🚀 #CivoNavigate Austin 2025 is Wednesday, May 14th. 🗣️ Don't miss @numa.bsky.social, iVerify's Head of Machine Learning, present "Break the Bot: Red-Teaming #LLMs.
This session explores the use of red-team techniques to uncover harmful content these models may produce.
www.civo.com/navigate/aus...
Posts by iVerify
📡 Sensitive phone data flows through China: The future of cybersecurity, the latest from @samsabin.bsky.social Axios Report www.axios.com/2025/04/22/s...
iVerify report reveals 60+ mobile operators route sensitive data — location, texts, and browsing history, through China-based telecom networks.
📢 Mobile use is risky in China, but their tech is everywhere!
Bans on Huawei and ZTE don't address access they get when connect to one these networks in Japan, New Zealand, or even Saudi Arabia, where many are heading for the F1 Grand Prix 🏎️🏁.
bit.ly/3YG57cP
#CyberSecurity #MobileSecurity #Huawei
We're thrilled to announce iVerify is a finalist for the SC Award for Best Secure Messaging Solution! 🏆🎉
As mobile threats take center stage, iVerify is the only mobile-first company on this list, highlighting the importance of strengthening mobile security. 📱🚀 🔐
www.scworld.com/news/2025-sc...
📢 We're here today with iVerify and Defending Digital Campaigns at the Political Tech Summit at the University of Richmond! 🗳️💡 Come connect with us and learn how iVerify is helping to protect democracy with cutting-edge mobile security solutions!
spcs.richmond.edu/professional...
🚀 iVerify is proud to be a sponsor at the Political Tech & Digital Security Summit this Saturday at the University of Richmond in partnership with Defending Digital Campaigns! 🏛️📱
Join us as we dive into the latest in mobile security. 🔒💡
See you there! 👏
spcs.richmond.edu/professional...
🌟Exciting News! iVerify is heading to RSA Conference 2025! 🏆🔐
Let’s connect and discuss how iVerify can help safeguard your mobile world. Will we see you there? Let us know in the comments! 👇
iverify.io/events
See you at #RSAC! 🚀 #CyberSecurity #MobileSecurity #RSAC2025 #iVerify
🔒📲 If your phone is compromised, so is everything on it!
The problem with government officials using Signal is not the encrypted app, it’s the device itself. iVerify COO Rocky Cole warns: "Signal is widely trusted, but if your phone is compromised, so is everything on it."
reut.rs/41HmU5o
Is your phone spying on you? 📱
A new report from @citizenlab.ca highlights how Paragon spyware, Graphite, is being used for surveillance, with potential implications for individuals and organizations worldwide.
citizenlab.ca/2025/03/a-fi...
#spyware #mobilesecurity
"It is not a secret if it is known by three people." – A reminder on St. Patrick's Day to keep things secure on your mobile device!
Watch out for smishing scams, and keep your mobile devices updated to stay protected.🛡️💰
🍀 Happy St. Patrick’s Day! 🇮🇪✨
#StPatricksDay #CyberSecurity #StaySafe
📚✨ Exciting news! iVerify's @numa.bsky.social will be at SXSW 2025 for a special book signing event at the SXSW Bookstore where she will be signing copies of her book “Introduction to Generative AI"
📅 Date: March 13th, 4:30 - 4:55 PM CT
#SXSW #AI #CreativeTech schedule.sxsw.com/2025/events/...
🎉We are delighted to announce the appointment of Mike Rosen, former Apple alum, as CISO at iVerify. Mike will lead security strategy, investigations, compliance initiatives, and customer risk management.
Welcome aboard, Mike! 🚀
iverify.io/press-releas...
#CISO #mobile #cybersecurity
🚀 We are just 4 days away from SXSW 2025! 🚀
Don't miss @numa.bsky.social , iVerify's Head of Machine Learning, March 13th at 2:30 CT, present Break the Bot: Red-Teaming Large Language Models. schedule.sxsw.com/2025/events/...
#SXSW2025
#AI
#Cybersecurity
90% of Attacks Start with Social Engineering and Target #mobile. Hackers use smishing, vishing & quishing to lure users into clicking malicious links, sharing passwords, or downloading malware.
darkreading.com/vulnerabilit...
