Advertisement · 728 × 90

Posts by iVerify

Post image

🚀 #CivoNavigate Austin 2025 is Wednesday, May 14th. 🗣️ Don't miss @numa.bsky.social, iVerify's Head of Machine Learning, present "Break the Bot: Red-Teaming #LLMs.

This session explores the use of red-team techniques to uncover harmful content these models may produce.
www.civo.com/navigate/aus...

11 months ago 3 2 0 0
Preview
Sensitive phone data flows through China

📡 Sensitive phone data flows through China: The future of cybersecurity, the latest from @samsabin.bsky.social Axios Report www.axios.com/2025/04/22/s...
iVerify report reveals 60+ mobile operators route sensitive data — location, texts, and browsing history, through China-based telecom networks.

11 months ago 1 0 0 0
Preview
‘China Is Everywhere’—Your iPhone, Android Phone Now At Risk All phones are open to attack—here’s why.

📢 Mobile use is risky in China, but their tech is everywhere!
Bans on Huawei and ZTE don't address access they get when connect to one these networks in Japan, New Zealand, or even Saudi Arabia, where many are heading for the F1 Grand Prix 🏎️🏁.

bit.ly/3YG57cP
#CyberSecurity #MobileSecurity #Huawei

1 year ago 1 0 0 0
Preview
2025 SC Awards Finalists: Best Secure Messaging Solution Messaging security addresses the ability to exchange messages securely whether it's email, a collaboration platform or cross-platform messaging apps to send text, voice or video communications.

We're thrilled to announce iVerify is a finalist for the SC Award for Best Secure Messaging Solution! 🏆🎉

As mobile threats take center stage, iVerify is the only mobile-first company on this list, highlighting the importance of strengthening mobile security. 📱🚀 🔐
www.scworld.com/news/2025-sc...

1 year ago 1 1 0 0
Post image Post image Post image

📢 We're here today with iVerify and Defending Digital Campaigns at the Political Tech Summit at the University of Richmond! 🗳️💡 Come connect with us and learn how iVerify is helping to protect democracy with cutting-edge mobile security solutions!

spcs.richmond.edu/professional...

1 year ago 1 1 0 0
Preview
Political Tech & Cybersecurity Summit - School of Professional & Continuing Studies - University of Richmond Gathering of political leaders, campaign professionals, and technology experts, focusing on the intersection of technology, cybersecurity, and political campaigns.

🚀 iVerify is proud to be a sponsor at the Political Tech & Digital Security Summit this Saturday at the University of Richmond in partnership with Defending Digital Campaigns! 🏛️📱

Join us as we dive into the latest in mobile security. 🔒💡

See you there! 👏

spcs.richmond.edu/professional...

1 year ago 0 0 0 0
Post image

🌟Exciting News! iVerify is heading to RSA Conference 2025! 🏆🔐 


Let’s connect and discuss how iVerify can help safeguard your mobile world. Will we see you there? Let us know in the comments! 👇

iverify.io/events

See you at #RSAC! 🚀 #CyberSecurity #MobileSecurity #RSAC2025 #iVerify

1 year ago 1 0 0 0
Post image

🔒📲 If your phone is compromised, so is everything on it!
The problem with government officials using Signal is not the encrypted app, it’s the device itself. iVerify COO Rocky Cole warns: "Signal is widely trusted, but if your phone is compromised, so is everything on it."
reut.rs/41HmU5o

1 year ago 0 0 0 0
Preview
Virtue or Vice? A First Look at Paragon’s Proliferating Spyware Operations - The Citizen Lab In our first investigation into Israel-based spyware company, Paragon Solutions, we begin to untangle multiple threads connected to the proliferation of Paragon's mercenary spyware operations across t...

Is your phone spying on you? 📱
A new report from @citizenlab.ca highlights how Paragon spyware, Graphite, is being used for surveillance, with potential implications for individuals and organizations worldwide.
citizenlab.ca/2025/03/a-fi...
#spyware #mobilesecurity

1 year ago 0 1 0 0
Post image

"It is not a secret if it is known by three people." – A reminder on St. Patrick's Day to keep things secure on your mobile device!
Watch out for smishing scams, and keep your mobile devices updated to stay protected.🛡️💰

🍀 Happy St. Patrick’s Day! 🇮🇪✨

#StPatricksDay #CyberSecurity #StaySafe

1 year ago 2 1 0 0
Advertisement
Preview
Maggie Engler and Numa Dhamani Book Signing SXSW 2025 Schedule | Maggie Engler and Numa Dhamani will be signing copies of “Introduction to Generative AI" at the SXSW Bookstore.

