POPULARITY
Categories
Timestamps:4:00 - What's a data breach?10:21 - What's a phishing campaign?13:50 - How expensive is it to fix a data breach? 20:35 - How are startups being targeted?22:07 - Why strong passwords are not enoughThis episode was co-produced by NordPass. Use code “swisspreneur” at checkout to get 30% off Business and Teams plans.This episode was sponsored by Relai. Get started with Bitcoin by downloading the Relai app today, and profit from 10% less fees by entering code SWISSPRENEUR at checkout.(Disclaimer: Relai services are exclusively recommended for Swiss and Italian residents.)About Ieva Soblickaite:Ieva Soblickaite is the CPO of NordPass, a password management solution that is part of Nord Security, the world's leading cybersecurity company. She holds a Masters from HEC Paris and co-founded Medigo GmbH before joining NordPass in 2021.During her chat with Merle, Ieva broke down the topic of cybersecurity into easily digestible, actionable chunks:What's a data breach?A data breach occurs whenever confidential data is accessed and used in some way (disclosed, copied, altered, destroyed). Common malicious uses include trading the data on the darkweb, decrypting the data to demand a ransom payment, and identity theft. What's malware?Malware is any software developed with the express intent of causing harm. Examples include viruses, trojans, spyware, ransomware, etc. It can also completely take over a computer, putting the criminal in complete control.Common types of malware:Ransomware: type of malware that prevents users or organizations from accessing their files. Hackers demand payment to restore access.Adware: type of greyware (since it does not necessarily have to be malicious) that displays ads to certain users. These ads can be unwanted or malicious.Spyware: malware that secretly monitors and collects information about a user's activities or devices, usually as the first step before another type of attack.Another well-known type of cyberattack are phishing campaigns, in which a hacker pretends to be someone the user knows, or an entity that they trust, in order to get them to click on a malicious link, which can download malware or take the user to a fake website where sensitive information will be requested.On average, a cyberattack occurs every 14 seconds, and the cost of fixing it depends on how quickly the user notices it and how quickly they act. On average, users will take 204 days to notice a cyberattack and another 73 days to contain the breach.In order to prevent an attack, several components are necessary:Strong passwordsMultifactor authenticationLimiting access to accounts & regularly reviewing who has accessAnti-virus softwareRegular vulnerability assessmentsHackers target big and small companies alike, as well as both famous and anonymous people, so it's safest to start improving the cybersecurity of your professional and personal accounts now.The cover portrait was edited by www.smartportrait.io.
Is your phone suddenly running hot? That might not just be a glitch. It could be some creep spying in on your phone. Learn more about your ad choices. Visit megaphone.fm/adchoices
A jury orders NSO Group to pay $167 millions dollars to Meta over spyware allegations. CISA warns of hacktivists targeting U.S. ICS and SCADA systems. Researcher Micah Lee documents serious privacy risks in the TM SGNL app used by high level Trump officials. The NSA plans significant workforce cuts. Nations look for alternatives to U.S. cloud providers. A medical device provider discloses a cyberattack disrupting its ability to ship customer orders. The Panda Shop smishing kit impersonates trusted brands. Accenture's CFO thwarts a deepfake attempt. Our temporary intern Kevin Magee from Microsoft wraps up his reporting from the RSAC show floor. Server room shenanigans, with romance, retaliation, and root access. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Wrapping up RSAC 2025, we're joined by our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Kevin brings the energy with a high-octane medley of interviews directly from the show floor, featuring sharp insights and bold ideas from some of cybersecurity's most influential voices. It's the perfect, fast-paced finale to our RSAC coverage—check out the show notes for links to all the guests featured! In this segment, you'll hear from Eoin Wickens, Director of Threat Intelligence of HiddenLayer, Jordan Shaw-Young, Chief of Staff for Security Services at BlueVoyant, Gil Barak, co-founder and CEO of Blink Ops, and Paul St Vil, VP of Field Engineering at Zenity. You can also catch Kevin on our Microsoft for Startups Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi of Cerby, Travis Howerton of RegScale, and Karl Mattson of Endor Labs. Whether you are building your own startup or just love a good innovation story, listen and learn more here. Selected Reading Spyware-maker NSO ordered to pay $167 million for hacking WhatsApp (The Washington Post) CISA Warns of Hackers Attacking ICS/SCADA Systems in Oil and Natural Gas Companies (Cyber Security News) Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs (Micha Flee) NSA to cut up to 2,000 civilian roles as part of intel community downsizing' (The Record) NIST loses key cyber experts in standards and research (Cybersecurity Dive) A coherent European/non-US cloud strategy: building railroads for the cloud economy (Bert Hubert) Medical device giant Masimo says cyberattack is limiting ability to fill customer orders (The Record) New Chinese Smishing Kit Dubbed 'Panda Shop' Steal Google, Apple Pay & Credit Card Details (Cyber Security News) Accenture: What we learned when our CEO got deepfaked (Computing) IT Worker from Computacenter Let Girlfriend Into Deutsche Bank's Restricted Areas (GB Hackers) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Flight from fight response. After India attacks Pakistan and Pakistan authorizes "corresponding action", a journalist in Kashmir tells us the threat of escalation has people unsure what to do or where to go.Search me. American authorities in a Washington state border town inspect cars and question drivers heading toward Canada. A local lawyer says that might destroy whatever was left of the town's cross-border business. Spyware and tear. An Israeli cyber-intelligence firm is ordered to pay more than 2-hundred and 30 million Canadian in damages, for surveilling hundreds of WhatsApp users.Your chance to pontiff-icate. While the conclave is in session, Italians are guessing who the next Pope will be -- by playing a fantasy-league game called "Fantapapa". A true sensation about real sensations. A graduate student in Finland wins this year's "Dance Your PhD" contest with a powerful performance about the science behind sensations such as burning, cooling, and tingling.And...villain the blanks. A British woman is given tens of thousands in compensation, after her colleagues filled out a Star Wars-related personality test on her behalf -- and declared her a "Darth Vader".As It Happens, the Wednesday Edition. Radio that survives a near-Darth experience.
