Tag: phone
-
Substack Breach: 662,752 User Records Leaked on Cybercrime Forum
Substack confirms a breach after hacker accessed internal user records now circulating on crime forums, exposing emails, phone numbers, and account metadata. First seen on hackread.com Jump to article: hackread.com/substack-breach-user-records-leak-cybercrime-forum/
-
Hacker claims theft of data from 700,000 Substack users; Company confirms breach
Substack confirmed a data breach after a hacker leaked data from nearly 700,000 users, including email addresses and phone numbers. Substack is an online platform for publishing email”‘based newsletters and blogs, with built”‘in paid subscriptions and basic analytics. It’s free to start; creators pay a fee on paid plans. In 2026 it’s estimated to serve…
-
Substack says intruder lifted emails, phone numbers in months-old breach
Contact details were accessed in an intrusion that went undetected for months, the blogging outfit says First seen on theregister.com Jump to article: www.theregister.com/2026/02/05/substack_admit_security_incident/
-
Substack confirms data breach affects users’ email addresses and phone numbers
Substack said that customer data was accessed in October 2025, but wasn’t discovered until early February. First seen on techcrunch.com Jump to article: techcrunch.com/2026/02/05/substack-confirms-data-breach-affecting-email-addresses-and-phone-numbers/
-
Newsletter platform Substack notifies users of data breach
Newsletter platform Substack is notifying users of a data breach after attackers stole their email addresses and phone numbers in October 2025. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/newsletter-platform-substack-notifies-users-of-data-breach/
-
Research: Predator spyware can turn off Apple indicators showing when microphone, camera are in use
The new research from Jamf Threat Labs demonstrates how Predator spyware can stay hidden on targeted phones by “intercepting sensor activity” to hide the indicators. First seen on therecord.media Jump to article: therecord.media/predator-spyware-iphone-camera-microphone-indicators
-
Zero trust in practice: A deep technical dive into going fully passwordless in hybrid enterprise environments
Tags: access, attack, authentication, backup, breach, business, cloud, compliance, credentials, cybersecurity, data, endpoint, group, Hardware, identity, infrastructure, lessons-learned, network, password, phishing, phone, risk, service, technology, update, windows, zero-trustArchitecture decisions: Hybrid authentication flows and Windows Hello for Business: Once your prerequisites are in place, you face critical architectural decisions that will shape your deployment for years to come. The primary decision point is whether to use Windows Hello for Business, FIDO2 security keys or phone sign-in as your primary authentication mechanism.In my experience,…
-
Chinese Money Laundering Jargon via Google’s Gemini
After having a short discussion with Gemini about Chinese Money Laundering, I could tell we weren’t quite connecting on my Mandarin-assistance requests, so I shared an example post from a Telegram “Crime-as-a-Service” group that was part of a Chinese Guarantee Syndicate. For context, these posts were made in the Tudou Guarantee Syndicate’s group dedicated to…
-
Apple’s new iPhone and iPad security feature limits cell networks from collecting precise location data
The new security feature makes it more difficult for police and malicious hackers to obtain a person’s precise location data from a cell phone company. First seen on techcrunch.com Jump to article: techcrunch.com/2026/01/29/apples-new-iphone-and-ipad-security-feature-limits-cell-networks-from-collecting-precise-location-data/
-
Microsoft Previews Windows 11 Update With Smarter AI and Phone Continuity
Here’s a peek at AI assistance, phone-to-PC handoff, accessibility improvements, security fixes, and stability updates. The post Microsoft Previews Windows 11 Update With Smarter AI and Phone Continuity appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-windows-11-preview-ai-phone-upgrades/
-
Why Protecting Your Phone Number Matters for Online Security
Learn why phone numbers are critical to online security, how they’re exposed, and practical steps to reduce misuse, scams, and account takeover risks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/why-protecting-your-phone-number-matters-for-online-security/
-
ShinyHunters Claims 14M Panera Bread Records Exposed in Data Breach
The dataset allegedly includes names, email addresses, postal addresses, phone numbers, and account-related details. The post ShinyHunters Claims 14M Panera Bread Records Exposed in Data Breach appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-panera-bread-data-breach/
-
Samsung tackles shoulder surfing on Galaxy devices
Tags: phoneOur phones hold our most personal details, and we use them everywhere. On the bus, in elevators, and while waiting in line, screens are often visible to people nearby. The … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/29/samsung-galaxy-privacy-feature/
-
Smashing Security podcast #452: The dark web’s worst assassins, and Pegasus in the dock
In episode 452, a London-based YouTuber wins a landmark court case against Saudi Arabia after his phone was hacked with Pegasus spyware, exposing how a single, seemingly harmless text message can turn a smartphone into a round-the-clock surveillance device. First seen on grahamcluley.com Jump to article: grahamcluley.com/smashing-security-podcast-452/
