Bambino0710's Avatar

Bambino0710

@bambino0710.bsky.social

Lawyer, Computer Law and New Technologies Specialist, E|NSA, C|EH, C|HFI, E|CSA/LPT. Security Analyst and Researcher about CyberDefense and CyberSecurity.

50 Followers  |  132 Following  |  75 Posts  |  Joined: 16.11.2024  |  1.4885

Latest posts by bambino0710.bsky.social on Bluesky

Preview
NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware NSO must pay $168M after targeting 1,400+ users via WhatsApp zero-day flaw, court finds illegal spyware use.

NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware
thehackernews.com/2025/05/nso-...

07.05.2025 10:55 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
TeleMessage probes 'hack' of Signal clone used by Feds : No, really? That's a shocking surprise

Signal chat app clone used by Signalgate's Waltz was apparently an insecure mess

06.05.2025 20:16 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
The Slow Collapse of Critical Thinking in OSINT due to AI OSINT used to be a thinking game. Now it’s becoming a trusting game and that should terrify you.I’ve seen it firsthand, analysts running solid investigations, then slowly shifting more and more of the...

The Slow Collapse of Critical Thinking in OSINT due to AI
www.dutchosintguy.com/post/the-slo...

02.04.2025 13:08 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Preview
Shellbags Forensic Analysis 2025 Want to learn the secrets of Shellbags? Stick around. DFIR expert Chris Ray lays out everything you want to know, from how they work to how to do DFIR

Shellbags Forensic Analysis 2025
www.cybertriage.com/blog/shellba...

28.03.2025 05:06 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
SEC Priorities Regarding Cybersecurity Enforcement in the Second Trump Administration The SEC recently announced the creation of a Cyber and Emerging Technologies Unit (CETU) that will focus on fraudulent conduct in cybersecurity, ...

SEC Priorities Regarding Cybersecurity Enforcement in the Second Trump Administration
corpgov.law.harvard.edu/2025/03/26/s...

27.03.2025 15:13 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Android Apps Use Bluetooth and WiFi Scanning to Track Users Without GPS Thousands of Android apps covertly collect location data using Bluetooth and WiFi beacons, allowing tracking and profiling of users.

Android Apps Use Bluetooth and WiFi Scanning to Track Users Without GPS
cyberinsider.com/android-apps...

25.03.2025 01:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
FBI Denver Warns of Online File Converter Scam | Federal Bureau of Investigation The FBI Denver Field Office is warning that agents are increasingly seeing a scam involving free online document converter tools.

FBI Denver Warns of Online File Converter Scam
www.fbi.gov/contact-us/f...

24.03.2025 16:23 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Disappearing Evidenceβ€”Why Your Phone Can’t Wait For Forensics Modern smartphone evidence vanishes fast. Preserve now or risk losing it forever.

Disappearing Evidenceβ€”Why Your Phone Can’t Wait For Forensics
www.forbes.com/sites/larsda...

24.03.2025 15:30 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

U.S. intel vets helped crypto firm soar, unaware of infamous hacker behind it
Employees said they weren’t told that the co-founder of Unciphered was a once-celebrated spyware foe who dropped out of the public eye after being accused of sexual assault.
archive.ph/DYlup

23.03.2025 21:06 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Data Preservation on Mobile Devices: The Quicker, The Better Recent updates to mobile phone technology have changed the current playing field in terms of ensuring the most complete technology.

Data Preservation on Mobile Devices: The Quicker, The Better
www.forensicmag.com/3425-Feature...

20.03.2025 17:11 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
The Transformative Role of Artificial Intelligence in Cybersecurity | JD Supra AI-Powered: Corporate Strategies Versus Hacker Tactics - How can companies use artificial intelligence to respond more efficiently to...

The Transformative Role of Artificial Intelligence in Cybersecurity www.jdsupra.com/legalnews/th... #AI

18.03.2025 14:54 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Image Verification Assistant

image forensics tools + highly detailed metadata analyzer + two dozen explanatory examples (with explanations of how to work with the tools for image forensics and what different distortions mean

mever.gr/forensics/

Tip by Aidan Raney

17.03.2025 08:04 β€” πŸ‘ 15    πŸ” 7    πŸ’¬ 2    πŸ“Œ 1

Eavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR (PDF)
www.ndss-symposium.org/wp-content/u...

16.03.2025 17:07 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
AI Search Has A Citation Problem We Compared Eight AI Search Engines. They’re All Bad at Citing News.

AI Search Has A Citation Problem

We Compared Eight AI Search Engines. They’re All Bad at Citing News.

www.cjr.org/tow_center/w...

16.03.2025 11:34 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
AI coding assistant refuses to write code, tells user to learn programming instead Cursor AI tells user, β€œI cannot generate code for you, as that would be completing your work.”…

AI coding assistant refuses to write code, tells user to learn programming instead

Cursor AI tells user, "I cannot generate code for you, as that would be completing your work."

arstechnica.com/ai/2025/03/a...