Netflix rolls out a redesign of its Apple tvOS app, Spyware maker NSO Group must pay WhatsApp $167M, Amazon unveils warehouse robot “Vulcan” MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none of this would be possible. If you enjoy what you see youContinue reading "US v. Google: Eddy Cue says Apple is actively looking at reshaping Safari – DTH"
In this episode, host Jim Love discusses various cybersecurity topics including a book deal from CRC Press for those interested in cybersecurity, auditing, and leadership. Major cyber incidents involving two UK retailers, Co-op and Marks & Spencer's, are detailed, highlighting the challenges they face. Apple's notifications to users in 100 countries about targeted mercenary spyware attacks are covered, emphasizing the importance of taking these alerts seriously. Additionally, a malicious WordPress plugin has been discovered that grants attackers unauthorized access, and an open letter from cybersecurity professionals calls on President Donald Trump to cease investigations into former CISA Director Chris Krebs. The episode concludes by previewing an upcoming segment covering the B Side and RSA shows. 00:00 Introduction and Special Announcement 00:16 Cybersecurity Book Deals 01:37 Major Cyber Attacks on UK Retailers 03:48 Apple's Spyware Alerts 06:22 Malicious WordPress Plugin Discovered 08:19 Open Letter Supporting Chris Krebs 10:57 Conclusion and Upcoming Events
No Agenda Episode 1760 - "Mercenary Spyware" "Mercenary Spyware" Executive Producers: Anonymous Black Sheep Scott Horton Abby Paulsons Commadore of the Human Resources Producers Sir Marcus Sir Milkman Zadoc Brown III SDG Brock Reinhold Jon Tucker Laurens De Ceuster Sir Dibs on Living Angel Dechter Wirt Fuller Rick W Cable Brandon Foster Associate Executive Producers: Rich Geisler Chad Finkbeiner Eli the coffee guy Linda Lu Duchess of jobs & writer of resumes Erin Parr Commodores: Commodore Anonymous Black Sheep Commodore Scott Horton Commodore of the Human Resources Producers Commodore Mark of Crow Wing County"? Commodore Sir Milkman of Evington Commodore Zadoc Brown III Commodore SDG Commodore Brock Reinhold Commodore Jon Tucker Become a member of the 1761 Club, support the show here Boost us with with Podcasting 2.0 Certified apps: Podverse - Podfriend - Breez - Sphinx - Podstation - Curiocaster - Fountain Knights & Dames Sir Tom > Baron Tom, Warden of the Frozen Tundra. Art By: Dennis Roebecker End of Show Mixes: Nautilis K - David Keckta Engineering, Stream Management & Wizardry Mark van Dijk - Systems Master Ryan Bemrose - Program Director Back Office Jae Dvorak Chapters: Dreb Scott Clip Custodian: Neal Jones Clip Collectors: Steve Jones & Dave Ackerman NEW: and soon on Netflix: Animated No Agenda Sign Up for the newsletter No Agenda Peerage ShowNotes Archive of links and Assets (clips etc) 1760.noagendanotes.com Directory Archive of Shownotes (includes all audio and video assets used) archive.noagendanotes.com RSS Podcast Feed Full Summaries in PDF No Agenda Lite in opus format Last Modified 05/01/2025 16:55:14This page created with the FreedomController Last Modified 05/01/2025 16:55:14 by Freedom Controller
Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices
Russian military personnel targeted with Android spyware, Trump defends Hegseth after second Signalgate scandal, CISA's Secure by Design leaders depart the agency, and forced-labour cyber scam compounds expand globally. Show notes
We are all vulnerable to digital surveillance, as there's little protection to prevent our phones from getting hacked. Mercenary spyware products like Pegasus are powerful and sophisticated, marketed to government clients around the world. Cybersecurity expert Ron Deibert tells IDEAS, "the latest versions can be implanted on anyone's device anywhere in the world and as we speak, there is literally no defence against it.” Deibert is the founder of the Citizen Lab at the University of Toronto, a group of tech-savvy researchers who dig into the internet, looking for the bad actors in the marketplace for high-tech surveillance and disinformation. In his new book, Chasing Shadows, he shares notorious cases he and his colleagues have worked on and reveals the dark underworld of digital espionage and subversion.
With the throwback gratification of Failure's "Fantastic Planet" rolling throughout, the gearhead goons at the Garage Hour start out gritty with the bucket (or well-sorted trays) of backup bolts that every good geek has in the garadtch. Note: if that pile of bolts (and rags, and parts, and tools) is getting dusty, you're not making enough - time to build, boys and girls. There's also a look at the trannie nutjobs who are blowing up cars and dealerships, the politics of production (with perspectives from pinko China and politicized capitalism), and why race fans have very little interest in electric race cars (and still line up for vintage Trans Am, Thunderboats and NASCAR). Want more? Miniaturized spyware in your USB cables from Tom's Hardware (and a look at when Western civilization figured out that SMALLER is more G-resistant), a retreat from cashless society in Europe, and the importance of protecting your data from the crazies, because they are what they do.
With the throwback gratification of Failure's "Fantastic Planet" rolling throughout, the gearhead goons at the Garage Hour start out gritty with the bucket (or well-sorted trays) of backup bolts that every good geek has in the garadtch. Note: if that pile of bolts (and rags, and parts, and tools) is getting dusty, you're not making enough - time to build, boys and girls. There's also a look at the trannie nutjobs who are blowing up cars and dealerships, the politics of production (with perspectives from pinko China and politicized capitalism), and why race fans have very little interest in electric race cars (and still line up for vintage Trans Am, Thunderboats and NASCAR). Want more? Miniaturized spyware in your USB cables from Tom's Hardware (and a look at when Western civilization figured out that SMALLER is more G-resistant), a retreat from cashless society in Europe, and the importance of protecting your data from the crazies, because they are what they do.
This week, Paul Palango and Adam Rodgers discuss the Conservative and Liberal justice proposals released this week in the Canadian federal election campaign. The Conservatives say “three strikes and you're out”, while the Liberals look to tackle gun crimes. Related, this week the National Post published an excerpt of Tristin Hopper's new book, Don't Be Canada. The excerpt we analyse deals with Hopper's critiques of the Canadian justice system, particularly as it deals with bail matters, and indigenous offenders.Also, there is a case unfolding in BC, involving former officer Bill Majcher, who has been accused of espionage against Canada. Two other officers allege that they have been subjected to a spyware attack from the RCMP on their police-issued phones.The show starts out with Paul describing an unusual invitation to join with retired police officers, ostensibly to join in their efforts to reform policing in Canada. It did not go as (they) planned.
