity and risk management for artificial intelligence (AI) in the financial services sector.
Initiative to Deliver Practical Resources for Safe AI Adoption
The effort, developed through the Artificial Intelligence Executive Oversight Group, will deliver a series of practical resources to support safe and resilient AI adoption while addressing related cyber risks.
Cybersecurity and Venture Markets See Increased Valuations
A recent report by DataTribe found that valuations in cybersecurity and broader venture markets rose in Q4 2025, with capital concentrated in large deals and early-stage activity showing gains.
AI Remains Central to Investment Focus
AI remained central to investment focus, driving startup alignment with enterprise priorities in areas like AI security and automation.
ShinyHunters Claims Responsibility for Odido Hack
ShinyHunters has claimed responsibility for hacking Dutch telecommunications provider Odido, alleging they stole nearly 21 million records containing personal customer information.
Odido Confirms Personal Data Exposure
Odido previously disclosed a cyberattack affecting its customer contact system, confirming personal data exposure for about 6.2 million customers but denying that passwords, billing details, or other sensitive elements were compromised.
CrowdStrike’s 2026 Global Threat Report Highlights Evasive Adversaries
CrowdStrike’s 2026 Global Threat Report describes 2025 as the year of the evasive adversary, with attackers using AI to accelerate operations and exploit new surfaces.
Key Trends Include Rise in AI-Enabled Attacks
Key trends include an 89% rise in AI-enabled attacks, faster breakout times averaging 29 minutes, and a high proportion of malware-free detections.
MITRE Forms ATT&CK Advisory Council
MITRE has formed a new ATT&CK Advisory Council composed of cybersecurity experts from government, industry, and academia.
Council to Provide Strategic Guidance
The council will provide strategic guidance to support the ongoing development and long-term stewardship of the MITRE ATT&CK framework.
New Android Remote Access Trojan Emerges
A new Android remote access trojan called Oblivion is being sold for around $300 and claims to bypass detection and security features on devices from major manufacturers.
Malware Uses Advanced Techniques to Gain Persistent Access
The malware reportedly uses advanced techniques to gain persistent access, steal sensitive data, and maintain control without triggering built-in protections.
OpenAI Takes Action Against Threat Actors
OpenAI has reported taking action against multiple threat actors who attempted to use its AI models for harmful purposes, including influence operations, phishing, and malware development.
Company Disrupts Coordinated Campaigns
The company disrupted several coordinated campaigns by banning associated accounts, removing malicious content, and sharing indicators with industry partners and law enforcement.