-
Android Phones Get AI-Powered Anti-Theft Features
Enhanced lockouts and stronger remote locking aim to make stolen devices far harder”, and less profitable”, for criminals. The post Android Phones Get AI-Powered Anti-Theft Features appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-android-anti-theft-features/
-
Android just got smarter at stopping snatchrun phone thefts
Google announced updates to the Android theft protection features that expand existing safeguards and make stolen devices harder to use. These updates are available on Android … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/28/google-android-theft-protection-features/
-
Saudi Arabia ordered to pay £3m to UK dissident targeted with Pegasus spyware
A court has found that the Kingdom of Saudi Arabia subjected a London-based human rights activist to abuse and physical violence after infecting his phone with Pegasus spyware First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637759/Saudi-Arabia-ordered-to-pay-3m-to-UK-dissident-targeted-with-Pegasus-spyware
-
ShinyHunters Target 100+ Firms Using Phone Calls to Bypass SSO Security
ShinyHunters is driving attacks on 100+ organisations, using vishing and fake login pages with allied groups to bypass SSO and steal company data, reports Silent Push. First seen on hackread.com Jump to article: hackread.com/shinyhunters-target-firms-bypass-sso-security/
-
China-linked group accused of spying on phones of UK prime ministers’ aides for years
Reports say Salt Typhoon attackers accessed handsets of senior govt folk First seen on theregister.com Jump to article: www.theregister.com/2026/01/27/chinalinked_hackers_accused_of_yearslong/
-
What It Doxxing? How It Happens, and How to Stay Safe?
In today’s digital world, our private information is more accessible than ever. The benefits of the internet pose a significant threat to our privacy and security. Doxxing is one such threat, which means publicly revealing private, sensitive, or identifying information about an individual without their consent. This information includes home addresses, emails, phone numbers, workplaceRead…
-
Fake Microsoft Teams Billing Phishing Alerts Reach 6,135 Users via 12,866 Emails
Scammers are abusing Microsoft Teams invitations to send fake billing notices, with 12,866 emails reaching around 6,135 users in a phone-based phishing campaign. First seen on hackread.com Jump to article: hackread.com/fake-microsoft-teams-billing-phishing-alerts-emails/
-
Fake Microsoft Teams Billing Phishing Alerts Reach 6,135 Users via 12,866 Emails
Scammers are abusing Microsoft Teams invitations to send fake billing notices, with 12,866 emails reaching around 6,135 users in a phone-based phishing campaign. First seen on hackread.com Jump to article: hackread.com/fake-microsoft-teams-billing-phishing-alerts-emails/
-
Saudi satirist hacked with Pegasus spyware wins damages in court battle
The London High Court awarded the London-based satirist and human rights activist Ghanem Al-Masarir more than £3 million, after finding the Saudi government hacked his phone and was likely behind a physical attack targeting him in London. First seen on techcrunch.com Jump to article: techcrunch.com/2026/01/26/saudi-satirist-hacked-with-pegasus-spyware-wins-damages-in-court-battle/
-
Audio Accessory Flaw Converts Headphones Into Spy Tool
‘WhisperPair’ Flaw Likely to Endure for Years. A hacker could secretly record phone conversations, track users’ locations and blast music through headphones due to a flaw in implementations of a Google-developed low-energy technology for discovering nearby Bluetooth devices. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/audio-accessory-flaw-converts-headphones-into-spy-tool-a-30595
-
Okta Uncovers Custom Phishing Kits Built for Vishing Callers
They can intercept user credentials while providing real-time context that helps attackers convince victims to approve MFA challenges during phone calls.. The post Okta Uncovers Custom Phishing Kits Built for Vishing Callers appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-phishing-kits-vishing-callers/
-
Okta Uncovers Custom Phishing Kits Built for Vishing Callers
They can intercept user credentials while providing real-time context that helps attackers convince victims to approve MFA challenges during phone calls.. The post Okta Uncovers Custom Phishing Kits Built for Vishing Callers appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-phishing-kits-vishing-callers/
-
Researchers find Jordan government used Cellebrite phone-cracking tech against activists
The incidents occurred amid Gaza protests and suggest human rights violations, Citizen Lab said. First seen on cyberscoop.com Jump to article: cyberscoop.com/researchers-find-jordan-government-used-cellebrite-phone-cracking-tech-against-activists/
-
Jordan used Cellebrite phone-hacking tools against activists critical of Gaza war, report finds
The findings, published by Citizen Lab Thursday, are based on the research institute’s digital forensic analysis of seized phones in four cases and Jordanian court records in three cases. First seen on therecord.media Jump to article: therecord.media/jordan-used-cellebrite-against-activists-critical-gaza-war