Feel like someone knows everything about you? You could have a lurker on your phone.
The advisories say the spyware apps are used to target members of civil society who may oppose China's state interests. Learn more about your ad choices. Visit podcastchoices.com/adchoices
בפרק זה של הפודקאסט "על המשמעות" עו"ד תמיר דורטל מארח את עינת מירון, מומחית סייבר המסייעת לארגונים בהתמודדות עם מתקפות סייבר, לשיחה מרתקת ומטרידה על המציאות שמאחורי הכותרות הנוצצות של "מעצמת הסייבר".השיחה נפתחת בפרשת מוריה אשרף במשרד ראש הממשלה, כמקרה בוחן לכשלים פיזיים שעלולים להפוך בקלות לאירועי סייבר הרסניים, וממשיכה לצלול לעומקם של אירועי סייבר גדולים שהתרחשו בישראל ובעולם. עינת מירון מפרטת את ההשלכות הקשות של מתקפת הסייבר על בית החולים הילל יפה – השבתה של 54 ימים ועלות מוערכת של עשרות מיליוני שקלים למשלם המיסים – ומדגימה כיצד גם ארגונים גדולים ומתוקצבים, כמו חברת הביטוח שירביט (שנסגרה ונמכרה בסכום זעום בעקבות מתקפה) או תאגיד הענק כלורוקס, אינם חסינים.האם ישראל באמת "מעצמת סייבר" או שמא מדובר במיתוג מוצלח שמסתיר פערים מדאיגים בהגנה האמיתית על תשתיות וארגונים? מירון טוענת שהתוקפים, בין אם מדינתיים ובין אם פליליים, תמיד נמצאים צעד אחד לפנינו, מונעים ממוטיבציה גבוהה ופועלים ללא מגבלות, בעוד שהארגונים המותקפים כבולים ברגולציה שלעיתים אינה יעילה (כמו תקן ISO שלא תמיד מיושם כראוי) ובמגבלות תקציב ונהלים. היא אף מותחת ביקורת על מערך הסייבר הלאומי, שלטענתה אינו מסוגל לתת מענה אמיתי לכלל הארגונים במשק.מירון מספקת גם שורה של המלצות מעשיות וצעדים שכל אדם וכל ארגון, קטן כגדול, יכולים וצריכים לנקוט כדי להקשות על התוקפים ולצמצם נזקים פוטנציאליים, כולל חשיבותם של גיבויים (גם פיזיים!), החלפת סיסמאות, שימוש באימות דו-שלבי (2FA) והיערכות לתרחיש שבו המערכות הדיגיטליות פשוט קורסות.00:00:00-00:03:34 הקדמה ופתיחה: מוריה אסרף והחדירה למשרד ראש הממשלה00:03:34-00:06:50 מתקפת הסייבר על בית חולים הלל יפה והשלכותיה00:06:50-00:11:16 כשל בתקינה הבינלאומית ודוגמת חברת Clorox00:11:16-00:14:46 לינקדין כפלטפורמת תקיפה ופרשת פגסוס00:14:46-00:17:57 קשר בין שבת למערך הסייבר ופעילות האקרים00:17:57-00:21:30 ישראל ומעצמות סייבר - מציאות לעומת פוטנציאל00:21:30-00:25:27 הפרצות של חברות הייטק ופינטק ומתקפות סייבר יומיומיות00:25:27-00:29:31 מקרה שירביט והשלכותיו על עובדי מדינה ואנשי ביטחון00:29:31-00:33:18 סיכוני סייבר נלווים - דוגמת הקייטרינג בבית חולים מעייני הישועה00:33:18-00:41:05 תפקיד מערך הסייבר, נהלים לא יעילים והצורך בגיבויים פיזיים00:41:05-00:48:50 המלצות מעשיות לאבטחת מידע00:48:50-00:51:08 סיכום והמלצות נוספות להתנהלות נכונה בעולם הסייבר#פודקאסט #על_המשמעותSupport the show◀️ פרסמו אצלנו - לקבלת הצעת מחיר: פנו לג'ו - 054-236-0136 - https://wa.me/972542360136▶️
WhatsApp vulnerability could facilitate remote code execution Spyware targeting Chinese diaspora Microsoft Patches 125 Windows Vulns, Including Exploited CLFS Zero-Day Thanks to our episode sponsor, Nudge Security Nudge Security provides advanced security posture management for Okta, Microsoft 365, Google Workspace, and other critical apps. With Nudge, you'll be alerted of risks like weak or missing MFA, inactive admin accounts, and risky integrations, plus you can automate remediation tasks and on-going identity governance. Start a free 14-day trial today
An RCMP officer and a retired Vancouver cop say that not even police are safe from high-tech spyware! How can we combat it then? The latest updates from the campaign trail with Richard Zussman! Landlords and renters will benefit from new measures that enhance supports, while disputes will continue to be resolved quickly and fairly. Learn more about your ad choices. Visit megaphone.fm/adchoices
Military-grade spyware, once the province of shadowy intelligence outfits, is now being handed over to local police forces. As an Ontario resident, I find this deeply unsettling. These tools are powerful, precise, and built for a level of strategic nuance that most municipal sometimes even provincial police simply aren't equipped to handle. It's like handing a ten-year-old a scalpel and asking them to perform surgery. The intentions might be sincere, but the training, context, and oversight just aren't there. And that gap between tool and user is where things start to slip where privacy erodes, rights get sidelined, and the line between public safety and state overreach gets dangerously blurry. What Is Spyware and How Does It Work? At its core, spyware is software designed to secretly infiltrate and monitor digital devices usually without the knowledge or consent of the person being targeted. Once installed, it can track online activity, harvest sensitive information, and even take control of device functions like cameras and microphones. Military-grade spyware, like NSO Group's Pegasus or Paragon's Graphite, takes this to another level. These advanced tools can penetrate even the most secure devices, including phones protected by encrypted messaging apps like WhatsApp, iMessage, and Signal. Some spyware even uses "zero-click" exploits meaning the target doesn't need to click a suspicious link for their device to be compromised. This isn't just like wiretapping a phone call. Spyware can reveal a person's entire digital life recording private conversations, tracking real-time locations, logging browsing histories, and accessing stored files. For police, it's revolutionary. But for the rest of us? It's a chilling reminder that nothing is truly private anymore. Why Are Local Police Using Spyware? So, why are local police turning to such extreme surveillance measures? The short answer: encryption. As more people use encrypted communication platforms, traditional surveillance methods like wiretapping are becoming less effective. Criminal organizations, human traffickers, and other bad actors know how to hide their tracks using secure apps, creating a major challenge for law enforcement. Spyware gives police a way around these barriers by directly accessing the suspect's device and collecting evidence that would otherwise be out of reach. And there's public pressure, too. With high-profile crimes making headlines, law enforcement is under intense pressure to deliver fast results. Spyware, with its ability to gather and analyze large amounts of information in real time, can speed up investigations and improve the odds of making an arrest. In Canada, local police forces are increasingly adopting advanced surveillance technologies to stay ahead of tech-savvy criminals. But as these tools become more common, there's a growing concern: Who's watching the watchers? Ontario Police and "Graphite" Spyware Controversy A recent example that's sparked public debate is Ontario police's use of Graphite spyware. This highly advanced tool can bypass encrypted communications and operate without leaving a trace, meaning police can monitor individuals without them ever knowing. Police officials claim they only use Graphite in the most serious cases. But here's the catch there's little public information about how often it's used or what safeguards are in place. Without transparency, it's impossible to know whether police are sticking to serious crimes or deploying these powerful tools for more routine investigations. Civil liberties advocates are especially worried that spyware could be turned against people who challenge authority - journalists, political activists, or marginalized communities. And it's not just happening in Ontario. Across the globe, police forces are quietly adopting military-grade spyware, often without public input or clear legal oversight. RCMP's Use of Spyware It's not just local police getting in on the action. In 2022, the...
