Tag: phone
-
A new Italian citizen was targeted with Paragon’s Graphite spyware. We have a serious problem
An Italian political adviser was targeted with Paragon’s Graphite spyware, becoming the fifth Italian in the ongoing government surveillance activity. Italian political adviser Francesco Nicodemo said he was targeted with Paragon’s Graphite spyware, becoming the fifth Italian in the ongoing government surveillance activity. Graphite is an invasive, non-auditable spyware that covertly accesses sensitive phone data;…
-
Previously unknown Landfall spyware used in 0-day attacks on Samsung phones
‘Precision espionage campaign’ began months before the flaw was fixed First seen on theregister.com Jump to article: www.theregister.com/2025/11/07/landfall_spyware_samsung_0days/
-
Commercial spyware “Landfall” ran rampant on Samsung phones for almost a year
Targeted attack could steal all of a phone’s data and activate camera or mic. First seen on arstechnica.com Jump to article: arstechnica.com/gadgets/2025/11/commercial-spyware-landfall-ran-rampant-on-samsung-phones-for-almost-a-year/
-
Commercial spyware “Landfall” ran rampant on Samsung phones for almost a year
Targeted attack could steal all of a phone’s data and activate camera or mic. First seen on arstechnica.com Jump to article: arstechnica.com/gadgets/2025/11/commercial-spyware-landfall-ran-rampant-on-samsung-phones-for-almost-a-year/
-
New Landfall spyware apparently targeting Samsung phones in Middle East
Palo Alto Networks researchers haven’t been able to identify who’s behind the commercial-grade tech yet. First seen on cyberscoop.com Jump to article: cyberscoop.com/landfall-spyware-samsung-phones-palo-alto-networks-unit-42/
-
New Landfall spyware apparently targeting Samsung phones in Middle East
Palo Alto Networks researchers haven’t been able to identify who’s behind the commercial-grade tech yet. First seen on cyberscoop.com Jump to article: cyberscoop.com/landfall-spyware-samsung-phones-palo-alto-networks-unit-42/
-
‘Landfall’ spyware abused zero-day to hack Samsung Galaxy phones
A newly identified Android spyware targeted Galaxy devices for close to a year, including users in the Middle East, researchers exclusively tell TechCrunch. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/07/landfall-spyware-abused-zero-day-to-hack-samsung-galaxy-phones/
-
Italian political consultant says he was targeted with Paragon spyware
WhatsApp notified the consultant, who works for left-wing politicians, that his phone was targeted with spyware made by Paragon. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/06/italian-political-consultant-says-he-was-targeted-with-paragon-spyware/
-
UK carriers to block spoofed phone numbers in fraud crackdown
Under a new partnership with the government aimed at combating fraud, Britain’s largest mobile carriers have committed to upgrading their networks to eliminate scammers’ ability to spoof phone numbers within a year. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/uk-carriers-to-block-spoofed-phone-numbers-in-fraud-crackdown/
-
Securing the Open Android Ecosystem with Samsung Knox
Raise your hand if you’ve heard the myth, “Android isn’t secure.”Android phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you may worry about the security”, after all, work data is critical.However, outdated concerns can hold your business back from unlocking its full potential. The truth is, with…
-
Phone location data of top EU officials for sale, report finds
Journalists in Europe found it was “easy” to spy on top European Union officials using commercially obtained location data sold by data brokers, despite the continent having some of the strongest data protection laws in the world. First seen on techcrunch.com Jump to article: techcrunch.com/2025/11/04/phone-location-data-of-top-eu-officials-for-sale-report-finds/
-
Europe’s phone networks are drowning in fake calls
Caller ID spoofing has become one of Europe’s most persistent enablers of cyber fraud. A new position paper from Europol warns that manipulated phone identities now drive much … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/03/europol-caller-id-spoofing/
-
Government hackers breached telecom giant Ribbon for months before getting caught
Ribbon, which provides software and technology to phone and internet giants, said nation-state hackers were in its systems since at least December 2024. First seen on techcrunch.com Jump to article: techcrunch.com/2025/10/31/government-hackers-breached-telecom-giant-ribbon-for-months-before-getting-caught/
-
Transnational Organized Crime Gang Steals $1 Million from Ontario Couple
