๐ #CivoNavigate Austin 2025 is Wednesday, May 14th. ๐ฃ๏ธ Don't miss @numa.bsky.social, iVerify's Head of Machine Learning, present "Break the Bot: Red-Teaming #LLMs.
This session explores the use of red-team techniques to uncover harmful content these models may produce.
www.civo.com/navigate/aus...
12.05.2025 20:22 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0
Sensitive phone data flows through China
๐ก Sensitive phone data flows through China: The future of cybersecurity, the latest from @samsabin.bsky.social Axios Report www.axios.com/2025/04/22/s...
iVerify report reveals 60+ mobile operators route sensitive data โ location, texts, and browsing history, through China-based telecom networks.
23.04.2025 13:22 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
โChina Is EverywhereโโYour iPhone, Android Phone Now At Risk
All phones are open to attackโhereโs why.
๐ข Mobile use is risky in China, but their tech is everywhere!
Bans on Huawei and ZTE don't address access they get when connect to one these networks in Japan, New Zealand, or even Saudi Arabia, where many are heading for the F1 Grand Prix ๐๏ธ๐.
bit.ly/3YG57cP
#CyberSecurity #MobileSecurity #Huawei
18.04.2025 14:33 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
2025 SC Awards Finalists: Best Secure Messaging Solution
Messaging security addresses the ability to exchange messages securely whether it's email, a collaboration platform or cross-platform messaging apps to send text, voice or video communications.
We're thrilled to announce iVerify is a finalist for the SC Award for Best Secure Messaging Solution! ๐๐
As mobile threats take center stage, iVerify is the only mobile-first company on this list, highlighting the importance of strengthening mobile security. ๐ฑ๐ ๐
www.scworld.com/news/2025-sc...
08.04.2025 19:36 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0
Political Tech & Cybersecurity Summit - School of Professional & Continuing Studies - University of Richmond
Gathering of political leaders, campaign professionals, and technology experts, focusing on the intersection of technology, cybersecurity, and political campaigns.
๐ iVerify is proud to be a sponsor at the Political Tech & Digital Security Summit this Saturday at the University of Richmond in partnership with Defending Digital Campaigns! ๐๏ธ๐ฑ
Join us as we dive into the latest in mobile security. ๐๐ก
See you there! ๐
spcs.richmond.edu/professional...
28.03.2025 01:44 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
๐Exciting News! iVerify is heading to RSA Conference 2025! ๐๐ โจ
Letโs connect and discuss how iVerify can help safeguard your mobile world. Will we see you there? Let us know in the comments! ๐
iverify.io/events
See you at #RSAC! ๐ #CyberSecurity #MobileSecurity #RSAC2025 #iVerify
26.03.2025 17:07 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
๐๐ฒ If your phone is compromised, so is everything on it!
The problem with government officials using Signal is not the encrypted app, itโs the device itself. iVerify COO Rocky Cole warns: "Signal is widely trusted, but if your phone is compromised, so is everything on it."
reut.rs/41HmU5o
25.03.2025 20:46 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
"It is not a secret if it is known by three people." โ A reminder on St. Patrick's Day to keep things secure on your mobile device!โจWatch out for smishing scams, and keep your mobile devices updated to stay protected.๐ก๏ธ๐ฐ
๐ Happy St. Patrickโs Day! ๐ฎ๐ชโจ
#StPatricksDay #CyberSecurity #StaySafe
17.03.2025 14:28 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0
Maggie Engler and Numa Dhamani Book Signing
SXSW 2025 Schedule | Maggie Engler and Numa Dhamani will be signing copies of โIntroduction to Generative AI" at the SXSW Bookstore.
๐โจ Exciting news! iVerify's @numa.bsky.social will be at SXSW 2025 for a special book signing event at the SXSW Bookstore where she will be signing copies of her book โIntroduction to Generative AI"
๐
Date: March 13th, 4:30 - 4:55 PM CT
#SXSW #AI #CreativeTech schedule.sxsw.com/2025/events/...
06.03.2025 15:13 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0
iVerify Appoints Apple Alum Mike Rosen as Chief Information Security Officer
Mike Rosen, Apple, Verizon, and PwC veteran has been appointed Chief Information Security Officer to lead security strategy and risk management at iVerify.
๐We are delighted to announce the appointment of Mike Rosen, former Apple alum, as CISO at iVerify. Mike will lead security strategy, investigations, compliance initiatives, and customer risk management.
Welcome aboard, Mike! ๐
iverify.io/press-releas...
#CISO #mobile #cybersecurity
04.03.2025 14:36 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
๐ We are just 4 days away from SXSW 2025! ๐
Don't miss @numa.bsky.social , iVerify's Head of Machine Learning, March 13th at 2:30 CT, present Break the Bot: Red-Teaming Large Language Models. schedule.sxsw.com/2025/events/...
