Tag: phone
-
WhatsApp Screen-Sharing Scam: How Attackers Are Deceiving Users to Expose Sensitive Information
Scams and threats circulating on messaging apps like WhatsApp demonstrate how easily trusted platforms can be weaponized against users. One deceptive tactic gaining traction involves tricking people into sharing their phone screens during WhatsApp video calls. The screen-sharing feature, available since 2023, is increasingly being turned against users to steal data, identities, and money. Cases…
-
DoorDash Confirms Data Breach Exposing Customer Personal Information
DoorDash has confirmed an October 2025 data breach that exposed customer names, phone numbers, addresses and email details First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/doordash-confirms-data-breach/
-
A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers
By plugging tens of billions of phone numbers into WhatsApp’s contact discovery tool, researchers found “the most extensive exposure of phone numbers” ever”, along with profile photos and more. First seen on wired.com Jump to article: www.wired.com/story/a-simple-whatsapp-security-flaw-exposed-billions-phone-numbers/
-
The Battle Over The Search of a Cell Phone Feds v. Locals
As state and federal authorities seek broad access to a seized phone, a Virginia prosecutor argues for narrowly tailored digital searches, a clash that could redefine Fourth Amendment protections for modern devices. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/the-battle-over-the-search-of-a-cell-phone-feds-v-locals/
-
The Battle Over The Search of a Cell Phone Feds v. Locals
As state and federal authorities seek broad access to a seized phone, a Virginia prosecutor argues for narrowly tailored digital searches, a clash that could redefine Fourth Amendment protections for modern devices. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/the-battle-over-the-search-of-a-cell-phone-feds-v-locals/
-
Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
The defacement of Protei’s website said “another DPI/SORM provider bites the dust,” apparently referring to the company selling its web intercept and surveillance products to phone and internet providers. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/17/surveillance-tech-provider-protei-was-hacked-its-data-stolen-and-its-website-defaced/
-
DoorDash confirms data breach impacting users’ phone numbers and physical addresses
The delivery giant said “no sensitive information” was accessed, and did not specify the number of customers, delivery workers, and merchants who were impacted by the breach. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/17/doordash-confirms-data-breach-impacting-users-phone-numbers-and-physical-addresses/
-
Surveillance tech provider Protei was hacked, its data stolen and its website defaced
The defacement of Protei’s website said “another DPI/SORM provider bites the dust,” apparently referring to the company selling its web intercept and surveillance products to phone and internet providers. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/17/surveillance-tech-provider-protei-was-hacked-its-data-stolen-and-its-website-defaced/
-
MI5 made multiple applications for phone data to identify BBC journalist’s sources
MI5 discloses it made and authorised unlawful ‘sequential applications’ for Vincent Kearney’s phone data during his time at the BBC, but will neither confirm nor deny whether it undertook further ‘lawful’ surveillance of BBC journalists First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634439/MI5-made-multiple-applications-for-phone-data-to-identify-BBC-journalists-sources
-
North Korean spies turn Google’s Find Hub into remote-wipe weapon
KONNI espionage crew covertly abused Google’s Find My Device feature to remotely factory-reset Android phones First seen on theregister.com Jump to article: www.theregister.com/2025/11/11/north_korean_spies_turn_googles/
-
North Korea-linked Konni APT used Google Find Hub to erase data and spy on defectors
North Korea-linked APT Konni posed as counselors to steal data and wipe Android phones via Google Find Hub in Sept 2025. Genians Security Center researchers warn that the North Korea-linked Konni APT group (aka Kimsuky, Earth Imp, TA406, Thallium, Vedalia, and Velvet Chollima) posed as counselors to hack Android and Windows, stealing data and wiping phones…
-
Beyond silos: How DDI-AI integration is redefining cyber resilience
Tags: ai, api, attack, automation, best-practice, breach, business, cctv, cloud, control, corporate, cyber, cybersecurity, data, defense, detection, dns, endpoint, finance, firewall, guide, identity, infrastructure, intelligence, iot, malicious, monitoring, network, penetration-testing, phishing, phone, RedTeam, resilience, risk, service, siem, soar, soc, sql, threat, tool, training, zero-trustDDI as the nervous system of enterprise security: DDI, including DNS, DHCP and IP address management, is the nervous system of the network. It records every connection, every name resolution and every IP allocation, maintaining the only comprehensive, authoritative record of normal network behavior.By itself, DDI data is simply a massive stream of logs. For…