Today my LinkedIn feed and Google News filter is showing me several stories that illustrate how we are failing to stop online scammers from stealing from our elderly. It starts with the headlines. CTVNews: Ontario seniors GIVE AWAY MORE THAN $1 MILLION to scammers.CTVNews: Ontario couple LOSES MORE THAN $1 MILLION DOLLARS to fraud.Toronto Only:…
-
Old threats, new consequences: 90% of cyber claims stem from email and remote access
Tags: access, ai, attack, awareness, cisco, ciso, citrix, cloud, communications, control, credentials, cve, cyber, cybersecurity, data, defense, detection, email, encryption, finance, fraud, hacker, insurance, mail, malicious, microsoft, network, phishing, phone, ransomware, risk, sophos, tactics, threat, tool, update, vpn, vulnerability2025 InsurSec Rankings Report, email and remote access remain the most prominent cyber threat vectors, accounting for 90% of cyber insurance claims in 2024.And, no surprise, larger companies continue to get hit hardest. But, interestingly, the virtual private networks (VPNs) many rely on are anything but secure, despite assumptions to the contrary.”We know from our…
-
‘Scamming became the new farming’: inside India’s cybercrime villages
How did an obscure district in a neglected state become India’s byword for digital deceit?On the surface, the town of Jamtara appeared no different from neighbouring districts. But, if you knew where to look, there were startling differences. In the middle of spartan villages were houses of imposing size and unusual opulence. Millions of Indians…
-
LG Uplus is latest South Korean telco to confirm cybersecurity incident
Korean telecom giant LG Uplus is the third major phone provider in the past six months to report a cybersecurity incident. First seen on techcrunch.com Jump to article: techcrunch.com/2025/10/28/lg-uplus-is-latest-south-korean-telco-to-confirm-cybersecurity-incident/
-
MY TAKE: Have you noticed how your phone’s AI assistant is starting to remap what you trust?
This morning, I tried to power down my Samsung S23 smartphone. Related: Sam Altman seeks to replace the browser I long-pressed the side key expecting the usual “Power off / Restart” menu. Instead, a small Gemini prompt window appeared towards… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/my-take-have-you-noticed-how-your-phones-ai-assistant-is-starting-to-remap-what-you-trust/
-
Patients Sue Florida Hospital Over ‘Humiliating’ Photo Posts
Staff Allegedly Took Photos, Posted Pics on Social Media Without Patient Consent. A Florida hospital is facing several lawsuits filed by patients who alleged staff members used their personal phones to take and post humiliating photos on social medial of the patients without their consent while they were asleep or medicated, and semi-undressed. First seen…
-
CBP Searched a Record Number of Phones at the US Border Over the Past Year
Tags: phoneThe total number of US Customs and Border Protection device searches jumped by 17 percent over the 2024 fiscal year, but more invasive forensic searches remain relatively rare. First seen on wired.com Jump to article: www.wired.com/story/cbp-searched-a-record-number-of-phones-at-the-us-border-over-the-past-year/
-
How evolving regulations are redefining CISO responsibility
Tags: attack, awareness, breach, ciso, communications, compliance, credentials, cyber, cyberattack, cybersecurity, data, data-breach, governance, identity, incident response, intelligence, iot, nis-2, phone, regulation, resilience, risk, risk-management, sbom, service, software, threat, tool, vulnerabilityIncreasing attacks on IoT and OT device vulnerabilities Cyberattacks are increasingly driven by software vulnerabilities embedded in OT and IoT devices. The 2025 Verizon Data Breach Investigations Report noted that 20% of breaches were vulnerability-based, which is a close second to credential abuse, accounting for 22% of breaches. Year over year, breaches resulting from software…
-
Hamas lawyer seeks appeal following police’s seizure of his phone at Welsh port
Tags: phonePolice say that solicitors cannot have a ‘cast iron defence’ to protect their electronic devices from ever being searched First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366633407/Hamas-lawyer-seeks-appeal-following-polices-seizure-of-his-phone-at-Welsh-port
-
DDoS, data theft, and malware are storming the gaming industry
When the pandemic kept people at home in 2020, millions turned to games for an escape. The surge turned every console, PC, and phone into part of a vast online network. More … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/27/gaming-industry-cyber-threats-risks/