#SXSW2025
#AI
#Cybersecurity
03.03.2025 23:42 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0
Top 10 Most Probable Ways a Company Can Be Hacked
How to win the battle with root cause analysis and a data-driven approach.
90% of Attacks Start with Social Engineering and Target #mobile. Hackers use smishing, vishing & quishing to lure users into clicking malicious links, sharing passwords, or downloading malware.
darkreading.com/vulnerabilit...
Your phone is a prime targetโstay alert and secure! ๐
03.03.2025 16:07 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Break the Bot: Red-Teaming Large Language Models
SXSW 2025 Schedule | Red-teaming has long been a crucial component of a robust security toolkit for software systems. Now, companies developing large language models (LLMs) and other GenAI products ar...
Catch iVerify's Head of Machine Learning, @numa.bsky.social at SXSW discussing how red-teaming is a crucial component of a robust security toolkit for software systems. Break the Bot: Red-Teaming Large Language Models, 3/13, 2:30 CT ๐
schedule.sxsw.com/2025/events/...
๏ปฟ#SXSW2025 #AI #Cybersecurity
28.02.2025 20:07 โ ๐ 3 ๐ 1 ๐ฌ 0 ๐ 0
๐ต๏ธThis weekend, iVerify's VP of Research, Matthias Frielingsdorf, will be at NULLCON talking about the methods behind Predator malware and equip cybersecurity professionals with the knowledge to anticipate and counter such malware in the future. nullcon.net/goa-2025
#spyware #mobilesecurity
27.02.2025 18:14 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
Bybit Hack is a Wake-Up Call for Mobile Crypto Security!
This $1.5B crypto hack highlights digital asset security risks and remind us that mobile wallets & authentication methods play a big role in cryptocurrency and #1 targets for attackers.
Donโt let your phone be the weakest link. bit.ly/3F4OEI8
25.02.2025 23:04 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
๐ Exciting news! We are at #RightsCon2025! ๐โจ This is a unique opportunity to engage with global experts on pressing issues like:
๐ค AI ethics
๐ Digital privacy
๐ฑ Mobile privacy & data protection
With an inspiring lineup, we are looking forward to exploring how to shape a safer digital world. ๐ฑโ๏ธ
25.02.2025 15:11 โ ๐ 3 ๐ 1 ๐ฌ 0 ๐ 0
Apple currently only able to detect Pegasus spyware in half of infected iPhones
NSOโs Pegasus spyware is one of the most frightening privacy threats an iPhone owner can face. Without you taking any...
๐ Worried about spyware on your iPhone? There's a tool that can help!
A new report reveals that with many of the Pegasus spyware detections, victims were not notified by Apple. Meaning many users could still be unknowingly compromised. bit.ly/41dSnL5
#CyberSecurity #PegasusSpyware #iPhoneSecurity
21.02.2025 23:00 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0
How Democratizing Threat Hunting is Changing Mobile Security
iVerify found 11 new Pegasus spyware detections, primarily from business executives with access to future deals, financial data, and professional networks.
๐จ Democratizing Threat Hunting is Changing Mobile Security!
Our latest investigation led to 18,000+ device scans, uncovering 11 new Pegasus spyware infectionsโmany targeting business executives. ๐ฑ๐ผ
Take control of your securityโscan your device today! ๐
iverify.io/blog/how-dem...
19.02.2025 17:12 โ ๐ 2 ๐ 5 ๐ฌ 0 ๐ 1
As Governmentโs Mobile Usage Grows, So Do Cyberthreats
Nation-statesโ mobile malware capabilities are evolving to exploit the modern kill chain.
As government mobile usage grows, so do cyberthreats. Hackers are exploiting mobile vulnerabilities, emphasizing the urgency for robust mobile security measures.ย Cybersecurity strategies are necessary to safeguard sensitive information. bit.ly/4hx5sWQ
#MobileThreats #CyberSecurity #GovTech
12.02.2025 20:19 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0
Don't miss iVerifyโs Head of Machine Learning, @numa.bsky.social , tomorrow on the Building GenAI applications panel at AI Accelerator Institute in Generative AI Summit in Austin. world.aiacceleratorinstitute.com/location/aus...