Send us a textIn this episode of The Modern Arizona Podcast, attorney Billie Tarascio sits down with Steven Bradley, a retired federal law enforcement investigator and safety and technology expert, to uncover how digital tools are being used to harass, stalk, and manipulate in family law cases.Drawing from decades of frontline experience, Steven explains how spyware, fake evidence, GPS tracking, voice cloning, and even children's devices are being weaponized in custody battles and abusive relationships and what families, attorneys, and judges need to do about it.Whether you're navigating a high-conflict divorce, co-parenting with someone abusive, or simply want to protect yourself and your children, this episode delivers practical, real-world strategies to stay informed and stay safe.In this episode, you'll learn:1. How abusers use everyday tech like Apple AirTags, Ring cameras, and spyware to control their partners2. The signs your phone may be cloned or tracked—and what to do next3. The truth about AI-manipulated evidence and how to fight false claims in court4. How tools like OFW help protect families by locking down communication5. Tips for parents: how to talk to kids about digital safety when you don't trust the other parentThis episode is a must-listen for anyone who cares about digital safety in family law—and a wake-up call for legal professionals who haven't kept up with how abuse has evolved.Where to Find Steven BradleyWebsite: www.ourfamilywizard.comLinkedIn: Steven BradleyEmail: Sbradley@ourfamilywizard.com#TechAbuse #DigitalSafety #OnlineHarassment #Cyberstalking #Spyware #AIManipulation #VoiceCloning #GPSTracking #ModernArizonaPodcast #FamilyLaw #Divorce #CustodyBattle #CoParenting #legalpodcast #ProtectYourKids #DomesticAbuseAwareness #FamilyCourt #LegalTech #LawAndTechnology
Geoffrey Hinton also known as the godfather of AI was recently awarded the Nobel Prize in Physics for his pioneering work in artificial intelligence. He joins host Steve Paikin for a wide-ranging discussion on his Nobel win, his departure from Google, the promise and perils of AI, and why he recently got under Elon Musk's skin. See omnystudio.com/listener for privacy information.
In dieser Folge geht es wieder um Staaten, die ihre Bürger bespitzeln. Diesmal allerdings nicht durch Spyware (siehe Folge 25) sondern mittels spezieller Geräte, die möglichst viele Daten auch von gesperrten Telefonen extrahieren. Im Podcast ist Viktor Schlüter zu Gast, der bei Reporter ohne Grenzen das Digital Security Lab leitet. Er kennt sich bestens mit solchen Smartphone-Durchsuchungen aus, die immer wieder auch illegitim eingesetzt werden und sich beispielsweise gegen Journalisten richten. Zusammen mit Viktor sehen sich Christopher und Sylvester an, wie solche Durchsuchungen funktionieren, wer solche Geräte herstellt, wer sie einsetzt und wie man sich davor schützen kann. - Digital Security Lab von Reporter ohne Grenzen: https://www.reporter-ohne-grenzen.de/hilfe/digital-security-lab - Aktuelle Fallanalyse von Amnesty International: https://securitylab.amnesty.org/latest/2025/02/cellebrite-zero-day-exploit-used-to-target-phone-of-serbian-student-activist/ - Cellebrite UFEDs auf eBay: https://www.ebay.de/itm/305957265144 https://www.ebay.com/itm/204207137842
Today, I'm sharing something deeply personal and serious—my stalker story. For over a year, Timothy C. (we can share his full name soon if need be) has been physically stalking me, and his digital harassment goes back even further. Law enforcement is now involved, but I wanted to update you all in case anything happens to me—so there's no question about who did it. This episode isn't just about my experience; it's also about the reality of stalking, the dangers of obsession, and the importance of taking threats seriously. Stay aware, stay safe, and let's talk about it all, shall we?—https://noblegoldinvestments.com
Three Buddy Problem - Episode 39: Luta Security CEO Katie Moussouris joins the buddies to parse news around a coordinated Chinese exposure of Taiwan APT actors, CitizenLab's report on Paragon spyware and WhatsApp exploits, an “official” Russian government exploit-buying operation shopping for Telegram exploits, the fragmentation of exploit markets and the future of CISA in the face of budget cuts and layoffs. Cast: Katie Moussouris (https://lutasecurity.com), Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).
