About 141,000 results
Open links in new tab
  1. Predator as adaptive spyware: how failed attacks are used for ...

    3 days ago · The Predator spyware from the Intellexa Alliance is once again the focus of security analyses. Previous investigations, including those conducted by the Google Threat Intelligence …

  2. Predator Spyware Turns Failed Attacks Into Intelligence for ...

    Predator spyware, developed by Intellexa, has advanced anti-forensics and anti-detection capabilities that allow it to learn from its own failures and improve future exploits. It is marketed primarily to …

  3. Predator Spyware Sample Indicates 'Vendor-Controlled' C2

    5 days ago · Researchers detailed how Intellexa, Predator's owner, uses failed deployments to strengthen its commercial spyware and generate more effective attacks.

  4. The learning threat: Predator spyware is more sophisticated ...

    4 days ago · Recently, the Google Threat Intelligence Group dissected the powerful Predator spyware of the Intellexa consortium thoroughly once more. But what was considered a decisive insight into the …

  5. Predator Spyware Turns Failed Attacks Into Intelligence For ...

    4 days ago · Predator Spyware Turns Failed Attacks Into Intelligence For Future Exploits (securityweek.com) 5 Posted by EditorDavid on Saturday January 17, 2026 @05:41PM from the I'll …

  6. Predator Spyware Analysis Reveals Error Reporting and Control ...

    5 days ago · New data on Predator spyware shows its creators have a sophisticated deployment control system that collects data on failed attacks. This calls into question manufacturers' claims about the …

  7. Predator spyware demonstrates troubleshooting, researcher ...

    Jan 14, 2026 · Predator spyware operators have the ability to recognize why an infection failed, and the tech has more sophisticated capabilities for averting detection than previously known, according to …