Cybersecurity Briefing — Pegasus spyware investigation exposes NSO exploits
A 18 July 2021 media consortium investigation revealed widespread NSO Group Pegasus spyware targeting journalists, activists, and officials via zero-click mobile exploits, prompting patch and monitoring actions.
An international consortium led by Forbidden Stories and Amnesty Tech reported on 18 July 2021 that NSO Group’s Pegasus spyware had been deployed against thousands of phone numbers tied to journalists, activists, corporate executives, and government officials. Forensic analysis documented zero-click exploits against iOS and Android, accelerating emergency patches such as Apple’s later FORCEDENTRY fix and new threat notifications.
Security teams should ensure mobile device patching SLAs include rapid zero-day updates, deploy MDM logging and anomaly detection for high-risk users, and review lawful access and surveillance risk disclosures for customers in sensitive sectors.
Continue in the Cybersecurity pillar
Return to the hub for curated research and deep-dive guides.
Latest guides
-
Cybersecurity Operations Playbook — Zeph Tech
Use Zeph Tech research to align NIST CSF 2.0, CISA KEV deadlines, and sector mandates across threat intelligence, exposure management, and incident response teams.