https://youtu.be/Zo9qHqTDcgMhttps://odysee.com/@NaomiBrockwell:4/Graphene-Install:eYour phone is a tracking device. But it doesn't have to be.One of the best ways to reclaim your privacy is to ditch iOS and stock Android and install GrapheneOS instead.This guide is a step-by-step tutorial on converting a Pixel phone to GrapheneOS, tweaking key settings for maximum privacy, and installing apps—including how to handle Google Play Services after setup. If you want to eliminate as much of Google as possible from your device but still need certain apps that require Google Play Services, we'll show you how to use it in a more privacy-preserving way.I'll walk you through how I set up my GrapheneOS device so you can see what's possible. But this is just one way to do it—if you have your own setup, share your tips in the comments!00:00 Spyware is all over our smartphones01:47 Hardware03:03 Purchase05:13 Installation10:24 Setup13:33 App Stores19:32 Secondary Profiles23:46 Your Phone, Your RulesAs difficult as it may seem, it's actually not that difficult to enjoy all the benefits of a smartphone without compromising your privacy. Remember, privacy isn't about going off grid; it's about making informed choices; and with GrapheneOS, you're taking control of your device, your data, and your digital freedom.Our full phone privacy series:https://youtube.com/playlist?list=PLt3zZ-N423gXV-0pdxnRn-nw0WzVKh4NY&si=VZbMAB50C2-NAOAMNBTV is a project of the Ludlow Institute, a 501c3 non profit whose mission is to advance freedom through technology.To support NBTV, visit:https://LudlowInstitute.org/donate(As a 501(c)(3) non profit, all donations are tax-deductible in the USA as permitted by law.)Brought to you by NBTV team members: Reuben Yap, Lee Rennie, Cube Boy, Will Sandoval and Naomi BrockwellVisit our shop!https://Shop.NBTV.mediaOur eBook "Beginner's Introduction To Privacy:https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Support the show
The Citizen Lab said it believes several governments may be customers of spyware maker Paragon Solutions. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Cybersecurity firm Lookout found several samples of a North Korean spyware it calls KoSpy. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Captatori informatici e spyware. Come si installano, come funzionano e come capire se sono nel nostro telefono. Dopo il caso Paragon lo chiediamo a Paolo Dal Checco, esperto di cybersecurity e informatica forense.Torniamo sulla notizia del lancio da parte di OpenAI del nuovo servizio "Deep research". Con Simone Righini, esperto di search marketing e motori di ricerca, vediamo come funziona questo nuovo servizio di ricerca generativa capace di svolgere più ricerche complesse e concatenate in sequenza.In Italia si va verso un consolidamento del mercato delle telecomunicazioni. Vediamo quali saranno le conseguenze per i consumatori assieme a Innocenzo Genna, esperto di regolamentazione europea in ambito digitale a Bruxelles.E come sempre, nelle nostre Digital News, le notizie di tecnologia e innovazione più importanti della settimana.
In dieser Folge geht es um Methoden, mit denen Staaten - und zwar längst nicht nur autoritäre - ihre Bürger bespitzeln. Dissidenten, Journalisten, Politiker und andere Bevölkerungsgruppen waren bereits Opfer von Smartphone-Malware, die im staatlichen Auftrag installiert wurde. Die Hersteller dieser Spionagesoftware sind geheimnistuerische Unternehmen, die viel Geld für ihre Dienste nehmen. Sylvester und Christopher nehmen alle Beteiligten unter die Lupe und klären auch die Frage, ob Whatsapp die NSA verklagt hat. - [Predator-Analyse von Cisco Talos](https://blog.talosintelligence.com/mercenary-intellexa-predator/) - [Google Project Zero zu FORCEDENTRY](https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html) - https://media.ccc.de/v/38c3-from-pegasus-to-predator-the-evolution-of-commercial-spyware-on-ios - https://securitylab.amnesty.org/latest/2024/12/serbia-a-digital-prison-spyware-and-cellebrite-used-on-journalists-and-activists/ - [Details zum iOS Lockdown Mode](https://support.apple.com/de-de/105120) - https://securitylab.amnesty.org/get-help/ - https://securitylab.amnesty.org/partners-and-support/ - [Mobile Verification Toolkit (MVT)](https://docs.mvt.re/en/latest/)
It's become pretty easy to spot phishing scams: UPS orders you never made, banking alerts from companies you don't bank with, phone calls from unfamiliar area codes. But over the past decade, these scams – and the technology behind them – have become more sophisticated, invasive and sinister, largely due to the rise of something called ‘mercenary spyware.'The most potent version of this tech is Pegasus, a surveillance tool developed by an Israeli company called NSO Group. Once Pegasus infects your phone, it can see your texts, track your movement, and download your passwords – all without you realizing you'd been hacked.We know a lot of this because of Ron Deibert. Twenty years ago, he founded Citizen Lab, a research group at the University of Toronto that has helped expose some of the most high profile cases of cyber espionage around the world.Ron has a new book out called Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy, and he sat down with me to explain how spyware works, and what it means for our privacy – and our democracy.Note: We reached out to NSO Group about the claims made in this episode and they did not reply to our request for comment.Mentioned:“Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy,” by Ron Deibert“Meta's WhatsApp says spyware company Paragon targeted users in two dozen countries,” by Raphael Satter, ReutersFurther Reading:“The Autocrat in Your iPhone,” by Ron Deibert“A Comprehensive Analysis of Pegasus Spyware and Its Implications for Digital Privacy and Security,” Karwan Kareem“Stopping the Press: New York Times Journalist Targeted by Saudi-linked Pegasus Spyware Operator,” by Bill Marczak, Siena Anstis, Masashi Crete-Nishihata, John Scott-Railton, and Ron Deibert
In questa puntata di Start parliamo del caso di giornalisti e attivisti “spiati” su Whatsapp, della regione Sardegna che fa causa allo Stato per 1,7 miliardi e dei nuovi bonus cultura per i giovani.
In questa puntata di Start parliamo del caso di giornalisti e attivisti “spiati” su Whatsapp, della regione Sardegna che fa causa allo Stato per 1,7 miliardi e dei nuovi bonus cultura per i giovani.
Learn more about navigating cyber threats and insurance with insights from Hunter Maskell, a Director with the CRC / INSUREtrust Cyber Practice Group and Professional Lines Broker Chris Zepeda. Ransomware attacks are making a sophisticated resurgence, matching the concerning levels of 2020 and 2021. Despite strides in incident response, the financial strain from business interruptions and legal battles lingers. While current market conditions may seem buyer-friendly, the looming specter of increasing claims warns of impending premium adjustments. Listen as we dissect the delicate balance between competitive pricing and sustainable risk management, ensuring you're prepared for the challenges ahead. The landscape of cyber insurance is ever-shifting, and understanding coverage nuances with the help of specialists is crucial. This episode is your guide to staying ahead in an era where cyber risks and solutions constantly evolve. Visit REDYIndex.com for critical pricing analysis and a snapshot of the marketplace. Do you want to take your career to the next level? Join #TeamCRC to get access to best-in-class tools, data, exclusive programs, and more! Send your resume to resumes@crcgroup.com today!
