Bambino0710
banner
bambino0710.bsky.social
Bambino0710
@bambino0710.bsky.social
Lawyer, Computer Law and New Technologies Specialist, E|NSA, C|EH, C|HFI, E|CSA/LPT. Security Analyst and Researcher about CyberDefense and CyberSecurity.
NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware
thehackernews.com/2025/05/nso-...
NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware
NSO must pay $168M after targeting 1,400+ users via WhatsApp zero-day flaw, court finds illegal spyware use.
thehackernews.com
May 7, 2025 at 10:55 AM
Reposted by Bambino0710
Signal chat app clone used by Signalgate's Waltz was apparently an insecure mess
TeleMessage probes 'hack' of Signal clone used by Feds
: No, really? That's a shocking surprise
buff.ly
May 6, 2025 at 8:16 PM
SEC Priorities Regarding Cybersecurity Enforcement in the Second Trump Administration
corpgov.law.harvard.edu/2025/03/26/s...
SEC Priorities Regarding Cybersecurity Enforcement in the Second Trump Administration
The SEC recently announced the creation of a Cyber and Emerging Technologies Unit (CETU) that will focus on fraudulent conduct in cybersecurity, ...
corpgov.law.harvard.edu
March 27, 2025 at 3:13 PM
Android Apps Use Bluetooth and WiFi Scanning to Track Users Without GPS
cyberinsider.com/android-apps...
Android Apps Use Bluetooth and WiFi Scanning to Track Users Without GPS
Thousands of Android apps covertly collect location data using Bluetooth and WiFi beacons, allowing tracking and profiling of users.
cyberinsider.com
March 25, 2025 at 1:42 AM
Disappearing Evidence—Why Your Phone Can’t Wait For Forensics
www.forbes.com/sites/larsda...
Disappearing Evidence—Why Your Phone Can’t Wait For Forensics
Modern smartphone evidence vanishes fast. Preserve now or risk losing it forever.
www.forbes.com
March 24, 2025 at 3:30 PM
U.S. intel vets helped crypto firm soar, unaware of infamous hacker behind it
Employees said they weren’t told that the co-founder of Unciphered was a once-celebrated spyware foe who dropped out of the public eye after being accused of sexual assault.
archive.ph/DYlup
archive.ph
March 23, 2025 at 9:06 PM
Data Preservation on Mobile Devices: The Quicker, The Better
www.forensicmag.com/3425-Feature...
Data Preservation on Mobile Devices: The Quicker, The Better
Recent updates to mobile phone technology have changed the current playing field in terms of ensuring the most complete technology.
www.forensicmag.com
March 20, 2025 at 5:12 PM
Reposted by Bambino0710
The Transformative Role of Artificial Intelligence in Cybersecurity www.jdsupra.com/legalnews/th... #AI
The Transformative Role of Artificial Intelligence in Cybersecurity | JD Supra
AI-Powered: Corporate Strategies Versus Hacker Tactics - How can companies use artificial intelligence to respond more efficiently to...
www.jdsupra.com
March 18, 2025 at 2:54 PM
Reposted by Bambino0710
Image Verification Assistant

image forensics tools + highly detailed metadata analyzer + two dozen explanatory examples (with explanations of how to work with the tools for image forensics and what different distortions mean

mever.gr/forensics/

Tip by Aidan Raney
March 17, 2025 at 8:04 AM
Eavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR (PDF)
www.ndss-symposium.org/wp-content/u...
www.ndss-symposium.org
March 16, 2025 at 5:07 PM
AI Search Has A Citation Problem

We Compared Eight AI Search Engines. They’re All Bad at Citing News.

www.cjr.org/tow_center/w...
AI Search Has A Citation Problem
We Compared Eight AI Search Engines. They’re All Bad at Citing News.
www.cjr.org
March 16, 2025 at 11:34 AM
AI coding assistant refuses to write code, tells user to learn programming instead

Cursor AI tells user, "I cannot generate code for you, as that would be completing your work."

arstechnica.com/ai/2025/03/a...
AI coding assistant refuses to write code, tells user to learn programming instead
Cursor AI tells user, “I cannot generate code for you, as that would be completing your work.”…
arstechnica.com
March 16, 2025 at 11:33 AM
All about cyber policies worldwide

Cyber Policy Portal
cyberpolicyportal.org

UNIDIR Cyber Policy Portal Database
database.cyberpolicyportal.org
March 16, 2025 at 11:31 AM
Reposted by Bambino0710
Image Forensic Tools

If you're reading about #osint on Linkedin, you probably know Aidan Raney

In March, he started OSINT Insider newsletter. The first issue is Image Forensic Tools. Read about Forensically Beta, Image Verification Assistant, Memery and others
March 16, 2025 at 11:01 AM
CISOs: Stop trying to do the lawyer’s job
CISOs are trained to fix problems. Lawyers are trained to find them. The two must work together to address complex challenges like breaches, compliance, or the ethics of emerging technologies.
www.csoonline.com/article/3811...
CISOs: Stop trying to do the lawyer’s job
CISOs are trained to fix problems. Lawyers are trained to find them. The two must work together to address complex challenges like breaches, compliance, or the ethics of emerging technologies.
www.csoonline.com
March 15, 2025 at 11:49 PM
Trigon – A New Exploit Revealed for iOS 0-Day kernel Vulnerability
cybersecuritynews.com/ios-0-day-ke...
Trigon - A New Exploit Revealed for iOS 0-Day kernel Vulnerability
Security researchers have uncovered a sophisticated new kernel exploit targeting Apple iOS devices, dubbed Trigon.
cybersecuritynews.com
March 10, 2025 at 6:21 PM
Police risk losing society’s trust in fight against cybercrime, warns Europol chief
therecord.media/eurpol-chief...
Police risk losing society’s trust in fight against cybercrime, warns Europol chief
Catherine De Bolle, the chief of Europol, said at the Munich Cyber Security Conference that societies must understand why law enforcement agencies need new powers to fight increasingly sophisticated c...
therecord.media
February 21, 2025 at 2:31 AM