Mr. Curious! :mastodon:

Infosec nerd | watching 🧐 Surveillance Capitalism | reverse engineering enthusiast | former cricketer 🏏 | physics educated | privacy advocacy

Join 🔗
t.me/cyberhues
Mr. Curious! :mastodon: boosted:
br00t4cbr00t4c
2025-11-18
Mr. Curious! :mastodon:CyberHues
2025-11-15

India is planning to enable direct satellite connectivity for mobile phones, potentially bringing ubiquitous internet to remote areas. The Department of Telecommunications will seek recommendations from TRAI on a framework for these direct-to-device (D2D) services, including pricing. This move aims to make phone connectivity as seamless as 4G/5G, though telcos have raised concerns about business impact.

Mr. Curious! :mastodon: boosted:
2025-11-14

LibreOffice 25.8.3 is now available! All users are recommended to update, to get the latest bugfixes and compatibility improvements: blog.documentfoundation.org/bl #foss #openSource #freesoftware

LibreOffice 28.5.3 banner
Mr. Curious! :mastodon: boosted:
Meduza in Englishmeduza_en@masto.ai
2025-11-14

Russia is temporarily cutting mobile Internet access for SIM cards that connected to foreign networks while roaming, hoping to disrupt Ukrainian drone operations. Here’s how the system works and why it won’t be enough.
meduza.io/en/feature/2025/11/1

Mr. Curious! :mastodon: boosted:
br00t4cbr00t4c
2025-11-14
Mr. Curious! :mastodon: boosted:
Lorenzo Franceschi-Bicchierailorenzofb@infosec.exchange
2025-11-14

The Cyber Police Department of Ukraine sent this email to me, @zackwhittaker, and some other cyber journalists.

Basically, it seems they are asking for help going after hackers expecting journalists to share information we would never share with law enforcement. Nope, this is not how it works.

Mr. Curious! :mastodon:CyberHues
2025-11-14

As Paris commemorates ten years since the November 13 attacks that left 132 people dead, terrorism analyst Michael S Smith II says that 'there still remains a great deal that can be done by social media companies & internet companies to help blunt the influence capacities of groups like ISIS'.

🔗 youtu.be/OJrIOPfry2s

Mr. Curious! :mastodon:CyberHues
2025-11-13

Getting stuck in space sounds like the plotline from a science fiction film—but that’s what’s happened to three Chinese astronauts who were due to return to Earth last week. The Shenzhou-20 crew has been living on China’s Tiangong space station since April. But damage to the spacecraft caused by junk floating in orbit has delayed their return.

🔗 youtu.be/TJd7eKYaoYA

Mr. Curious! :mastodon:CyberHues
2025-11-13

TL;DR

Google is working to make it easier for ‘experienced users’ to install apps made by unverified developers.

The company is building a new ‘advanced flow’ that allows these users to accept the risks of installing unverified apps.

Previously, the only permitted method for experienced users to install apps from unverified developers was to use ADB.

Mr. Curious! :mastodon:CyberHues
2025-11-12

US President Donald Trump on Monday defended allowing foreign students to study in the United States, describing it as “good for business” practice that supports the country’s higher education system.

Speaking in an interview with Fox News host Laura Ingraham, Trump said cutting international student numbers would be “financially destructive” for American universities.

Mr. Curious! :mastodon: boosted:
Lorenzo Franceschi-Bicchierailorenzofb@infosec.exchange
2025-11-10

NEW: I tried to explain why there are so many victims of spyware, despite the fact that its makers have been telling us for years that the tech is only intended to be used in limited cases.

There are several reasons, including how the spyware systems are designed, how powerful and easy to use they are.

techcrunch.com/2025/11/10/why-

Mr. Curious! :mastodon: boosted:
2025-11-07

'Surveillance under Surveillance' · A proj. mapping the ever-present cameras & guards that are watching you — almost everywhere.

👉🏻 sunders.hamburg.ccc.de/

The image is a screenshot of a digital map interface, dominated by a detailed view of Hamburg, Germany, and the surrounding areas, including numerous waterways and roads. Scattered across the map are small, numbered icons of varying colors—primarily red, yellow, and blue—representing surveillance points, potentially cameras or guards. A sidebar on the right side of the screen provides information about the surveillance system, with a title reading "Surveillance." The map displays cities, towns, and bodies of water. The bottom of the image includes branding and copyright information, and reads "Leaflet | OpenStreetMap contributors." 

The sidebar text verbatim reads: “Surveillance shows you cameras and guards – watch anywhere. You can see where they are located and, if available, what type they are, the area observe, or other interesting facts. Different colors and sizes give you a quick overview about the indexed surveillance entries. Click on those icons to get the available information.” Beneath that is a key with icons labeled: “Camera – no further information,” “Fixed camera – usually observing a limited area,” and “Panning camera – usually able to observe various areas.”
Mr. Curious! :mastodon:CyberHues
2025-11-07

@tek Wonders ✨ of Technology 😂

Mr. Curious! :mastodon: boosted:
2025-11-06

Journalists in Europe found it was "easy" to spy on top European Union officials using commercially obtained location data sold by data brokers, despite the continent having some of the strongest data protection laws in the world. techcrunch.com/2025/11/04/phon

Mr. Curious! :mastodon: boosted:
Etienne / Tektek@todon.eu
2025-11-06

I have been doing training to journalists since 2023 with @GIJN on digital investigations, and they just published a article on several investigations that used skills journalists learned in these sessions (it is so great to see the direct consequences of a training).
How Digital Threats Training Has Powered Innovative Cyber Investigations Around the World
gijn.org/stories/investigative

Mr. Curious! :mastodon:CyberHues
2025-10-29

@tek the question is who was supporting them to stay in power. That will also give us answers about the source of Tech they are using to activate censorship. Unmasking is the ultimate form of theoretical digital rights advocacy. Practical form would be to develop anti-Censirship Technologies.

