Tag: Security

  • SS7 Flaw Exploited to Track Phone Locations

    SS7 Flaw Exploited to Track Phone Locations

    Surveillance Vendor Exploits SS7 Flaw for Location Tracking

    A surveillance vendor has exploited a new SS7 attack to track people’s phone locations. This exploit raises significant concerns about privacy and security in modern telecommunications.

    Understanding the SS7 Vulnerability

    Signaling System No. 7 (SS7) is a protocol suite that allows mobile networks to exchange the information needed for roaming and billing. Security researchers have known about vulnerabilities within SS7 for years, allowing attackers to intercept calls, texts, and track location data.

    How the Attack Works

    • Attackers exploit weaknesses in SS7 to send commands to the mobile network.
    • These commands query the network for the target’s location.
    • The network responds with the geographical location of the mobile phone.

    Implications of Location Tracking

    Tracking phone locations without consent has serious implications:

    • Privacy Violation: Individuals’ movements are constantly monitored.
    • Security Risks: Location data can be used for stalking or physical harm.
    • Abuse of Power: Surveillance vendors might misuse this information.

    Mitigation and Prevention

    Mobile network operators and regulatory bodies must take steps to mitigate SS7 vulnerabilities.

    • Enhanced Monitoring: Implement systems to detect and block suspicious SS7 traffic.
    • Security Audits: Conduct regular audits of SS7 infrastructure.
    • Protocol Updates: Upgrade to more secure protocols to replace SS7.
  • OpenAI Rolls Out Deny By Default Security

    OpenAI Rolls Out Deny By Default Security

    OpenAI Enhances Security Measures for Data Protection

    OpenAI is taking significant steps to bolster its security infrastructure, aiming to protect its systems and data from unauthorized access and potential breaches. These enhanced measures reflect the increasing importance of data security in the field of artificial intelligence, especially as models become more sophisticated and integrated into various applications.

    Focus on Data Protection

    First, OpenAI uses regular security audits and compliance checks as a core part of its security strategy. Specifically, both internal teams and third-party experts evaluate current controls and pinpoint areas for improvement . Moreover, the company maintains compliance with industry standards like SOC 2 Type II, GDPR, and CCPA, which reinforces its security posture community.hpe.com. Consequently, these rigorous reviews help OpenAI detect vulnerabilities early and adapt to evolving regulations.

    Access Control and Authentication

    First, OpenAI emphasizes access control and strong authentication to safeguard its systems. Specifically, it mandates multi-factor authentication MFA for all users before accessing critical data or systems. This requirement significantly reduces the risk of unauthorized access even if one factor is compromised .

    Next, OpenAI uses role-based access control RBAC. Roles map directly to job functions, and each user gets only the minimal permissions needed for their duties. This ensures that compromised accounts have limited power .

    Moreover, the principle of least privilege guides all access decisions. It limits permissions to the bare minimum needed to perform tasks .

    Additionally, OpenAI implements access reviews and audits. Teams routinely check and remove outdated permissions to maintain compliance and security .

    Together, these measures strengthen OpenAI’s security by reducing attack vectors. They also support compliance with industry standards and boost resilience against threats.

    Threat Detection and Monitoring

    To proactively identify and respond to potential security threats, OpenAI is deploying advanced threat detection and monitoring systems. These systems use machine learning algorithms to analyze network traffic, system logs, and user behavior, identifying anomalous patterns that may indicate malicious activity. Real-time alerts notify security teams of potential incidents, enabling them to respond quickly and mitigate any damage. Effective threat detection strategies are vital in today’s cybersecurity landscape, as discussed in recent cybersecurity reports.

    Security Audits and Compliance

    First, regular security audits and compliance checks form the backbone of OpenAI’s security strategy. Specifically, these audits conducted by both internal teams and external third-party experts assess the effectiveness of existing security controls and spot areas needing improvement . Moreover, OpenAI adheres to industry standards and regulatory frameworks, including SOC 2 Type II, GDPR, and CCPA, ensuring its security posture remains both robust and compliant . Consequently, this rigorous approach helps OpenAI stay ahead of evolving threats and regulatory demands, reinforcing its credibility in AI security.

