NEW: Staffers at notorious spyware maker Intellexa had live remote access to their customers' surveillance systems. This allowed them to see the personal data of targets hacked with Intellexa's spyware Predator, according to new research based on a leaked training video. Needless to say, this is bad for several reasons. image
NEW: Your "end-to-end encrypted" poop pictures taken by this $599 (+ subscription) smart toilet camera are actually not end-to-end encrypted. ¯_(ツ)_/¯
NEW: A trivial-to-exploit bug in jury systems used across the United States was exposing jurors' sensitive personal data, such as full names, date of birth, occupation, email addresses, cell phone numbers, and home addresses — and potentially even health data. The bug essentially allowed anyone to brute-force and access jurors' accounts. The system is provided by gov tech gian Tyler Technologies. We alerted them of the bug on Nov. 5, they acknowledged and said they fixed it yesterday. ** **
NEW: Delivery giant DoorDash disclosed a data breach impacting an unspecified number of users. Hackers stole names, emails, phone numbers, and physical addresses, but DoorDash said that “no sensitive information was accessed by the unauthorized third party." 🤔
NEW: A group of Senators and Congresspeople are warning Governors that their states are providing ICE “with frictionless, self-service access to the personal data of all of your residents.” The data sharing is managed by a nonprofit called Nlets, which is managed by state police agencies.
NEW: The U.S. Congressional Budget Office was hacked. @npub1lcc6...lcye says that the cause may be an unpatched Cisco ASA firewall. I asked CBO about that but it did not respond to the question.
NEW: This is how former L3Harris Trenchant boss Peter Williams was able to steal zero-days worth millions of dollars and sell them to a Russian broker, based on court documents and interviews with his former colleagues.  A former Trenchant employee told me that “no one had any supervision over [Williams] at all. He was kind of allowed to do things the way he wanted to.” “He was, in my opinion, perceived to be beyond reproach,” the former employee, who has knowledge of Trenchant's IT systems, told me.
NEW: Peter Williams, the former head of Western zero-day and spyware maker Trenchant, pleaded guilty to selling eight exploits to a Russian broker that resells to the Russian government. The DOJ said Williams was promised millions of dollars in exchange for "national-security focused software."
NEW: The U.S. govt accused Peter Williams, ex general manager of hacking tool maker L3Harris Trenchant, of stealing trade secrets and selling them to buyer in Russia. As we reported earlier this week, Trenchant was investigating a leak of internal tools this year. At this point, it's unclear if that investigation is related to the accusations against Williams.
ICYMI (story broke late Friday evening): A judge has ordered NSO Group to stop targeting WhatsApp users. At the same time the judge reduced the damages the spyware maker had to pay to WhatsApp from $167 million to $4M, becasue there was no evidence NSO’s behavior was “particularly egregious."