Remove Engineering Remove Surveillance Remove Technology
article thumbnail

The Rise of Cyber Espionage: UAV and C-UAV Technologies as Targets

Security Affairs

Researchers at cybersecurity firm Resecurity detected a rise in cyberattacks targeting UAV and counter-UAV technologies. Resecurity identified an increase in malicious cyber activity targeting UAV and counter-UAV (C-UAV/C-UAS) technologies. ” reads the report published by Resecurity.

article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Hurd Wayne Hurd , VP of Sales, Luminys Video Surveillance as a Service (VSaaS) advancements will provide more accurate threat detection that allows security teams to focus on real risks, minimizing false alarms. Security teams will need to address the unique risks posed using LLMs in mission critical environments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Privacy Roundup: Week 3 of Year 2025

Security Boulevard

Specifically, stories and news items where public and/or private organizations have leveraged their capabilities to encroach on user privacy; for example, data brokers using underhanded means to harvest user location data without user knowledge or public organizations using technology without regard for user privacy. CVE-2025-21308.

article thumbnail

WhatsApp hack: Meta wins payout over NSO Group spyware

Malwarebytes

NSO Group reverse engineered WhatsApp’s software and developed its own software and servers to send messages to victims via the WhatsApp service that contained malware. The European Data Protection Supervisor recommended an EU ban on the technology in 2022, although this has not yet happened.

Spyware 115
article thumbnail

Texas Passes Most Comprehensive AI Governance Bill

SecureWorld News

Critics may argue this misses major commercial threats from AI used in surveillance, retail profiling, or hiring tools.) In a LinkedIn post days before the governor signed the bill, Violet Sullivan, AVP, Cyber Solutions Team Leader, at Crum & Forster, broke down what the bill does. Only the AG can enforce.

article thumbnail

Privacy Roundup: Week 13 of Year 2025

Security Boulevard

Private search engines generally avoid connecting users to their searches. Surveillance Tech in the News This section covers surveillance technology and methods in the news.

VPN 59
article thumbnail

APT42 impersonates cyber professionals to phish Israeli academics and journalists

Security Affairs

APT42 focuses on highly targeted spear-phishing and social engineering techniques, its operations broadly fall into three categories, credential harvesting, surveillance operations, and malware deployment. “The threat actors directed victims who engaged with them to fake Gmail login pages or Google Meet invitations.