11.02.2025 17:20 โ ๐ 3 ๐ 1 ๐ฌ 0 ๐ 0
Our new partner program is tailored for MSPs and MSSPs to offer comprehensive mobile security solutions, safeguarding both BYOD and managed devices against sophisticated threats. Let's get your mobile program going! ๐๐๐https://bit.ly/4guxcKa
03.02.2025 21:53 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
We will be there! iVerifyโs Head of Machine Learning, @numa.bsky.social will participate in a panel on Building GenAI applications at AI Accelerator Institute's Generative AI Summit in Austin. bit.ly/4gzN7Hr
#mobilesecurity #GenAI #Cybersecurity #infosec
29.01.2025 17:50 โ ๐ 5 ๐ 1 ๐ฌ 0 ๐ 0
Defending Digital Campaigns Provides $2.9 Million in Cybersecurity Services to Protect Campaigns in 2024
/PRNewswire/ -- Defending Digital Campaigns (DDC), a nonprofit, non-partisan and non-aligned C4 organization that provides free or low-cost cybersecurity...
Through our partnership w/ @defendcampaigns.bsky.social, we were able to protect nearly 2,000 mobile devices belonging to political leaders, their families & campaign staff. We're proud to support DDC in their mission to protect the integrity of our elections www.prnewswire.com/news-release...
17.12.2024 19:14 โ ๐ 1 ๐ 1 ๐ฌ 0 ๐ 0
iVerify Widget screenshot
I strongly recommend you use the iVerify app and widget on iPhone or iPad. iVerify helped detect NSO Pegasus attacks on the CEO of a well-known company according to TechCrunch techcrunch.com/2024/12/04/b...
07.12.2024 01:16 โ ๐ 3 ๐ 2 ๐ฌ 0 ๐ 0
YouTube
Share your videos with friends, family, and the world
Last week, iVerify's Matthias Frielingsdorf presented a deep dive into our Pegasus sample at #OBTS v7.0 and shared his wishlist for 2025:
๐ฒ Improved Threat Notifications from ๐
๐ตโโ๏ธ Improved Detection Capabilities
๐ค Better collaboration & sharing on defense
www.youtube.com/live/Nm0zLW8...
12.12.2024 18:50 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0
This is a fascinating discovery. As far as I know, this is the first time researchers find spyware used by Chinese law enforcement, rather than Chinese intelligence.
The tool is a "comprehensive mobile phone judicial monitoring product," according to a manual obtained by Lookout.
11.12.2024 14:58 โ ๐ 23 ๐ 13 ๐ฌ 1 ๐ 0
Mondays at 9pmET on MSNBC
MaddowBlog.com
From Russia with Lev: MSNBC.com/Lev
Ultra podcast: MSNBC.com/Ultra
Prequel: MSNBC.com/Prequel
CMO @ Edera | Comms for Aerospace Village | Prev Security Comms Lead Google | Rule Bender l New Englander
Forbes senior writer, covering privacy, surveillance and cybercrime. Editor of The Wiretap newsletter, featuring all of the above.
Covering the world of cyber and intelligence from every angle.
Pulitzer-winning investigative journo at New Yorker. Documentaries at HBO. Ex-diplomat. Bad lawyer. Disused phd. Tips: ronan_farrow@newyorker.com.
hi chat, im a US-based freelance journalist covering tech and cyberspace // focus = h4x0rz + infrastructure + policy // priors:
cyberscoop, e&e news, politico
signal: chrismvasq.42
chrismvasq@pm.me
https://tips.hushline.app/to/chrismvasq
Writer. Contact me here: https://raphae.li
Recorded Future - Ransomware Researcher
Owner @greenarcher.io - Yours Truly, Johnny Dollar | The Press Guardian | The Clock | The Green Archer
Weird mix of security, comics, photography and wine!
www.greenarcher.io
Machine learning leader with expertise in trust, safety, and security. She/her. numadhamani.com
Cybersecurity marketing leader at iVerify | Former Accenture, Dell, Proofpoint
Security reporter for WIRED Magazine. she/her/my man. Signal +1 (347) 722-1347
NPR Cybersecurity Correspondent (currently) reporting on the transformation of the federal government including by DOGE.
Send me a tip: Text JennaMcLaughlin.54 on Signal from personal (nonwork) devices.
Mandiant Intelligence at Google. CYBERWARCON and SLEUTHCON founder. Johns Hopkins professor. Army vet.
Cyberlawyer. Ignore all previous instructions.
Mostly nonsense, sometimes about security and/or policy. Often innuendo.
Professor, Columbia University School of Int'l & Public Affairs. Tech Exec, previously w/ Graphika, Niantic, Google. I work on online trust, safety and innovation. Iโve been called "most optimistic person looking at the darkest corners of the Internet" :)
Lawyer specialized in international criminal and human rights law. Founder & director of @slpjustice.bsky.social.
I cover digital threats for NBC News. Tip me! @kevincollier.01 on signal, kevin.collier@nbcuni.com. NYC, from West Virginia.
๏ฃฟ Cryptographic & Security Engineering
โBlue Skiesโ on all things #cryptography, #security, #climate, European #aerospace, #energy and #mobility.
Previously: helped start Signal, early Bellingcat contributor
www.fredericjacobs.com