📚✨ Exciting news! iVerify's @numa.bsky.social will be at SXSW 2025 for a special book signing event at the SXSW Bookstore where she will be signing copies of her book “Introduction to Generative AI"

📅 Date: March 13th, 4:30 - 4:55 PM CT

#SXSW #AI #CreativeTech schedule.sxsw.com/2025/events/...

1 year ago 2 1 0 0
Preview
iVerify Appoints Apple Alum Mike Rosen as Chief Information Security Officer Mike Rosen, Apple, Verizon, and PwC veteran has been appointed Chief Information Security Officer to lead security strategy and risk management at iVerify.

🎉We are delighted to announce the appointment of Mike Rosen, former Apple alum, as CISO at iVerify. Mike will lead security strategy, investigations, compliance initiatives, and customer risk management.

Welcome aboard, Mike! 🚀
iverify.io/press-releas...
#CISO #mobile #cybersecurity

1 year ago 1 0 0 0
Post image

🚀 We are just 4 days away from SXSW 2025! 🚀
Don't miss @numa.bsky.social , iVerify's Head of Machine Learning, March 13th at 2:30 CT, present Break the Bot: Red-Teaming Large Language Models. schedule.sxsw.com/2025/events/...

#SXSW2025
#AI
#Cybersecurity

1 year ago 1 1 0 0
Preview
Top 10 Most Probable Ways a Company Can Be Hacked How to win the battle with root cause analysis and a data-driven approach.

90% of Attacks Start with Social Engineering and Target #mobile. Hackers use smishing, vishing & quishing to lure users into clicking malicious links, sharing passwords, or downloading malware.
darkreading.com/vulnerabilit...
Your phone is a prime target—stay alert and secure! 🔐

1 year ago 1 0 0 0
Preview
Break the Bot: Red-Teaming Large Language Models SXSW 2025 Schedule | Red-teaming has long been a crucial component of a robust security toolkit for software systems. Now, companies developing large language models (LLMs) and other GenAI products ar...

Catch iVerify's Head of Machine Learning, @numa.bsky.social at SXSW discussing how red-teaming is a crucial component of a robust security toolkit for software systems. Break the Bot: Red-Teaming Large Language Models, 3/13, 2:30 CT 🚀
schedule.sxsw.com/2025/events/...
#SXSW2025 #AI #Cybersecurity

1 year ago 3 1 0 0
Post image

🕵️This weekend, iVerify's VP of Research, Matthias Frielingsdorf, will be at NULLCON talking about the methods behind Predator malware and equip cybersecurity professionals with the knowledge to anticipate and counter such malware in the future. nullcon.net/goa-2025

#spyware #mobilesecurity

1 year ago 1 0 0 0

Bybit Hack is a Wake-Up Call for Mobile Crypto Security!
This $1.5B crypto hack highlights digital asset security risks and remind us that mobile wallets & authentication methods play a big role in cryptocurrency and #1 targets for attackers.
Don’t let your phone be the weakest link. bit.ly/3F4OEI8

1 year ago 0 0 0 0
Advertisement
Post image

🚀 Exciting news! We are at #RightsCon2025! 🌍✨ This is a unique opportunity to engage with global experts on pressing issues like:
🤖 AI ethics
🔐 Digital privacy
📱 Mobile privacy & data protection

With an inspiring lineup, we are looking forward to exploring how to shape a safer digital world. 🌱⚖️

1 year ago 3 1 0 0
Preview
Apple currently only able to detect Pegasus spyware in half of infected iPhones NSO’s Pegasus spyware is one of the most frightening privacy threats an iPhone owner can face. Without you taking any...

🔍 Worried about spyware on your iPhone? There's a tool that can help!
A new report reveals that with many of the Pegasus spyware detections, victims were not notified by Apple. Meaning many users could still be unknowingly compromised. bit.ly/41dSnL5

#CyberSecurity #PegasusSpyware #iPhoneSecurity

1 year ago 1 0 0 0
Preview
How Democratizing Threat Hunting is Changing Mobile Security iVerify found 11 new Pegasus spyware detections, primarily from business executives with access to future deals, financial data, and professional networks.

