Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

3 SOC Challenges You Need to Solve Before 2026

December 4, 2025

US and Australia Issue Guidance for Secure AI in Infrastructure

December 4, 2025

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware

December 4, 2025
Facebook X (Twitter) Instagram
Thursday, December 4
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Pall Mall Process to Define Responsible Commercial Cyber Intrusion
News

Pall Mall Process to Define Responsible Commercial Cyber Intrusion

Team-CWDBy Team-CWDDecember 3, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


An international effort is underway to draw up guidelines for commercial spyware and similar providers, in an attempt to stamp out “irresponsible” behavior.

The Pall Mall Process was launched in 2024 by the UK and France – with 27 governments and tech giants including Google, Microsoft, Apple and Meta signing up to limit the fast-growing trade in commercial spyware and zero-day exploits.

As part of its crucial second phase, the initiative is looking to canvas opinion from the “offensive cyber” industry on what responsible behavior by private sector firms looks like. The resulting guidelines will complement its Code of Practice for States, which was signed by those 27 nations last year, according to the National Cyber Security Centre (NCSC).

“Commercial cyber intrusion capabilities (CCICs) are an essential part of many countries’ toolkits for tackling serious crime, countering national security threats, and protecting citizens,” the NCSC said. “But without the necessary safeguards, their use can be dangerous and destabilising. The Pall Mall process seeks to maximise the positive use made of CCICs while striving to eradicate their harmful use.”

Read more on the Pall Mall Process: Governments and Tech Giants Unite Against Commercial Spyware.

The NCSC explained in a blog post yesterday that it considers CCICs to include vulnerability research and exploit development (VRED), malware creation, command and control (C2), hacking-as-a-service, and access-as-a-service.

“The market for CCICs encompasses a wide variety of cyber intrusion companies offering products and services that are continually evolving and diversifying,” the NCSC added.

“It includes an interconnected ecosystem of researchers, developers, brokers, resellers, investors, corporate entities, operators, and customers, including states. Everyone in this ecosystem has a part to play in encouraging/advocating responsible use of CCICs.”

The UK and French governments are particularly keen to hear from anyone working in the CCIC market, to understand their motivations and get their thoughts on how the industry can move forward in a responsible way.

The idea behind the guidelines is not only to agree on what responsible behavior looks like, but also to enable the community to tackle irresponsible use of CCICs.

Commercial Spyware Goes from Strength to Strength

The move comes as the market for CCICs continues to grow. New zero-day vulnerabilities are being discovered and patched on a monthly basis by the likes of Google and Apple.

In early November, the US Cybersecurity and Infrastructure Security Agency (CISA) ordered federal agencies to patch a zero-day flaw that had been used by threat actors since mid-2024 in attacks on WhatsApp users with Samsung devices.

A month previously, Google patched a zero-day in Chrome linked to a targeted espionage campaign dubbed “Operation ForumTroll,” which involved tools developed by Italian spyware vendor Memento Labs.

Some unscrupulous individuals are also looking to cash in on the demand for CCICs. In October, it emerged that the boss of a US defense contractor had pleaded guilty to selling zero-day exploits developed by the firm to a Russian broker who counts the Kremlin among his clients.  

The consultation is set to close on December 22.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access
Next Article Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs
Team-CWD
  • Website

Related Posts

News

3 SOC Challenges You Need to Solve Before 2026

December 4, 2025
News

US and Australia Issue Guidance for Secure AI in Infrastructure

December 4, 2025
News

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware

December 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

How it preys on personal data – and how to stay safe

October 23, 2025

What’s at stake if your employees post too much online

December 1, 2025

What is it, and how do I get it off my device?

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.