When WhatsApp alerts you that military-grade spyware hacked your phone, it's not just paranoia, it's reality. At least seven people in Italy, including journalists and activists, and another 83 people in more than 24 countries were targeted using Israeli-made spyware. The Italian government denies involvement, but questions remain: Who ordered the hacks? And what does this mean for press freedom and privacy in Europe?Join us on our journey through the events that shape the European continent and the European Union.Production: By Europod, in co production with Sphera Network.Follow us on:LinkedInInstagram Hosted on Acast. See acast.com/privacy for more information.
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: DeepSeek leaves an unauthed database on the internet Russia hacked UK prime minister's personal mail Australia sanctions a Telegram group… which is more sensible than it sounds Medical device backdoor turns out to be just poorly thought out upgrade feature Google abuses weak hashing to patch AMD CPU microcode And much, much more. This week's episode is sponsored by email security boffins Sublime. Their co-founder and CEO Josh Kamdjou joins to talk about how attackers' abuse of legitimate services like Docusign is a challenge for email security vendors. This episode is also available on Youtube. Show notes Exclusive: Musk aides lock workers out of OPM computer systems | Reuters Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History | Wiz Blog Криптостилер SparkCat в магазинах Google Play и App Store | Securelist Russian hackers suspected of compromising British PM's personal email account | The Record from Recorded Future News PowerSchool hack: missed basic security step resulted in data breach Australia sanctions ‘Terrorgram' white supremacist online group | The Record from Recorded Future News ‘Paid actors' could be behind some antisemitic attacks, Albanese says | Australian security and counter-terrorism | The Guardian Interview with James Glenday, ABC News Breakfast | Australian Minister for Foreign Affairs WhatsApp says spyware company Paragon Solutions targeted journalists Spyware maker Paragon confirms US government is a customer | TechCrunch Former Polish justice minister arrested in sprawling spyware probe | The Record from Recorded Future News Sweden releases suspected ship, says cable break ‘clearly' not sabotage | The Record from Recorded Future News Backdoor found in two healthcare patient monitors, linked to IP in China Attackers exploit zero-day vulnerability in Zyxel CPE devices | Cybersecurity Dive AMD: Microcode Signature Verification Vulnerability · Advisory · google/security-research · GitHub 22-year-old math wiz indicted for alleged DeFI hack that stole $65M - Ars Technica A method to assess 'forgivable' vs 'unforgivable'... - NCSC.GOV.UK Living Off the Land: Credential Phishing via Docusign abuse Living Off the Land: Callback Phishing via Docusign comment B2B freight-forwarding scams on the rise to evade financial fraud crackdowns Callback phishing via invoice abuse and distribution list relays Enhanced message groups: Improving efficiency in email incident response
Caitlin Clark's $28M Nike Deal, Spyware Scandal & Chipotle's Trade War Strategy | Courtside Financial Podcast Welcome back to Courtside Financial! In this episode, we're diving into three major stories shaping business, tech, and sports:
Google describes APTs using Gemini AI India's Tata Technologies suffers ransomware attack Meta confirms new zero-click WhatsApp spyware Huge thanks to our episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.
The Meta-owned company said the campaign was linked to Israeli spyware maker Paragon. Learn more about your ad choices. Visit podcastchoices.com/adchoices
WhatsApp says Israeli spyware targeted journalists and civil service workers, Myanmar extends emergency rule for another six months, Italy blocks DeepSeek AI over privacy concerns, The UK marks the fifth anniversary of Brexit, Nicaragua approves constitutional reforms establishing a co-presidency, Black boxes are recovered from the tragic Washington DC aviation accident, President Donald Trump says that 25% tariffs on Canada and Mexico are imminent, In France, convicted rapist Dominique Pélicot is linked to cold cases from the 1990s, The US Food and Drug Administration approves a non-opioid painkiller, and NBA star Terry Rozier is the focus of a federal sports betting probe. Sources: www.verity.news
Ronald Deibert of Citizen Lab tells host Michael Isikoff how his research firm has uncovered the shocking abuse of commercial spyware by foreign governments and spy agencies around the world, resulting in a proliferation of "Watergate-like” scandals.Follow our guest:Ron Deiberthttps://x.com/RonDeibertChasing Shadowshttps://www.simonandschuster.ca/books/Chasing-Shadows/The Citizen Labhttps://citizenlab.ca/https://x.com/citizenlab Follow Jeff Stein on Twitter:https://twitter.com/SpyTalkerFollow Michael Isikoff on Twitter:https://twitter.com/isikoff Follow SpyTalk on Twitter:https://twitter.com/talk_spySubscribe to SpyTalk on Substackhttps://www.spytalk.co/Take our listener survey where you can give us feedback.http://survey.podtrac.com/start-survey.aspx?pubid=BffJOlI7qQcF&ver=short
Die Universitäten in Serbien sind besetzt. Studierende fordern aufzuklären wie es dazu kommen konnte, dass das Vordach des Bahnhofs in Novi Sad eingestürzt ist, wobei 15 Menschen starben. Sie wollen Transparenz, eine rechtstaatliche Aufarbeitung und vor allem ein Ende der Korruption. Die Sicherheitsbehörden reagieren mit scharfen Repressionen und dem Einsatz von Spyware. Präsident Aleksandar Vučić und regierungsnahe Medien verbreiten derweil absurde Verschwörungstheorien, laut denen die Proteste von ausländischen Akteuren wie der deutschen Bundesregierung oder dem kroatischen Geheimdienst orchestriert seien. Außerdem erfahrt ihr was Donald Trumps Schwiegersohn für Geschäfte in Albanien macht, warum es zwischen Slowenien und der Steiermark zum Streit kommt und wie originell der kroatische Präsident Zoran Milanović seinen Kontrahenten im TV-Duell beschimpfte.
