whatsapp

Back Open Paginator
10.04.2026 09:26
nemo (@nemo@mas.to)

Audit finds WhatsApp’s “Private Inference” had multiple high‑risk flaws that could've exposed messages; Meta fixed issues pre‑launch. Trail of Bits found 28 issues including attestation, ACPI and env‑var injection. Read: cyberinsider.com/whatsapp-priv 🔐⚠️ #WhatsApp #Security #AI




Show Original Post


10.04.2026 09:12
ItalianNews (@ItalianNews@mastodon.ozioso.online)

Punto Informatico: Gli stati sopra le chat di WhatsApp: no, per favore

In fase di test una novità di WhatsApp che speriamo possa finire direttamente nel cestino: gli stati in alto, nella scheda delle chat.
The post Gli stati sopra le chat di WhatsApp: no, per favore appeared first on Punto Informatico.

States above WhatsApp chats: no, please.

Currently under test a WhatsApp novelty that we hope will end up directly in the trash: statuses at the top, in the chats tab.
The post Statuses above WhatsApp chats: no, please appeared first on Punto Informatico.

#WhatsApp #first #PuntoInformatico

punto-informatico.it/stati-sop




Show Original Post


10.04.2026 08:58
iode (@iode@mastodon.online)

#PavelDurov can easily improve the privacy of a billion people by enabling end-to-end encryption by default. Neither #Meta nor #Telegram are to be trusted. Trust comes from NOT logging data or metadata. blog.iode.tech/degoogle-your-p

#digitalsovereignty #whatsapp #bigtech





Show Original Post


10.04.2026 08:37
kevinkenankraemer (@kevinkenankraemer@mastodon.social)

www.haute-gardening.com will receive a new channel.




Show Original Post


10.04.2026 07:48
aisaxai (@aisaxai@mastodon.social)

WhatsApp is evolving into a powerful customer engagement channel.

AI agents enable businesses to:
• Respond instantly
• Capture and qualify leads
• Automate follow-ups
• Operate 24/7

This transformation is redefining customer service in India.

👉 Read more:
aisa-x.ai/blog/whatsapp-ai-age





Show Original Post


10.04.2026 06:00
lavanyadeepak (@lavanyadeepak@mastodon.social)

Guruvayur Temple -
Newly Born Baby Elephant Vaikuntam!

Media Credits:

P.S. There is no intent of infringement other than to spread





Show Original Post


10.04.2026 01:09
rod2ik (@rod2ik@mastodon.social)

Can't ... Even
is tellîg it...





Show Original Post


10.04.2026 01:08
r (@r@fed.brid.gy)

Can't #trust #WhatsApp... Even #Elonia is tellîg it...





Show Original Post


09.04.2026 22:19
tugatech (@tugatech@masto.pt)

WhatsApp lança funcionalidade de nomes de utilizador para esconderes o teu número de telefone
🔗 tugatech.com.pt/t81593-whatsap

#funcionalidade #lan #utilizador #whatsapp 




Show Original Post


09.04.2026 22:15
mosiwo (@mosiwo@mastodon.social)

Das kam heute im - Alternativen zu und

Bei Minute 13:49 gehts los!

ardmediathek.de/video/die-ratg?




Show Original Post


09.04.2026 22:14
tugatech (@tugatech@masto.pt)

WhatsApp testa cancelamento de ruído para melhorar as tuas chamadas e videochamadas
🔗 tugatech.com.pt/t81592-whatsap

#cancelamento #whatsapp 




Show Original Post


09.04.2026 20:02
techbot (@techbot@social.raytec.co)

Hack-for-Hire Campaign Targets Journalists Across MENA Region

A hack-for-hire operation with suspected links to the Bitter threat actor targeted journalists, activists, and government officials across the Middle East and North Africa between 2023 and 2025. The campaign employed sophisticated spear-phishing attacks via LinkedIn, Apple Messages, WhatsApp, and email to compromise Apple and Google accounts. Victims included Egyptian journalists Mostafa Al-A'sar and Ahmed Eltantawy, along with a Lebanese journalist whose Apple Account was fully compromised. Attackers used OAuth consent phishing and fake login pages to harvest credentials and 2FA codes. Infrastructure overlaps with Android spyware campaigns distributing ProSpy, ToSpy, and Dracarys malware. The operation represents an unusual expansion of Bitter's targeting scope into civil society, suggesting either hack-for-hire services or direct nation-state involvement in regional surveillance efforts focused on monitoring communications and harvesting personal data.

Pulse ID: 69d7e4115268dc2f9177cba2
Pulse Link: otx.alienvault.com/pulse/69d7e
Pulse Author: AlienVault
Created: 2026-04-09 17:38:25

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#2FA #Africa #Android #CyberSecurity #Email #Google #Government #InfoSec #LinkedIn #Malware #MiddleEast #OTX #OpenThreatExchange #Phishing #RAT #SpearPhishing #SpyWare #WhatsApp #bot #AlienVault




Show Original Post


1 ...29 30 31 32 33 34 35 36 37 38 39 ...495
UP