Etienne - Tek
tek.randhome.io
Etienne - Tek
@tek.randhome.io
Technologist @ Human Rights Watch (previously Amnesty, Citizen Lab)

Malware, Threats, Online Investigations, Disinformation, Human Rights and silly memes.

On Mastodon: tek@todon.eu
Also on https://maynier.eu/
Israeli Spyware Maker NSO Gets New Owners, Leadership and Seeks to Mend Reputation https://www.wsj.com/tech/israeli-spyware-maker-nso-gets-new-owners-leadership-and-seeks-to-mend-reputation-166ac50e
November 10, 2025 at 4:06 PM
Reposted by Etienne - Tek
NEW, by me: Researchers have discovered an Android spyware that specifically targeted Samsung Galaxy phones during a nearly year-long hacking campaign. The spyware relied on a zero-day bug triggered by sending a victim a malware-laced photo via a messaging app. Victims are likely in the Middle East.
'Landfall' spyware abused zero-day to hack Samsung Galaxy phones | TechCrunch
A newly identified Android spyware targeted Galaxy devices for close to a year, including users in the Middle East, researchers exclusively tell TechCrunch.
techcrunch.com
November 7, 2025 at 12:13 PM
November 7, 2025 at 4:40 AM
I have been doing trainings to journalists on digital investigations with @gijn.org since 2023, and they just published a article on several investigations that used skills journalists learned in these sessions
gijn.org/stories/inve...
How Digital Threats Training Has Powered Innovative Cyber Investigations Around the World
Alumni of GIJN's four Digital Threats training courses have produced a number of exposés on online scams and political disinformation, from India to Kenya to the Philippines.
gijn.org
November 4, 2025 at 8:44 PM
Reposted by Etienne - Tek
ICYMI: Court documents and interviews with former staff reveal how ex-L3Harris Trenchant boss Peter Williams was able to steal and sell highly sensitive exploits to a Russian buyer for years.

"No one had any supervision over him at all," one former Trenchant employee told @lorenzofb.bsky.social.
How an ex-L3Harris Trenchant boss stole and sold cyber exploits to Russia | TechCrunch
Peter Williams sold eight exploits to a Russian zero-day broker by smuggling them from his employer’s highly secured air-gapped network. A court document, plus exclusive reporting by TechCrunch and in...
techcrunch.com
November 4, 2025 at 1:43 PM
Reposted by Etienne - Tek
It's Friday and you've probably had enough cyber... but I'm re-upping my story on this.weekinsecurity.com about how AI browsers are shipping with security bugs that put your private data (saved passwords, credit cards, browsing history) at risk.

Here's why AI browsers aren't safe for general use.
AI browsers are a hot mess of security risks
AI-enabled web browsers are putting their users' data, security, and privacy at risk from rudimentary prompt injection attacks.
this.weekinsecurity.com
October 31, 2025 at 8:37 PM
Reposted by Etienne - Tek
New incredible detail here: ICE says a match in its facial recognition app Mobile Fortify is a "definitive" determination of a person's status, and that this overrides birth certificates. This is an app ICE is using in the field to scan people

www.404media.co/ice-and-cbp-...
October 29, 2025 at 3:03 PM
Reposted by Etienne - Tek
NEW: ICE is planning to build a shadow deportation network in Texas. A proposal outlines a 24/7 transport operation run by armed contractors—turning Texas into the logistical backbone of an industrialized deportation machine.

My latest @wired.com: www.wired.com/story/ice-is...
October 30, 2025 at 4:52 PM
Reposted by Etienne - Tek
On Election Day, Tanzania is experiencing a near total Internet shutdown.

Follow connectivity in Tanzania in near realtime:
https://ioda.inetintel.cc.gatech.edu/country/TZ?from=1761655255&until=1761741655&view=view1

#keepiton
October 29, 2025 at 12:45 PM
October 23, 2025 at 5:51 PM
Unseeable prompt injections in screenshots: more vulnerabilities in Comet and other AI browsers | Brave https://brave.com/blog/unseeable-prompt-injections/
Unseeable prompt injections in screenshots: more vulnerabilities in Comet and other AI browsers | Brave
AI browsers remain vulnerable to prompt injection attacks via screenshots and hidden content, allowing attackers to exploit users' authenticated sessions.
brave.com
October 22, 2025 at 3:48 AM