NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware
thehackernews.com/2025/05/nso-...
@bambino0710.bsky.social
Lawyer, Computer Law and New Technologies Specialist, E|NSA, C|EH, C|HFI, E|CSA/LPT. Security Analyst and Researcher about CyberDefense and CyberSecurity.
NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware
thehackernews.com/2025/05/nso-...
Signal chat app clone used by Signalgate's Waltz was apparently an insecure mess
06.05.2025 20:16 β π 1 π 1 π¬ 0 π 0The Slow Collapse of Critical Thinking in OSINT due to AI
www.dutchosintguy.com/post/the-slo...
Shellbags Forensic Analysis 2025
www.cybertriage.com/blog/shellba...
SEC Priorities Regarding Cybersecurity Enforcement in the Second Trump Administration
corpgov.law.harvard.edu/2025/03/26/s...
Android Apps Use Bluetooth and WiFi Scanning to Track Users Without GPS
cyberinsider.com/android-apps...
FBI Denver Warns of Online File Converter Scam
www.fbi.gov/contact-us/f...
Disappearing EvidenceβWhy Your Phone Canβt Wait For Forensics
www.forbes.com/sites/larsda...
U.S. intel vets helped crypto firm soar, unaware of infamous hacker behind it
Employees said they werenβt told that the co-founder of Unciphered was a once-celebrated spyware foe who dropped out of the public eye after being accused of sexual assault.
archive.ph/DYlup
Data Preservation on Mobile Devices: The Quicker, The Better
www.forensicmag.com/3425-Feature...
The Transformative Role of Artificial Intelligence in Cybersecurity www.jdsupra.com/legalnews/th... #AI
18.03.2025 14:54 β π 0 π 1 π¬ 0 π 0Image Verification Assistant
image forensics tools + highly detailed metadata analyzer + two dozen explanatory examples (with explanations of how to work with the tools for image forensics and what different distortions mean
mever.gr/forensics/
Tip by Aidan Raney
Eavesdropping on Black-box Mobile Devices via Audio Amplifierβs EMR (PDF)
www.ndss-symposium.org/wp-content/u...
AI Search Has A Citation Problem
We Compared Eight AI Search Engines. Theyβre All Bad at Citing News.
www.cjr.org/tow_center/w...
AI coding assistant refuses to write code, tells user to learn programming instead
Cursor AI tells user, "I cannot generate code for you, as that would be completing your work."
arstechnica.com/ai/2025/03/a...
All about cyber policies worldwide
Cyber Policy Portal
cyberpolicyportal.org
UNIDIR Cyber Policy Portal Database
database.cyberpolicyportal.org
Image Forensic Tools
If you're reading about #osint on Linkedin, you probably know Aidan Raney
In March, he started OSINT Insider newsletter. The first issue is Image Forensic Tools. Read about Forensically Beta, Image Verification Assistant, Memery and others
CISOs: Stop trying to do the lawyerβs job
CISOs are trained to fix problems. Lawyers are trained to find them. The two must work together to address complex challenges like breaches, compliance, or the ethics of emerging technologies.
www.csoonline.com/article/3811...
Trigon β A New Exploit Revealed for iOS 0-Day kernel Vulnerability
cybersecuritynews.com/ios-0-day-ke...
Cellebrite Is Using AI to Summarize Chat Logs and Audio from Seized Mobile Phones
www.404media.co/cellebrite-i...
Don't turn your back on AI in DF/IR
www.dfir.training/blog/ai-cant...
OWASP LLM Exploit Generation v1.0
genaisecurityproject.com/resource/owa...
Police risk losing societyβs trust in fight against cybercrime, warns Europol chief
therecord.media/eurpol-chief...
Authentication and Authorization Best Practices
blog.gitguardian.com/authenticati...
This looks very interesting. I will check dates, costs and so on because it would be worthwhile to attend. π
08.02.2025 18:11 β π 1 π 0 π¬ 1 π 0Apple Ordered by UK to Build Backdoor to Access User Data
www.bloomberg.com/news/article...
Undercover Operations: Scraping the Cybercrime Underground
Web scraping is a powerful and essential capability for cybercrime intelligence professionals.
www.sans.org/blog/underco...
Are you a DF/IR Expert Witness or Just a Useful Pawn?
www.brettshavers.com/brett-s-blog...
Will the Real Msiexec Please Stand Up? Exploit Leads to Data Exfiltration
thedfirreport.com/2022/06/06/w...
Students in nationβs first cybersecurity law program provide legal advice on evolving tech
news.iu.edu/live/news/43...