Art is cybercrime expert with almost 40 years of experience in law enforcement and corrections. About my Guest Art Boker: Art is cybercrime expert with almost 40 years of experience in law enforcement and corrections. He has been recognized with top awards for his work in promoting cybercrime awareness and control tools within community corrections, including honors from the American Probation and Parole Association and the Federal Probation and Pretrial Officers Association. In 2016, he received the High Technology Crime Investigators Association (HTCIA) Lifetime Achievement Award, underscoring his contributions to the field. Art is a lifetime member of HTCIA and former International President. He is the author of The Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century and coauthored with Todd Shipley Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace. His and Todd's second upcoming book Surviving a Cyberattack: Securing Social Media and Protecting Your Home Network, is set for release this fall. --- Help Support the show through my Business Partners : Find Virtual Assistants at https://va.world/ Upgrade Your Brain Unleash & Use Your Uniqueness https://braingym.fitness/ -------------------------- Awakening Podcast Social Media / Coaching My Other Podcasts https://roycoughlan.com/ Health & Wellness Products https://partnerco.world/ My Website https://partner.co/?custid=N6543249 ------------------ What we Discussed: - How he got into Cyber Crime ( 2 mins) - The elderly are attacked more often ( 7 mins) - Criminal Organisations involved in the Scams (8:30 mins) - Using fake Voices (11:45 mins) - The danger of Ai and having a passphrase (14 mins) - Tech fraud scams (17 mins) - How I fell for a fraud and Remittle not worth using ( 21:45 mins) - How to Stop the Scammers (23:45 mins) - Should you have a password manager on the cloud (28:45 mins) - People threating you pretending they know what you are doing on your computer (32 mins) - Targetting Minors (33 mins) - How do we protect the kids (36 mins) - Fake news online ( 40 mins) - Getting your phone hacked ( 42 mins) - Spyware software are they dangerous (46 mins) - What happens to the scammers that are caught ( 49 mins) - Are VPN's traceable (51 mins) - How to protect your blockchain (54:45 mins) - Digital Assets will's (57 mins) How to Contact Art Boker : https://thecybersafetyguys.blog/ https://twitter.com/Computerpo https://www.instagram.com/computerpo/ https://www.facebook.com/groups/Cybersafetyguys https://www.linkedin.com/in/artbowker ------------------------------ More about the Awakening Podcast: All Episodes can be found at www.awakeningpodcast.org Help Support the show through my Business Partners : Upgrade Your Brain Unleash & Use Your Uniqueness https://braingym.fitness/ -------------------------- Awakening Podcast Social Media / Coaching My Other Podcasts https://roycoughlan.com/ Health & Wellness Products https://partnerco.world/ My Website https://partner.co/?custid=N6543249 Our Facebook Group can be found at https://www.facebook.com/royawakening
Art is cybercrime expert with almost 40 years of experience in law enforcement and corrections. About my Guest Art Boker: Art is cybercrime expert with almost 40 years of experience in law enforcement and corrections. He has been recognized with top awards for his work in promoting cybercrime awareness and control tools within community corrections, including honors from the American Probation and Parole Association and the Federal Probation and Pretrial Officers Association. In 2016, he received the High Technology Crime Investigators Association (HTCIA) Lifetime Achievement Award, underscoring his contributions to the field. Art is a lifetime member of HTCIA and former International President. He is the author of TheCybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century and coauthored with Todd Shipley Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace. His and Todd's second upcoming book Surviving a Cyberattack: Securing Social Media and Protecting Your Home Network, is set for release this fall. ---Help Support the show through my Business Partners : Find Virtual Assistants at https://va.world/ Upgrade Your Brain Unleash & Use Your Uniqueness https://braingym.fitness/ --------------------------Awakening Podcast Social Media / Coaching My Other Podcasts https://roycoughlan.com/ Health & Wellness Products https://partnerco.world/ My Website https://partner.co/?custid=N6543249 ------------------What we Discussed: - How he got into Cyber Crime ( 2 mins) - The elderly are attacked more often ( 7 mins) - Criminal Organisations involved in the Scams (8:30 mins) - Using fake Voices (11:45 mins) - The danger of Ai and having a passphrase (14 mins) - Tech fraud scams (17 mins) - How I fell for a fraud and Remittle not worth using ( 21:45 mins) - How to Stop the Scammers (23:45 mins) - Should you have a password manager on the cloud (28:45 mins) - People threating you pretending they know what you are doing on your computer (32 mins) - Targetting Minors (33 mins) - How do we protect the kids (36 mins) - Fake news online ( 40 mins) - Getting your phone hacked ( 42 mins) - Spyware software are they dangerous (46 mins) - What happens to the scammers that are caught ( 49 mins) - Are VPN's traceable (51 mins) - How to protect your blockchain (54:45 mins) - Digital Assets will's (57 mins) How to Contact Art Boker : https://thecybersafetyguys.blog/ https://twitter.com/Computerpo https://www.instagram.com/computerpo/ https://www.facebook.com/groups/Cybersafetyguys https://www.linkedin.com/in/artbowker ------------------------------More about the Awakening Podcast:All Episodes can be found at www.awakeningpodcast.org Help Support the show through my Business Partners : Upgrade Your Brain Unleash & Use Your Uniqueness https://braingym.fitness/ --------------------------Awakening Podcast Social Media / Coaching My Other Podcasts https://roycoughlan.com/ Health & Wellness Products https://partnerco.world/ My Website https://partner.co/?custid=N6543249 Our Facebook Group can be found at https://www.facebook.com/royawakening
Les téléphones d'au moins cinq ministres français et celui d'un conseiller diplomatique du Président ont été infectés par un logiciel espion.Traduction:The mobile phones of at least five French ministers and a diplomatic advisor to President were infected by a spyware. Hosted on Acast. See acast.com/privacy for more information.
A federal judge finds NSO Group liable for hacking WhatsApp. China accuses the U.S. government of cyberattacks. The UK's Operation Destabilise uncovers a vast criminal network. An alleged LockBit developer says he did it for the money. Apache releases a security update for their Tomcat web server. Siemens issues a security advisory for their User Management Component. Italy's data protection authority fines OpenAI $15.6 million. Researchers demonstrate a method to bypass the latest Wi-Fi security protocol. Apple sends potential spyware victims to a nonprofit for help. Our guest is Sven Krasser, CrowdStrike's Senior Vice President Data Science and Chief Scientist, talking about balancing AI and human intervention. Hackers supersize their McDonald's delivery orders. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today, our guest is Sven Krasser, CrowdStrike's Senior Vice President Data Science and Chief Scientist, talking about balancing AI and human intervention. Selected Reading Judge rules NSO Group is liable for spyware hacks targeting 1,400 WhatsApp user devices (Recorded Future) Chinese cyber center points finger at U.S. over alleged cyberattacks to steal trade secrets (CyberScoop) Inside Operation Destabilise: How a ransomware investigation linked Russian money laundering and street-level drug dealing (Recorded Future) Suspected LockBit dev faces extradition to the US (The Register) Apache fixes remote code execution bypass in Tomcat web server (Bleeping Computer) Siemens Warn of Critical Vulnerability in UMC (GovInfoSecurity) Italy's Privacy Watchdog Fines OpenAI for ChatGPT's Violations in Collecting Users Personal Data (SecurityWeek) WPA3 Network Password Bypassed via MITM Attack & Social Engineering (CyberSecurityNews.com) Apple Warns Users Of iPhone Spyware Attacks—What You Need To Know (Forbes) McDonald's Delivery App Vulnerability Let Anyone Place an Order for Just $0.01 (CyberSecurityNews.com) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Corinne Fisher talks about the new Max documentary "Surveilled" and how it pertains to this weeks enemy of the state, Pegasus, and their spyware efforts that hacked a ton of phones, the arrest of Luigi Mangione in connection with the assassination of Brian Thompson, Trump getting named Time's person of the year for the second time, a look at the viral documentary chronicling Lily Philips quest to sleep with 100 men in a day and her plans to eclipse that 10 fold, a look at the litany of new laws proposed to prevent puberty blockers for Trans teens and so much more!Original Air Date: 12/10/24You can watch Without A Country LIVE every Wednesday at 9PM on our YouTube Channel at https://www.youtube.com/channel/UCjP3oJVS_BEgGXOPcVzlpVw!**PLEASE SUBSCRIBE, RATE & REVIEW ON iTUNES & SUBSCRIBE TO OUR YOUTUBE CHANNEL**Link To The Brand New Patreon!https://patreon.com/WithoutACountry?utm_medium=unknown&utm_source=join_link&utm_campaign=creatorshare_creator&utm_content=copyLinkThis week Corinne takes a look at convictions being overturned for people who purchased crack that was manufactured by police in Florida to arrest drug users. WHERE YOU CAN ANNOY US:Corinne Fisher:Twitter: https://twitter.com/PhilanthropyGalInstagram: https://www.instagram.com/philanthropygalExecutive Producer: Mike HarringtonInstagram: https://www.instagram.com/themharrington/Twitter: https://twitter.com/TheMHarringtonTheme Song By Free VicesWebsite https://www.freevices.com/Apple Music https://music.apple.com/us/artist/free-vices/1475846774Spotify https://open.spotify.com/artist/3fUw9W8zIj6RbibZN2b3kP?si=N8KzuFkvQXSnaejeDqVpIg&nd=1&dlsi=533dddc8672f46f0SoundCloud https://on.soundcloud.com/5sceVeUFADVBJr4P7YouTube https://youtube.com/channel/UCOsgEoQ2-czvD8eWctnxAAw?si=SL1RULNWVuJb8AONInstagram http://instagram.com/free_vicesENEMY OF THE STATE: Pegasus-DOC REC: SURVEILLED (HBO)https://www.democracynow.org/2024/12/4/surveilled_documentaryPegasus Spyware: https://www.theguardian.com/news/2021/jul/18/what-is-pegasus-spyware-and-how-does-it-hack-phonesGUUURLTime's Person of the Yearhttps://www.thedailybeast.com/time-hit-by-stunning-leak-as-report-outs-person-of-the-year-a-day-early/POLICE STATEhttps://www.motherjones.com/politics/2024/12/biden-trump-federal-power-police-state/[GIRL DAD CORNER]LILY PHILLIPShttps://nypost.com/2024/12/11/lifestyle/onlyfans-model-lily-phillips-cries-after-sleeping-with-101-men-in-a-day/Trans MinorsUK: https://www.nbcnews.com/nbc-out/out-politics-and-policy/britain-bans-puberty-blockers-transgender-minors-rcna183839USA: https://newsroom.ucla.edu/stories/does-constitution-allow-states-to-deny-care-to-transgender-youthhttps://www.sacbee.com/opinion/article296889354.htmlEric Adams & Solitary Confinement https://www.nytimes.com/2024/12/09/nyregion/solitary-confinement-nyc-adams.htmlCOULD BE WORSE: ASSADhttps://www.cnn.com/2024/12/10/middleeast/syria-saydnaya-prison-missing-intl-hnk/index.htmlMAIN STORY: Luigi MangioneBrian Thompson more info: https://www.dailymail.co.uk/news/article-14161297/brian-thompson-unitedhealthcare-ceo-marriage-secrets-revealed-wife.htmlWHY MANGIONE DID IT: https://www.nytimes.com/2024/12/11/nyregion/luigi-mangione-assassination-plan-notebook.html?campaign_id=190&emc=edit_ufn_20241211&instance_id=141940&nl=from-the-times®i_id=107728112&segment_id=185442&user_id=a266d281cc6f97833a8eaaec22a85914COULDN'T FUCKhttps://www.newsweek.com/luigi-mangione-friend-phycial-intimacy-back-pain-united-healthcare-shooting-brian-thompson-1999012BIPARTISAN APPROVAL, COULD WE HAVE JURY NULLIFICATION???https://en.wikipedia.org/wiki/Jury_nullificationSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
This past week, the White House detailed the scope of a massive Chinese hacking campaign that reaped information from American cell phone networks. But an HBO original documentary, "Surveilled," says some governments use commercial spyware to monitor their own citizens. To learn more, John Yang speaks with Pulitzer Prize-winning investigative journalist Ronan Farrow, who produced the documentary. PBS News is supported by - https://www.pbs.org/newshour/about/funders
Three Buddy Problem - Episode 24: In this episode, we did into Lumen/Microsoft's revelations on Russia's Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution. We also discuss Citizen Lab's findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu)and Ryan Naraine (https://twitter.com/ryanaraine).