-
Beyond silos: How DDI-AI integration is redefining cyber resilience
Tags: ai, api, attack, automation, best-practice, breach, business, cctv, cloud, control, corporate, cyber, cybersecurity, data, defense, detection, dns, endpoint, finance, firewall, guide, identity, infrastructure, intelligence, iot, malicious, monitoring, network, penetration-testing, phishing, phone, RedTeam, resilience, risk, service, siem, soar, soc, sql, threat, tool, training, zero-trustDDI as the nervous system of enterprise security: DDI, including DNS, DHCP and IP address management, is the nervous system of the network. It records every connection, every name resolution and every IP allocation, maintaining the only comprehensive, authoritative record of normal network behavior.By itself, DDI data is simply a massive stream of logs. For…
-
German healthcare aims to replace faxes and phones with secure messaging
Germany’s digital health agency, Gematik, has turned to open source for secure messaging services that will link patients, doctors and pharmacies First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634180/German-healthcare-aims-to-replace-faxes-and-phones-with-secure-messaging
-
LANDFALL Spyware Targeted Samsung Galaxy Phones via Malicious Images
Unit 42 discovered LANDFALL, commercial-grade Android spyware, which used a hidden image vulnerability (CVE-2025-21042) to remotely spy on Samsung Galaxy users via WhatsApp. Update your phone now. First seen on hackread.com Jump to article: hackread.com/landfall-spyware-samsung-galaxy-malicious-images/
-
A new Italian citizen was targeted with Paragon’s Graphite spyware. We have a serious problem
An Italian political adviser was targeted with Paragon’s Graphite spyware, becoming the fifth Italian in the ongoing government surveillance activity. Italian political adviser Francesco Nicodemo said he was targeted with Paragon’s Graphite spyware, becoming the fifth Italian in the ongoing government surveillance activity. Graphite is an invasive, non-auditable spyware that covertly accesses sensitive phone data;…
-
Previously unknown Landfall spyware used in 0-day attacks on Samsung phones
‘Precision espionage campaign’ began months before the flaw was fixed First seen on theregister.com Jump to article: www.theregister.com/2025/11/07/landfall_spyware_samsung_0days/
-
Commercial spyware “Landfall” ran rampant on Samsung phones for almost a year
Targeted attack could steal all of a phone’s data and activate camera or mic. First seen on arstechnica.com Jump to article: arstechnica.com/gadgets/2025/11/commercial-spyware-landfall-ran-rampant-on-samsung-phones-for-almost-a-year/
-
Commercial spyware “Landfall” ran rampant on Samsung phones for almost a year
Targeted attack could steal all of a phone’s data and activate camera or mic. First seen on arstechnica.com Jump to article: arstechnica.com/gadgets/2025/11/commercial-spyware-landfall-ran-rampant-on-samsung-phones-for-almost-a-year/
-
New Landfall spyware apparently targeting Samsung phones in Middle East
Palo Alto Networks researchers haven’t been able to identify who’s behind the commercial-grade tech yet. First seen on cyberscoop.com Jump to article: cyberscoop.com/landfall-spyware-samsung-phones-palo-alto-networks-unit-42/
-
New Landfall spyware apparently targeting Samsung phones in Middle East
Palo Alto Networks researchers haven’t been able to identify who’s behind the commercial-grade tech yet. First seen on cyberscoop.com Jump to article: cyberscoop.com/landfall-spyware-samsung-phones-palo-alto-networks-unit-42/
-
‘Landfall’ spyware abused zero-day to hack Samsung Galaxy phones
A newly identified Android spyware targeted Galaxy devices for close to a year, including users in the Middle East, researchers exclusively tell TechCrunch. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/07/landfall-spyware-abused-zero-day-to-hack-samsung-galaxy-phones/
-
Italian political consultant says he was targeted with Paragon spyware
WhatsApp notified the consultant, who works for left-wing politicians, that his phone was targeted with spyware made by Paragon. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/06/italian-political-consultant-says-he-was-targeted-with-paragon-spyware/
-
UK carriers to block spoofed phone numbers in fraud crackdown
Under a new partnership with the government aimed at combating fraud, Britain’s largest mobile carriers have committed to upgrading their networks to eliminate scammers’ ability to spoof phone numbers within a year. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/uk-carriers-to-block-spoofed-phone-numbers-in-fraud-crackdown/

