Tom Maraval 1 min

Our first blogpost of the year is about our analysis of the Operation triangulation spyware. We’ve digged into the keychain module of the spyware and detailed the iOS keychain internals. You can find it here.

This analysis is part of our researchs to continously improve the IoCs (Indicators of Compromise) of our automated smartphone security solution: Shindan.