This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Apple addressed the first zero-day vulnerability of 2025, which is actively exploited in attacks in the wild aimed at iPhone users. Apple released security updates to address 2025’s first zero-day vulnerability, tracked as CVE-2025-24085 , actively exploited in attacks targeting iPhone users.
WhatsApp addressed a flaw, tracked as CVE-2025-30401, that could allow attackers to trick users and enable remote code execution. WhatsApp released a security update to address a vulnerability, tracked as CVE-2025-30401, that could let attackers trick users and enable remote code execution.
A flaw in Catwatchful spyware exposed logins of 62,000 users, turning the spy tool into a data leak, security researcher Eric Daigle revealed. A flaw in the Catwatchful Android spyware exposed its full user database, leaking email addresses and plaintext passwords of both customers and its admin, TechCrunch first reported.
This is a news item roundup of privacy or privacy-related news items for 16 MAR 2025 - 22 MAR 2025. Surveillance Tech in the News This section covers surveillance technology and methods in the news. The post Privacy Roundup: Week 12 of Year 2025 appeared first on Security Boulevard.
link] — Andy Stone (@andymstone) June 23, 2025 Stone noted WhatsApp messages are end-to-end encrypted by default, providing stronger security than most apps on the CAO’s approved list, which lack this protection. The House has banned other apps as well, including TikTok, OpenAI ChatGPT, and DeepSeek.
In a statement published on 25 February 2025, Cellebrite announced that it had blocked Serbia from using its solution after reports that police used it to unlock and infect the phones of a journalist and activist. CVE-2024-53104 was patched in Androids February 2025 update, while CVE-2024-53197 and CVE-2024-50302 (CVSS score of 5.5)
Cybersecurity and Infrastructure Security Agency (CISA) added Apple Multiple Products Use-After-Free Vulnerability, tracked as CVE-2025-24085 ,to its Known Exploited Vulnerabilities (KEV) catalog. Usually, such kinds of vulnerabilities are exploited by nation-state actors or commercial surveillancespyware vendors in targeted attacks.
This is a news item roundup of privacy or privacy-related news items for 9 FEB 2025 - 15 FEB 2025. Surveillance Tech in the News This section covers surveillance technology and methods in the news. CVE-2025-21418. CVE-2025-21391. CVE-2025-21194. Tips for finding old accounts.
This is a news item roundup of privacy or privacy-related news items for 9 MAR 2025 - 15 MAR 2025. Surveillance Tech in the News This section covers surveillance technology and methods in the news. CVE-2025-26633 , a security feature bypass in Microsoft Management Console.
CISA adds Aviatrix Controllers vulnerability to its Known Exploited Vulnerabilities catalog ESET detailed a flaw that could allow a bypass of the Secure Boot in UEFI systems Russia-linked APT Star Blizzard targets WhatsApp accounts Prominent US law firm Wolf Haldenstein disclosed a data breach Clop Ransomware exploits Cleo File Transfer flaw: dozens (..)
Texas is the first state to ban DeepSeek on government devices Law enforcement seized the domains of HeartSender cybercrime marketplaces WhatsApp disrupted a hacking campaign targeting journalists with Paragon spyware Ransomware attack hit Indian multinational Tata Technologies International Press Newsletter Cybercrime FBI, Dutch Police Disrupt Manipulaters (..)
military fiscal year 2025 dedicates approximately $30 billion to cybersecurity , marking it as a crucial focus in the broader $895.2 Protecting military mobile devices Standards and policies will be implemented to secure Department of Defense mobile devices from foreign spyware. billion military budget. "As
Soldier Charged in AT&T Hack Searched Can Hacking Be Treason Group-IB contributes to joint operation of Royal Thai Police and Singapore Police Force leading to arrest of cybercriminal behind more than 90 data leaks worldwide UAC-0173 against the Notary Office of Ukraine (CERT-UA#13738) North Korea Responsible for $1.5
This is a news item roundup of privacy or privacy-related news items for 2 FEB 2025 - 8 FEB 2025. Surveillance Tech in the News This section covers surveillance technology and methods in the news. Information and summaries provided here are as-is for warranty purposes.
Insik Group analyzed the new Predator spyware infrastructure and discovered it’s still gaining users despite U.S. sanctions and public exposure, Predator spyware has resurged. The surveillance software was also used to spy on U.S. Predator spyware is known for its extensive data-stealing and surveillance capabilities.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content