Your phone is a prime target—stay alert and secure! 🔐
Catch iVerify's Head of Machine Learning, @numa.bsky.social at SXSW discussing how red-teaming is a crucial component of a robust security toolkit for software systems. Break the Bot: Red-Teaming Large Language Models, 3/13, 2:30 CT 🚀
schedule.sxsw.com/2025/events/...
#SXSW2025 #AI #Cybersecurity
🕵️This weekend, iVerify's VP of Research, Matthias Frielingsdorf, will be at NULLCON talking about the methods behind Predator malware and equip cybersecurity professionals with the knowledge to anticipate and counter such malware in the future. nullcon.net/goa-2025
#spyware #mobilesecurity
Bybit Hack is a Wake-Up Call for Mobile Crypto Security!
This $1.5B crypto hack highlights digital asset security risks and remind us that mobile wallets & authentication methods play a big role in cryptocurrency and #1 targets for attackers.
Don’t let your phone be the weakest link. bit.ly/3F4OEI8
🚀 Exciting news! We are at #RightsCon2025! 🌍✨ This is a unique opportunity to engage with global experts on pressing issues like:
🤖 AI ethics
🔐 Digital privacy
📱 Mobile privacy & data protection
With an inspiring lineup, we are looking forward to exploring how to shape a safer digital world. 🌱⚖️
🔍 Worried about spyware on your iPhone? There's a tool that can help!
A new report reveals that with many of the Pegasus spyware detections, victims were not notified by Apple. Meaning many users could still be unknowingly compromised. bit.ly/41dSnL5
#CyberSecurity #PegasusSpyware #iPhoneSecurity
🚨 Democratizing Threat Hunting is Changing Mobile Security!
Our latest investigation led to 18,000+ device scans, uncovering 11 new Pegasus spyware infections—many targeting business executives. 📱💼
Take control of your security—scan your device today! 🔍
iverify.io/blog/how-dem...
As government mobile usage grows, so do cyberthreats. Hackers are exploiting mobile vulnerabilities, emphasizing the urgency for robust mobile security measures. Cybersecurity strategies are necessary to safeguard sensitive information. bit.ly/4hx5sWQ
#MobileThreats #CyberSecurity #GovTech
Don't miss iVerify’s Head of Machine Learning, @numa.bsky.social , tomorrow on the Building GenAI applications panel at AI Accelerator Institute in Generative AI Summit in Austin. world.aiacceleratorinstitute.com/location/aus...
📱Mobile spyware attacks are on the rise globally. That's why you should treat your phone like a computer, according to cybersecurity expert and iVerify COO, Rocky Cole to ZDNET. bit.ly/4hnBqEP
Our new partner program is tailored for MSPs and MSSPs to offer comprehensive mobile security solutions, safeguarding both BYOD and managed devices against sophisticated threats. Let's get your mobile program going! 🚀🚀🚀https://bit.ly/4guxcKa
We will be there! iVerify’s Head of Machine Learning, @numa.bsky.social will participate in a panel on Building GenAI applications at AI Accelerator Institute's Generative AI Summit in Austin. bit.ly/4gzN7Hr
#mobilesecurity #GenAI #Cybersecurity #infosec
Through our partnership w/ @defendcampaigns.bsky.social, we were able to protect nearly 2,000 mobile devices belonging to political leaders, their families & campaign staff. We're proud to support DDC in their mission to protect the integrity of our elections www.prnewswire.com/news-release...
iVerify Widget screenshot
I strongly recommend you use the iVerify app and widget on iPhone or iPad. iVerify helped detect NSO Pegasus attacks on the CEO of a well-known company according to TechCrunch techcrunch.com/2024/12/04/b...
Last week, iVerify's Matthias Frielingsdorf presented a deep dive into our Pegasus sample at #OBTS v7.0 and shared his wishlist for 2025:
📲 Improved Threat Notifications from 🍏
🕵♀️ Improved Detection Capabilities
🤝 Better collaboration & sharing on defense
www.youtube.com/live/Nm0zLW8...
FY25 NDAA includes a measure that aims to shield military servicemembers and diplomats from ensnarement by commercial spyware programs. More on it here:
www.nextgov.com/cybersecurit...
This is a fascinating discovery. As far as I know, this is the first time researchers find spyware used by Chinese law enforcement, rather than Chinese intelligence.
The tool is a "comprehensive mobile phone judicial monitoring product," according to a manual obtained by Lookout.