    Employee Training and Awareness

    Recognizing that human error causes up to 95% of cybersecurity breaches, OpenAI is therefore investing in comprehensive employee training and awareness programs. Specifically, these sessions educate staff on phishing scams, social engineering tactics, and other cybersecurity threats empowering them to detect and avoid risks effectively . Moreover, OpenAI fosters a security-first culture that encourages proactive reporting and continuous learning. Ultimately, this approach helps strengthen its overall security posture and reduce vulnerabilities caused by human factors.

    Incident Response Plan

    First, OpenAI maintains a well-defined incident response plan to quickly contain security incidents. Specifically, the plan outlines steps to minimize damage and restore operations promptly. Moreover, the team conducts regular testing and simulations, such as tabletop exercises and breach-and-attack drills, to ensure readiness. As a result, these proactive measures help the security teams respond effectively to real-world incidents and continuously improve the plan.

  • SpaceX Faces Lawsuit Harassment and Security

    SpaceX Faces Lawsuit Harassment and Security

    SpaceX Faces Lawsuit: Harassment and Security Claims

    SpaceX now faces a lawsuit from Jenna Shumway, a former senior security manager. She alleges that her boss, Daniel Collins, harassed her, retaliated, and violated security protocols at the company’s government programs unit .

    Specifically, Shumway claims Collins stripped her of duties, passed her over for promotion, and ultimately pushed her out in October 2024 . Furthermore, she states he broke top-secret clearance rules and hid those violations from federal authorities

    Meanwhile, the complaint adds that Collins also targeted other female staff. He allegedly prevented them from fulfilling security duties, made inappropriate remarks, and organized post-work events with uncomfortable proposals .

    Additionally, Shumway and others reported these issues to HR. However, they say SpaceX failed to act. Instead, HR recommended avoiding Collins, without investigating or addressing the complaints .

    Shumway filed in Los Angeles County Superior Court in May. Then, SpaceX moved it to federal court on June 30 under case number 2:22‑cv‑05959 bamlawca.com Now, she seeks unspecified damages.

    Allegations of Harassment and Retaliation

    First, the former manager claims they faced harassment while working at SpaceX. Additionally, they say that after reporting the abuse, the company retaliated against them. Specifically, the lawsuit highlights a hostile work environment and unfair treatment. Moreover, it adds that SpaceX denied them responsibilities and promoted a toxic, fear-based workplace culture .

    Furthermore, the complaint points to security issues, including violations of top-secret clearance protocols. Consequently, Shumway alleges that management ignored federal review warnings and dismissed her concerns .

    Security Violations Claim

    In addition to harassment and retaliation, the lawsuit also brings forth serious allegations of security violations. The specific details of these violations remain under legal review but could potentially impact SpaceX’s operational safety and compliance.

    The lawsuit is ongoing, and SpaceX has not yet released an official statement regarding the allegations. The legal proceedings will likely reveal more details as the case progresses. This situation highlights the importance of workplace safety and security compliance within the aerospace industry.

  • Why Stalkerware Apps Risk Your Security

    Why Stalkerware Apps Risk Your Security

    Stalkerware Apps: Privacy Risks & Why Avoid Them

    First, stalkerware apps let someone secretly track your location, read messages, record calls, and access photos or videos without your knowledge or consent. They often hide in plain sight on your device .

    Moreover, these apps frequently suffer data breaches. In February 2025, Spyzie, Cocospy, and Spyic leaked millions of victims’ messages, photos, location logs, and even email addresses . Similarly, SpyX exposed nearly 2 million users, including Apple customers, putting sensitive personal data at risk

    Additionally, developers market these tools as “parental control” or “anti-theft” apps. However, abusers exploit them to stalk intimate partners and children—turning them into instruments of domestic abuse .

    Consequently, using stalkerware not only violates trust and privacy—it can also expose you and your loved ones to data exploitation by hackers and legal liabilities.

    .

    What is Stalkerware?

    Stalkerware, also known as spouseware or monitoring apps, operates in the background of your device. It secretly collects data and sends it to the installer without your knowledge. Unlike legitimate parental-control apps, which require user consent, stalkerware remains hidden and runs covertly. Consequently, it becomes a powerful tool for abuse and harassment.

    Furthermore, cybersecurity experts—such as Eva Galperin from the Electronic Frontier Foundation—have raised serious alarms. They warn that stalkerware often navigates legal grey zones and evades detection by antivirus software. They also note that its use has surged amid increasing domestic abuse cases and remains dangerously prevalent

    The Dangers of Using Stalkerware

    Privacy Violation

    First, stalkerware runs silently in the background and secretly collects data. It can track your real-time location, read messages and call logs, capture photos, take screenshots, and even access your microphone or camera—all without your consent .

    Moreover, these apps often hide as system utilities or disguised software. Consequently, victims stay unaware they’re being monitored—making these tools ideal for stalking and harassment .

    Additionally, stalkerware uploads your sensitive info—like GPS routes, personal conversations, and media files—to servers controlled by whoever installed it. Unfortunately, these servers frequently suffer leaks, exposing data to malicious actors .

    • Location Tracking: Monitoring movements in real-time.
    • Message Interception: Reading SMS, emails, and social media chats.
    • Call Recording: Listening to and recording phone calls.
    • Access to Media: Viewing photos and videos stored on the device.

    Security Risks

    Beyond the ethical and legal implications, stalkerware poses significant security risks:

    • Data Leaks: Stalkerware apps are often poorly secured, making the collected data vulnerable to breaches and leaks. Reports of stalkerware companies experiencing data breaches are common.
    • Hacking Target: Once a device is compromised with stalkerware, it becomes an easier target for further hacking attempts.
    • Financial Risks: Some stalkerware apps require subscriptions or payments, which can expose financial information to potential theft.

    Legal Consequences

    Using stalkerware can have serious legal ramifications. Depending on the jurisdiction, it may violate laws related to:

    • Wiretapping: Illegally intercepting private communications.
    • Computer Fraud and Abuse: Unauthorized access to computer systems.
    • Privacy Laws: Violating personal privacy rights.

    First, several countries and US states now ban using devices to track someone without their consent. For example, Pennsylvania classifies unauthorized Bluetooth trackers like AirTags as a third‑degree misdemeanor—punishable by up to 90 days in jail

    Moreover, many US states—including California, Florida, Texas, and Alaska—prohibit installing electronic tracking devices on vehicles without owner permission . Additionally, Connecticut outlaws such tracking as a felony if it causes fear or intimidation

    Meanwhile, in Europe—such as France—geolocating someone without consent can result in up to one year in prison and €45,000 fines; penalties double in intimate relationships .

    Similarly, New South Wales (Australia) makes it a crime to use listening or tracking devices without warrants, risking up to five years in prison .

    Consequently, it’s essential to learn your local laws on surveillance and tracking. Otherwise, you risk criminal charges, civil suits, and hefty fines.

    How to Protect Yourself

    Protecting yourself from stalkerware involves a combination of awareness and proactive security measures:

    • Secure Your Devices: Use strong passwords or passcodes and enable two-factor authentication on all accounts.
    • Review App Permissions: Regularly check app permissions on your smartphone to ensure no apps have access to data they shouldn’t.
    • Install Anti-Malware Software: Use reputable anti-malware software to detect and remove stalkerware.
    • Be Wary of Suspicious Activity: Look for signs of stalkerware, such as unexplained battery drain, increased data usage, or unfamiliar apps on your device. You can refer to resources from organizations like Kaspersky for more info.
    • Regularly Update Software: Keep your operating system and apps up to date to patch security vulnerabilities.
  • Rippling Employee Claims Surveillance, Fears for Safety

    Rippling Employee Claims Surveillance, Fears for Safety

    Rippling Employee Alleges Surveillance, Wife Concerned

    A Rippling employee reports that unidentified individuals have been following him, causing considerable distress and fear for his wife’s safety. This unsettling situation raises questions about potential threats and security within the tech industry.

    Details of the Alleged Surveillance

    The employee, who remains unnamed for security reasons, claims the surveillance has been ongoing for an unspecified period. The individuals involved have not been identified, and their motives are currently unknown. This lack of clarity amplifies the anxiety and uncertainty surrounding the situation.

    Impact on Personal Life

    The employee’s wife is reportedly deeply concerned about the potential danger. The feeling of being watched can create a significant amount of stress and fear, impacting their daily lives and overall well-being.

    Rippling’s Response

    It is currently unknown if Rippling is aware of the situation or has taken any action to address the employee’s concerns. More information will be added as it becomes available. Many companies offer security resources to help protect their employees from possible threats.

    Implications for Tech Security

    This incident highlights potential security risks faced by individuals within the tech industry. It prompts discussion about the measures companies and employees can take to safeguard themselves from external threats and maintain personal safety.

  • Facebook Add Passkey Support on Android and iOS

    Facebook Add Passkey Support on Android and iOS

    Facebook Embraces Passkeys on Android and iOS

    Meta is enhancing security for its users! Soon, Facebook will roll out support for passkeys on both Android and iOS platforms. This move aims to simplify the login process and bolster account security.

    What are Passkeys?

    Passkeys represent a significant step forward in authentication technology. They replace traditional passwords with cryptographic key pairs. A private key is stored securely on your device, and a public key is stored with the online service. When you log in, your device uses the private key to prove your identity. This method is inherently more secure against phishing and other password-based attacks.

    How Passkeys Improve Security

    • Phishing Resistance: Passkeys are tied to the website or app, so they cannot be tricked into working on a fake site.
    • Strong Authentication: They leverage biometric or device PIN authentication, making them much harder to compromise than passwords.
    • Simplified Login: No more typing or remembering complex passwords. Use your fingerprint, face, or device PIN.

    Rolling Out Passkey Support

    Facebook Begins Rolling Out Passkeys on Mobile 🔐

    Facebook will soon introduce passkeys on Android and iOS. First, they’ll arrive on the Facebook app. Then, support will expand to Messenger in the coming months. socialmediatoday.com

    Why It Matters

    Passkeys rely on biometrics or PINs, making logins safer. They resist phishing and password theft. Also, they work with Meta Pay to autofill payments securely. about.meta.com

    Rollout Plan

    • Phase 1: Android & iOS Facebook users get passkeys.
    • Phase 2: Messenger support follows later.
    • Phase 3: Full support across Meta’s ecosystem, including Meta Pay. stocktwits.com

    Setup is Simple

    Go to Accounts Center in Settings. Then, tap “Passkey” to register using biometrics or a device PIN. You’ll still have a fallback: regular passwords, security keys, or 2FA. about.fb.com

    Enhanced Security & User Convenience

    Passkeys use cryptographic key pairs stored on your device. They never send secrets over the network. Therefore, they stop phishing attempts and stolen credentials. fidoalliance.org

    Bottom Line

    Facebook’s shift to passkeys boosts both security and usability. Plus, phased rollout means smooth adoption. Next, expect Messenger integration and Meta Pay support. Watch for updates in your app!

  • Apple Patches Zero-Day Exploited by Spyware

    Apple Patches Zero-Day Exploited by Spyware

    Apple Fixes New iPhone Zero-Day Bug Used in Paragon Spyware Hacks

    Apple has recently addressed a significant security vulnerability affecting iPhones. The tech giant released updates to patch a zero-day exploit that was actively used in spyware attacks. This vulnerability allowed attackers to potentially gain unauthorized access to devices. Let’s delve into the details of this security fix and its implications.

    What is a Zero-Day Bug?

    A zero-day bug is a software vulnerability that is unknown to the vendor (in this case, Apple) and may be actively exploited by attackers. Because the vendor is unaware, there’s no patch available, making these bugs particularly dangerous. Once discovered, vendors scramble to create a fix, as Apple has done.

    The Vulnerability and Its Impact

    The specific vulnerability allowed attackers to inject malicious code and potentially compromise an iPhone. Security researchers discovered that this zero-day was being used in targeted attacks to deploy spyware, possibly by groups like Paragon. Successful exploitation could lead to data theft, surveillance, and other malicious activities.

    Apple’s Response

    Apple swiftly responded by releasing updates to iOS, iPadOS, and macOS. Users are strongly encouraged to update their devices immediately to the latest versions to protect themselves from this threat. Keeping your devices updated is a critical step in maintaining security.

    How to Update Your Apple Devices

    Updating your devices is straightforward:

    • For iPhones and iPads: Go to Settings > General > Software Update.
    • For Macs: Go to System Preferences > Software Update.

    Make sure your device is connected to Wi-Fi and has sufficient battery life before starting the update process. Regular updates are your first line of defense against emerging threats.

    The Role of Spyware Vendors

    Spyware vendors, like Paragon, develop and sell surveillance tools to governments and law enforcement agencies. While these tools are intended for legitimate purposes, they can be misused to target journalists, activists, and political dissidents. The ethical implications of such technologies are a subject of ongoing debate. It’s essential to consider the balance between security and individual privacy rights.

  • AI Streamlines Vendor Security Reviews & RFPs

    AI Streamlines Vendor Security Reviews & RFPs

    Conveyor AI Automates Vendor Security Reviews

    Conveyor tackles a major pain point: vendor security reviews and RFPs often delay deals. Thankfully, they’ve automated this with AI to make processes faster and smarter.

    ✅ What Conveyor Does

    • Automated security questionnaires
      Conveyor’s AI agent handles over 90% of security questions accurately—autonomously filling them out in minutes instead of weeks en.wikipedia.org
    • RFP automation
      Now, Conveyor’s expanding into RFPs. The AI agent researches, drafts, and flags responses, reducing manual effort and ensuring consistency pymnts.com
    • Trust Center platform
      Secure sharing of SOC‑2 and compliance documents with customers, behind an NDA gate, with clear usage analytics pymnts.com

    📊 Tangible Results

    🔒 Security Built In

    Conveyor maintains strong security standards: SOC 2 compliance, GDPR/CCPA alignment, monthly internal scans, and strict vendor management policies conveyor.com

    🌐 Why It Matters

    Traditional vendor security and RFP workflows can stall deals by weeks. Conveyor’s AI agents—Sue for security and Phil for RFPs—transform this into a fast, reliable, and scalable process. They reduce friction, free up teams, and accelerate revenue. They’re among the first to pioneer true agent-to-agent automation in enterprise contracting bestofai.com

    AI-Powered Automation

    Conveyor’s AI platform automates key aspects of vendor security reviews and RFPs, including:

    • Questionnaire Completion: Automatically answers security questionnaires, saving time and resources.
    • Evidence Mapping: Maps security controls to relevant evidence, ensuring compliance requirements are met.
    • Risk Assessment: Identifies potential security risks associated with vendors, enabling proactive risk management.

    Benefits of Using Conveyor AI

    By automating vendor security reviews, Conveyor offers several notable benefits:

    • Reduced Time and Costs: Automating manual tasks reduces the time and costs associated with security reviews.
    • Improved Accuracy: AI algorithms minimize human error and provide more accurate assessments.
    • Enhanced Scalability: The AI platform enables organizations to scale their security review processes efficiently.

    How it Works

    Conveyor’s AI solution works by:

    1. Analyzing vendor security documentation.
    2. Comparing vendor practices against industry standards.
    3. Generating comprehensive risk reports and compliance assessments.

    This approach helps organizations make informed decisions about vendor selection and risk mitigation.

  • KiranaPro’s Systems Compromised in Hack

    KiranaPro’s Systems Compromised in Hack

    KiranaPro Suffers Cyberattack: Servers Wiped Clean

    Indian grocery startup KiranaPro experienced a severe security breach, resulting in the deletion of its servers, according to confirmation from the CEO. This incident underscores the increasing cyber threats faced by startups, particularly those handling sensitive customer data.

    The Attack

    Indian grocery delivery startup KiranaPro has suffered a severe cyberattack, leading to the deletion of its servers and critical data. Co-founder and CEO Deepak Ravindran confirmed the breach, stating that hackers gained root access to the company’s Amazon Web Services (AWS) and GitHub accounts, resulting in the erasure of essential data, including app code and sensitive customer information such as names, addresses, and payment details.

    The breach occurred between May 24 and 25, 2025, and was discovered on May 26 when executives noticed suspicious activity during an AWS login attempt. The attack is believed to have originated from a former employee’s credentials, highlighting the risks associated with insider threats.

    In response, KiranaPro has filed a complaint with the cybercrime cell and is collaborating with ethical hackers and forensic experts to investigate the incident. The company has also reached out to GitHub for assistance in retrieving compromised repositories from internal backups and audit logs.

    The cyberattack has significantly disrupted KiranaPro‘s operations, halting its services and impacting its user base of approximately 55,000 customers across 50 cities. The incident has also affected the company’s fundraising efforts, with partnerships worth ₹5 crore on hold and daily losses of around 2,000 orders.

    This event underscores the critical importance of robust cybersecurity measures, including timely deactivation of former employees’ access and comprehensive data backup strategies, to protect against potential insider threats and ensure business continuity.

    For more detailed information on this topic, you can refer to the following articles:

    Cyberattack wipes out KiranaPro’s servers, app code and sensitive data

    Grocery delivery app KiranaPro faces cyberattack, servers deleted; CEO says legal proceedings on

    Indian grocery startup KiranaPro was hacked and its servers deleted, CEO confirms

    Impact on Customers

    Indian grocery delivery startup KiranaPro has suffered a severe cyberattack, leading to the deletion of its servers and critical data, including sensitive customer information such as names, mailing addresses, and payment details. The breach has rendered the platform inoperable, halting services for its 55,000 customers across 50 cities. The company is actively investigating the incident and working to restore its systems.cyberpress.orgampcuscyber.com

    According to CEO Deepak Ravindran, the attack occurred between May 24 and 25, 2025, and was discovered on May 26 during an AWS login attempt. The breach is believed to have originated from a former employee’s credentials, highlighting the risks associated with insider threats. The company has filed a complaint with the cybercrime cell and is collaborating with ethical hackers and forensic experts to investigate the incident. techcrunch.com

    In response to the breach, KiranaPro is implementing enhanced security measures to prevent future incidents. The company is also working to restore its systems and services to minimize disruption for its customers. Customers may experience delays or disruptions in accessing the platform during this recovery period.cyberpress.org

    This incident underscores the critical importance of robust cybersecurity measures, including timely deactivation of former employees’ access and comprehensive data backup strategies, to protect against potential insider threats and ensure business continuity.

    For more detailed information on this topic, you can refer to the following articles:

    Cyberattack wipes out KiranaPro’s servers, app code and sensitive data

    Grocery delivery app KiranaPro faces cyberattack, servers deleted; CEO says legal proceedings on

    Indian grocery startup KiranaPro was hacked and its servers deleted, CEO confirms

    Security Implications for Startups

    This incident highlights the vulnerability of startups to cyberattacks. Startups, often operating with limited resources, may struggle to implement robust security measures. This breach serves as a reminder for startups to prioritize cybersecurity and invest in protecting their systems and data.

    Key Takeaways:
    • Cyberattacks pose a significant threat to startups.
    • Data security is crucial for maintaining customer trust.
    • Startups must prioritize cybersecurity measures.
  • Vanta Data Exposure: Customers Impacted by Bug

    Vanta Data Exposure: Customers Impacted by Bug

    Vanta Data Exposure: Customers Impacted by Bug

    A bug in Vanta’s system led to an unintended exposure of customer data to other customers. The company is working to address the issue and prevent future occurrences.

    Details of the Data Exposure

    The bug created a situation where users could potentially access information that wasn’t meant for them. Specific details of the impacted data remain limited at this time, but affected customers have been notified.

    Vanta’s Response and Remediation

    Vanta’s team quickly responded upon discovering the security vulnerability. They initiated an investigation to understand the scope and impact and took steps to fix the bug and prevent future occurrences. They are committed to transparency and are keeping their customers informed throughout the process.

    Impact on Customers

    The data exposure may have various impacts on affected customers, ranging from minor inconvenience to more significant security risks. Vanta urges customers to take precautions like reviewing their account activity and changing passwords.

    Steps for Affected Users

    • Monitor account activity for any suspicious or unauthorized access.
    • Change passwords for Vanta and related accounts.
    • Report any unusual activity to Vanta’s support team.