Citizen Lab has another report out on Pegasus spyware, NSO Group's lawful intercept product. They've found the tool in use in at least forty-five countries. Their scans aren't entirely clear—it's difficult to distinguish targets from users, for example—but Pegasus seems to be in widespread use. Observers note that while some of the regimes who employ the tool do so with lawful restraint, other, more repressive governments make more indiscriminate use of it.
Arbor’s Security Engineering & Response Team (ASERT) reports finding spearphishing emails targeting senior officials in Bahrain. They regard the campaign as similar to an OilRig distribution of the Bondupdater Trojan, discovered by Palo Alto Networks' Unit 42. OilRig is associated with the Iranian government.
Tenable has found a zero-day they're calling "Peekaboo" in the NUUO software widely used in networked video surveillance cameras. They think upwards of 100 brands and 2,500 different models of camera could be vulnerable. Exploitation of the flaw could yield access to the control management system, expose credentials for connected video cameras, and permit both disconnection of live feeds and image tampering. NUUO says a patch is being developed, and that in the meantime users should take steps to limit access to NUUO NVRMini2 deployments.
The theft of intellectual property from universities by hackers linked by SecureWorks researchers to Iran's government looks oddly like petty larceny. Papers are going for as little as £2 ($2.63) on WhatsApp.
Both major US political parties are working on a modus vivendi to control data abuse.