Mr. Curious! :mastodon: boosted:
Cybersecurity & cyberwarfarecybersecurity@poliverso.org
2025-10-29

ClayRat: lo spyware che colpisce gli utenti Android con propagazione autonoma

La campagna spyware ClayRat si sta espandendo rapidamente e prende di mira sempre piĂš gli utenti Android. Secondo Zimperium, il malware si sta diffondendo attivamente tra gli utenti russi attraverso falsi siti web e canali Telegram, camuffandosi da app popolari come WhatsApp, TikTok, YouTube e Google Foto.

Una volta installato, il malware ottiene l’accesso a un’ampia gamma di funzioni, tra cui la lettura di SMS e notifiche, la visualizzazione dell’elenco delle app installate, lo scatto di foto con la fotocamera frontale, l’effettuazione di chiamate e l’invio di messaggi.

La caratteristica principale di ClayRat è il suo aggressivo meccanismo di autopropagazione. Il malware invia automaticamente link dannosi a tutti i contatti della vittima, trasformando il dispositivo infetto in un hub di distribuzione attivo. Ciò consente ai creatori della campagna di scalare rapidamente i loro attacchi senza l’intervento umano.

Negli ultimi 90 giorni, gli specialisti hanno identificato almeno 600 campioni di spyware unici e circa 50 downloader. Ogni nuova versione include ulteriori livelli di stealth, consentendo di aggirare i meccanismi di difesa.

La distribuzione inizia tramite siti web falsi che reindirizzano le vittime ai canali Telegram controllati dagli aggressori. Questi canali offrono file APK dannosi con presunte alte percentuali di download e recensioni positive. Di particolare rilievo è la falsa app “YouTube Plus” con “funzionalità premium”, che può essere installata anche su dispositivi con Android 13 o versioni successive, nonostante le limitazioni integrate nella piattaforma.

Alcune versioni di ClayRat si mascherano da app legittime e agiscono esclusivamente come programmi di installazione. Sullo schermo viene visualizzata una finta finestra di aggiornamento di Google Play, mentre il codice dannoso crittografato è nascosto nelle risorse interne dell’app. Questo approccio abbassa la guardia dell’utente e aumenta la probabilità di un’infezione riuscita. Una volta attivato, il malware richiede l’autorizzazione per essere impostato come app SMS predefinita, ottenendo pieno accesso a messaggi e notifiche.

ClayRat utilizza richieste HTTP standard per comunicare con l’infrastruttura di controllo e può trasmettere informazioni dettagliate sul dispositivo. Le sue funzioni includono anche l’acquisizione di foto, l’invio di un elenco delle applicazioni installate e la gestione delle chiamate. Il potenziale pericolo di questo malware non risiede solo nelle sue capacità di spionaggio, ma anche nella sua capacità di trasformare un dispositivo infetto in uno strumento di distribuzione automatizzata, il che ne complica notevolmente il contenimento.

Secondo Google, le versioni attive di ClayRat sono giĂ  bloccate sui dispositivi che eseguono Google Play Services grazie a Play Protect. Tuttavia, gli aggressori continuano ad adattarsi e la minaccia rimane rilevante.

Nel frattempo, i ricercatori dell’Università del Lussemburgo e dell’Università Cheikh Anta Diop hanno esaminato le app preinstallate sugli smartphone Android economici venduti in Africa. Dei 1.544 file APK analizzati, 145 hanno esposto dati sensibili, 249 hanno fornito accesso non protetto a componenti critici e 226 hanno eseguito comandi con privilegi elevati. Ciò indica una vulnerabilità di sistema su questi dispositivi e ulteriori rischi per gli utenti.

L'articolo ClayRat: lo spyware che colpisce gli utenti Android con propagazione autonoma proviene da Red Hot Cyber.

Mr. Curious! :mastodon:CyberHues
2025-10-27

@tek Transparency report for the period 1 January 2025 to 30 September 2025

Fulfilled requests from India for IP address and/or phone number:
Q1 — 9197
Q2 — 9653
Q3 — 8867

Affected users:
Q1 — 9941
Q2 — 11041
Q3 — 9820

All requests are processed according to section 8.3 of the Privacy Policy

The next transparency report will be published in January 2026.

Mr. Curious! :mastodon: boosted:
Natasha Jay 🇪🇺Natasha_Jay@tech.lgbt
2025-10-26

The German company that makes the mechanical ladder used in the Louvre heist has used the image to advertise, with the heading 'When you need to move fast'

"The BĂścker Agilo transports your treasures weighing up to 400kg at 42m/min - quiet as a whisper."

#louvrerobbery #Louvre

Image of the mechanical ladder outside the Louvre Text below says WENN'S MAL WIEDER SCHNELL GEHEN MUSS (When you need to move fast) Underneath is more German text which translates as "The BĂścker Agilo transports your treasures weighing up to 400kg at 42m/min - quiet as a whisper."
Mr. Curious! :mastodon: boosted:
2025-10-26

For HotTopics' CISO Insights series (and my debut as a freelancer for the publication) I examined the role of the CISO and where accountability lies in the aftermath of a data breach.

Of course, I spoke to some actual CISOs to get their opinions on the matter!

The TLDR is it's not simple: There's a big difference between a CISO being deemed to be negligent and a CISO doing everything they can to keep their organisation safe. And naturally, the availability of a budget plays a big part of it.

hottopics.ht/insights/ciso-acc

#cybersecurity

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst