Access Now - Paragon must answer for spyware use against civil society and journalists
Access Now calls on Paragon to answer for the use of its spyware in Italy against journalists, and to address oversight failures.
Mercenary spyware vendor Paragon claims it's "responsible", (unlike NSO Group)
But our investigations @citizenlab.ca show Paragon's spyware was abused in Italy ๐ฎ๐น to target civil society
@accessnow.org sent them a letter with questions, and I signed on ๐
www.accessnow.org/press-releas...
19.06.2025 13:25
๐ 11
๐ 7
๐ฌ 0
๐ 1
Cyber weapons in the Israel-Iran conflict may hit the US
: With Tehranโs military weakened, digital retaliation likely, experts tell The Reg
"Typically the Iranians have deployed wipers against targets in critical infrastructure and other organizations," Google threat intelligence group chief analyst John Hultquist told The Register. "We will probably see more of that in Israel and we could see it in the US as well."
13.06.2025 22:15
๐ 3
๐ 1
๐ฌ 0
๐ 1
NASA simulation for what you'd see while plunging into a black hole:
youtu.be/chhcwk4-esM
There's actually a lot left to see after passing the event horizon!
20.05.2025 04:04
๐ 422
๐ 87
๐ฌ 31
๐ 7
#ESETresearch has published its latest APT Activity Report, covering October 2024 to March 2025 (Q4 2024โQ1 2025). China-aligned groups like Mustang Panda and DigitalRecyclers continued their espionage campaigns targeting the EU government and maritime sectors. 1/2
19.05.2025 12:30
๐ 9
๐ 5
๐ฌ 1
๐ 0
Reads Chinese influence operations and disinformation campaigns, Bellingcat Stage Talk Thursday 08/05
Learn about monitoring inauthentic accounts and conducting investigations into Foreign Information Manipulation and Interference (FIMI) in our next Stage Talk on Thursday, 4pm CEST/10am EDT. We're joined by the @doublethinklab.bsky.social team live in our Discord Server
discord.gg/FGq4XfYm?eve...
06.05.2025 16:34
๐ 126
๐ 44
๐ฌ 1
๐ 2
Layoffs at CrowdStrike. Iโm safe, but if youโre looking for IR consultants I know a bunch of fucking amazing ones that will be looking for jobs ๐ซ
07.05.2025 14:54
๐ 34
๐ 24
๐ฌ 2
๐ 1
Diagram that shows:
- E2EE chat logs between TM SGNL and Signal
- TM SGNL sends data to archive server using HTTPS API
- Archive server sends data to destinations using SMTP, SFTP, or Microsoft 365
I'm analyzing the TM SGNL source code and will publish findings tomorrow. But the for a sneak peak, here's how it seems TeleMessage's system works:
There's E2EE between TM SGNL and Signal, but NOT between TM SGNL and archive destinations. TM's archive server can read the chat logs.
Stay tuned.
05.05.2025 20:32
๐ 107
๐ 39
๐ฌ 8
๐ 10
Ever needed a graceful way to say "no"?
This tiny API returns random, generic, creative, and sometimes hilarious rejection reasons perfectly suited for any scenario: personal, professional, student life, dev life, or just because.
Built for humans, excuses, and humor.
No as a service
โฉDemo naas.isalman.dev/no
Repo github.com/hotheadhacke...
01.05.2025 10:00
๐ 271
๐ 66
๐ฌ 11
๐ 3
Graphic illustrating the MintsLoader attack chain.
Recorded Future Insikt Group researchers analyse MintsLoader, a malicious loader deployed through multiple infection vectors that commonly deploys second-stage payloads such as GhostWeaver, StealC, and a modified BOINC client. www.recordedfuture.com/research/unc...
01.05.2025 10:05
๐ 0
๐ 1
๐ฌ 0
๐ 0
Graphical illustration of the SLAAC attack carried out by Spellbinder
ESET researchers provide an analysis of Spellbinder, a lateral movement tool for performing adversary-in-the-middle attacks, used by TheWizards, a China-aligned threat actor. www.welivesecurity.com/en/eset-rese...
01.05.2025 10:07
๐ 1
๐ 1
๐ฌ 0
๐ 0
Graph showing KongTuke activities from September 2024 to March 2025
Trustwave researchers observed a notable increase in NodeJS-based backdoor deployments across multiple malware campaigns, including KongTuke, Fake CAPTCHA schemes, Mispadu, and Lumma stealers. www.trustwave.com/en-us/resour...
01.05.2025 10:09
๐ 0
๐ 1
๐ฌ 0
๐ 0
Ako ransomware affiliate gets five years in prison
30.04.2025 21:21
๐ 7
๐ 3
๐ฌ 0
๐ 0
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
ESET researchers publish an analysis of Spellbinder, a lateral movement tool used to perform adversary-in-the-middle attacks.
#ESETResearch analyzed the toolset of the China-aligned APT group that we have named #TheWizards. It can move laterally on compromised networks by performing adversary-in-the-middle (AitM) attacks to hijack software updates. www.welivesecurity.com/en/eset-rese... 1/6
30.04.2025 11:30
๐ 20
๐ 12
๐ฌ 2
๐ 0
Rocky โค๏ธ
17.04.2025 22:26
๐ 366
๐ 60
๐ฌ 6
๐ 7
China swipes at NSA for alleged Asian Winter Games hack
: Beijing claims NSA went for gold in offensive cyber, got caught in the act
After years of the West naming and shaming nation-state hackers I have wondered (and written about) the lack of similar finger pointing back at the US etc. This new shift from China to out western hackers for cyber spying is overall a good thing for transparency. www.theregister.com/2025/04/15/c...
17.04.2025 09:24
๐ 8
๐ 5
๐ฌ 1
๐ 0
NSO lawyer names Mexico, Saudi Arabia, and Uzbekistan as spyware customers behind 2019 WhatsApp hacks | TechCrunch
This is the first time representatives for the spyware maker have publicly named its government customers.
NEW: In a hearing last week, an NSO Group lawyer said that Mexico, Saudi Arabia, and Uzbekistan were among the governments responsible for a 2019 hacking campaign against WhatsApp users.
This is the first time representatives of the spyware maker admit who its customers are.
16.04.2025 15:44
๐ 41
๐ 22
๐ฌ 2
๐ 1