16.03.2025 11:33 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

All about cyber policies worldwide

Cyber Policy Portal
cyberpolicyportal.org

UNIDIR Cyber Policy Portal Database
database.cyberpolicyportal.org

16.03.2025 11:31 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Image Forensic Tools

If you're reading about #osint on Linkedin, you probably know Aidan Raney

In March, he started OSINT Insider newsletter. The first issue is Image Forensic Tools. Read about Forensically Beta, Image Verification Assistant, Memery and others

16.03.2025 11:01 β€” πŸ‘ 17    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0
Preview
CISOs: Stop trying to do the lawyer’s job CISOs are trained to fix problems. Lawyers are trained to find them. The two must work together to address complex challenges like breaches, compliance, or the ethics of emerging technologies.

CISOs: Stop trying to do the lawyer’s job
CISOs are trained to fix problems. Lawyers are trained to find them. The two must work together to address complex challenges like breaches, compliance, or the ethics of emerging technologies.
www.csoonline.com/article/3811...

15.03.2025 23:49 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Trigon - A New Exploit Revealed for iOS 0-Day kernel Vulnerability Security researchers have uncovered a sophisticated new kernel exploit targeting Apple iOS devices, dubbed Trigon.

Trigon – A New Exploit Revealed for iOS 0-Day kernel Vulnerability
cybersecuritynews.com/ios-0-day-ke...

10.03.2025 18:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Cellebrite Is Using AI to Summarize Chat Logs and Audio from Seized Mobile Phones The proliferation of AI through law enforcement tools already has civil liberties experts concerned. β€œWhen you have results from an AI, they are not transparent. Often you cannot trace back where a co...

Cellebrite Is Using AI to Summarize Chat Logs and Audio from Seized Mobile Phones
www.404media.co/cellebrite-i...

05.03.2025 17:04 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Don't turn your back on AI in DF/IR Artificial Intelligence (AI) in digital forensics isn't new. If you think AI just showed up in DF/IR, you're about 15 years behind. In 2010, DF and AI was already being discussed. Digital forensics is...

Don't turn your back on AI in DF/IR
www.dfir.training/blog/ai-cant...

05.03.2025 12:02 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
OWASP LLM Exploit Generation v1.0 - OWASP Top 10 for LLM & Generative AI Security This paper examines the practical implications of large language models (LLMs) in offensive cybersecurity, moving beyond theoretical possibilities to assess their real-world effectiveness. The researc...

OWASP LLM Exploit Generation v1.0
genaisecurityproject.com/resource/owa...

27.02.2025 15:25 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Police risk losing society’s trust in fight against cybercrime, warns Europol chief Catherine De Bolle, the chief of Europol, said at the Munich Cyber Security Conference that societies must understand why law enforcement agencies need new powers to fight increasingly sophisticated c...

Police risk losing society’s trust in fight against cybercrime, warns Europol chief
therecord.media/eurpol-chief...

21.02.2025 02:31 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Authentication and Authorization Best Practices Not only API authentication and authorization are the crucial aspects of API security when crafting secure software, but they also impact scalability and user experience.

Authentication and Authorization Best Practices
blog.gitguardian.com/authenticati...

08.02.2025 22:32 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

This looks very interesting. I will check dates, costs and so on because it would be worthwhile to attend. πŸ˜‰

08.02.2025 18:11 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Apple Ordered by UK to Build Backdoor for User Data The UK government has ordered Apple Inc. to build a backdoor to give it access to global user data, in a move that could spark one of the biggest privacy fights in the iPhone maker’s history.

Apple Ordered by UK to Build Backdoor to Access User Data
www.bloomberg.com/news/article...

08.02.2025 00:57 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Undercover Operations: Scraping the Cybercrime Underground | SANS Institute A blog about web scraping methods, use cases, challenges, and how to overcome them.

Undercover Operations: Scraping the Cybercrime Underground
Web scraping is a powerful and essential capability for cybercrime intelligence professionals.
www.sans.org/blog/underco...

07.02.2025 12:31 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Are you a DF/IR Expert Witness or Just a Useful Pawn? There’s a hard line between working toward an objective and chasing a result, and if you don’t know which one you are doing, you are already lost. The most glaring issue I see when peer reviewing DF/I...

Are you a DF/IR Expert Witness or Just a Useful Pawn?
www.brettshavers.com/brett-s-blog...

06.02.2025 02:13 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Will the Real Msiexec Please Stand Up? Exploit Leads to Data Exfiltration In this multi-day intrusion, we observed a threat actor gain initial access to an organization by exploiting a vulnerability in ManageEngine SupportCenter Plus. The threat actor, discovered files o…

Will the Real Msiexec Please Stand Up? Exploit Leads to Data Exfiltration
thedfirreport.com/2022/06/06/w...

05.02.2025 18:38 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Students in nation’s first cybersecurity law program provide legal advice on evolving tech The Indiana University Maurer Law School was the first to teach a stand-alone cybersecurity course. Today, the program has expanded to offer degrees and c...

Students in nation’s first cybersecurity law program provide legal advice on evolving tech
news.iu.edu/live/news/43...

05.02.2025 18:37 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@bambino0710 is following 19 prominent accounts