Technology ❯ Cybersecurity ❯ Malware ❯ Spyware
The case exposes weak post‑approval monitoring and auto‑updates that let sleeper add‑ons pivot into spyware years later.