🚨 Democratizing Threat Hunting is Changing Mobile Security!

Our latest investigation led to 18,000+ device scans, uncovering 11 new Pegasus spyware infections—many targeting business executives. 📱💼

Take control of your security—scan your device today! 🔍
iverify.io/blog/how-dem...

1 year ago 2 5 0 1
Preview
As Government’s Mobile Usage Grows, So Do Cyberthreats Nation-states’ mobile malware capabilities are evolving to exploit the modern kill chain.

As government mobile usage grows, so do cyberthreats. Hackers are exploiting mobile vulnerabilities, emphasizing the urgency for robust mobile security measures. Cybersecurity strategies are necessary to safeguard sensitive information. bit.ly/4hx5sWQ

#MobileThreats #CyberSecurity #GovTech

1 year ago 2 1 0 0
Post image

Don't miss iVerify’s Head of Machine Learning, @numa.bsky.social , tomorrow on the Building GenAI applications panel at AI Accelerator Institute in Generative AI Summit in Austin. world.aiacceleratorinstitute.com/location/aus...

1 year ago 3 1 0 0
Preview
Why rebooting your phone daily is your best defense against zero-click hackers Mobile spyware attacks are on the rise globally. That's why you should treat your phone like a computer, according to this cybersecurity expert.

📱Mobile spyware attacks are on the rise globally. That's why you should treat your phone like a computer, according to cybersecurity expert and iVerify COO, Rocky Cole to ZDNET. bit.ly/4hnBqEP

1 year ago 0 1 0 0
Post image

Our new partner program is tailored for MSPs and MSSPs to offer comprehensive mobile security solutions, safeguarding both BYOD and managed devices against sophisticated threats. Let's get your mobile program going! 🚀🚀🚀https://bit.ly/4guxcKa

1 year ago 0 0 0 0
Post image

We will be there! iVerify’s Head of Machine Learning, @numa.bsky.social will participate in a panel on Building GenAI applications at AI Accelerator Institute's Generative AI Summit in Austin. bit.ly/4gzN7Hr
#mobilesecurity #GenAI #Cybersecurity #infosec

1 year ago 5 1 0 0
Advertisement
Defending Digital Campaigns Provides $2.9 Million in Cybersecurity Services to Protect Campaigns in 2024 /PRNewswire/ -- Defending Digital Campaigns (DDC), a nonprofit, non-partisan and non-aligned C4 organization that provides free or low-cost cybersecurity...

Through our partnership w/ @defendcampaigns.bsky.social, we were able to protect nearly 2,000 mobile devices belonging to political leaders, their families & campaign staff. We're proud to support DDC in their mission to protect the integrity of our elections www.prnewswire.com/news-release...

1 year ago 1 1 0 0
iVerify Widget screenshot

iVerify Widget screenshot

I strongly recommend you use the iVerify app and widget on iPhone or iPad. iVerify helped detect NSO Pegasus attacks on the CEO of a well-known company according to TechCrunch techcrunch.com/2024/12/04/b...

1 year ago 3 2 0 0
YouTube Share your videos with friends, family, and the world

Last week, iVerify's Matthias Frielingsdorf presented a deep dive into our Pegasus sample at #OBTS v7.0 and shared his wishlist for 2025:

📲 Improved Threat Notifications from 🍏
🕵‍♀️ Improved Detection Capabilities
🤝 Better collaboration & sharing on defense

www.youtube.com/live/Nm0zLW8...

1 year ago 0 0 0 0
Preview
FY2025 NDAA targets spyware threats to U.S. diplomats, military devices The language comes as the State department has pressed foreign governments to collectively set standards to prevent spyware abuses.

FY25 NDAA includes a measure that aims to shield military servicemembers and diplomats from ensnarement by commercial spyware programs. More on it here:
www.nextgov.com/cybersecurit...

1 year ago 2 2 0 0

This is a fascinating discovery. As far as I know, this is the first time researchers find spyware used by Chinese law enforcement, rather than Chinese intelligence.

The tool is a "comprehensive mobile phone judicial monitoring product," according to a manual obtained by Lookout.

1 year ago 23 13 1 0