Sami Laiho
banner
samilaiho.com
Sami Laiho
@samilaiho.com
Keynote-speaker, Chief Research Officer, Microsoft MVP since 2011

More info: https://samilaiho.com/
CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and
WhatsApp Users
thehackernews.com/2025/11/cisa...
CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users
U.S. CISA exposes how commercial spyware and RATs hijack Signal, WhatsApp and Android devices to spy on high-ranking officials.
thehackernews.com
November 26, 2025 at 3:12 PM
Security Bulletin: NVIDIA DGX Spark - November 2025
URL: nvidia.custhelp.com/app/answers/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Unproven, CVSSv3.1: 9.3
NVIDIA Support
nvidia.custhelp.com
November 26, 2025 at 9:16 AM
An authentication-bypass vulnerability exists in AiCloud.
URL: nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.2
NVD - CVE-2025-59366
nvd.nist.gov
November 26, 2025 at 9:15 AM
CISA Releases Seven Industrial Control Systems Advisories
URL: www.cisa.gov/news-events/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8
CISA Releases Seven Industrial Control Systems Advisories | CISA
www.cisa.gov
November 26, 2025 at 9:15 AM
Want to speak at our conference at the Microsoft Campus in Redmond in August? Deadline to submit is 1st of December!

sessionize.com/techmentorcy...
TechMentor & Cybersecurity Live @ Microsoft HQ 2026: Call for Speakers
TechMentor & Cybersecurity Live! @ Microsoft HQ 2026 - Call for PresentationsAugust 3-7, 2026 • Microsoft Headquarters, Redmond, WAJoin us August 3-7,...
sessionize.com
November 25, 2025 at 1:25 PM
Matrix Push C2 abuses browser notifications to deliver phishing and malware
www.malwarebytes.com/blog/news/20...
Matrix Push C2 abuses browser notifications to deliver phishing and malware
Attackers can send highly realistic push notifications through your browser, including fake alerts that can lead to malware or phishing pages.
www.malwarebytes.com
November 25, 2025 at 12:45 PM
ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access
thehackernews.com/2025/11/shad...

#WSUS
ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access
ShadowPad malware is being delivered through an actively exploited WSUS vulnerability, granting attackers full system access.
thehackernews.com
November 25, 2025 at 12:45 PM
Shai-Hulud 2.0 Supply Chain Attack: 25K+ npm Repos Exposed
www.wiz.io/blog/shai-hu...
Sha1-Hulud 2.0 Supply Chain Attack: 25K+ npm Repos Exposed | Wiz Blog
Shai-Hulud is back, spreading an npm malware worm through thousands of GitHub repos. Learn the impact, attacker methods, and how to defend your supply chain.
www.wiz.io
November 25, 2025 at 12:44 PM
Critical Vulnerabilities in FluentBit
URL: nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Official Fix, Exploit Maturity: Unproven, CVSSv3.1: 9.1
NVD - CVE-2025-12977
nvd.nist.gov
November 25, 2025 at 12:44 PM
A simulation study by Chinese scientists shows how 🇨🇳 PLA could attempt to block Starlink across Taiwan.

xcancel.com/Byron_Wan/st...
xcancel.com
November 24, 2025 at 2:26 PM
Fake calendar invites are spreading. Here’s how to remove them and prevent
more
www.malwarebytes.com/blog/news/20...
Fake calendar invites are spreading. Here’s how to remove them and prevent more
Calendar spam is a growing problem, often arriving as email attachments or as download links in messaging apps.
www.malwarebytes.com
November 24, 2025 at 11:36 AM
Analyzing the latest Sneaky2FA Browser-in-the-Browser phishing page
pushsecurity.com/blog/analyzi...
Analyzing the latest Sneaky2FA BITB phishing page
Analyzing a BITB phishing page linked to the Sneaky2FA Phishing-as-a-Service operation.
pushsecurity.com
November 24, 2025 at 11:35 AM
Oops. Cryptographers cancel election results after losing decryption key.
arstechnica.com/security/202...
Oops. Cryptographers cancel election results after losing decryption key.
Voting system required three keys. One of them has been “irretrievably lost.”…
arstechnica.com
November 23, 2025 at 7:19 AM
How to know if your Asus router is one of thousands hacked by China-state
hacker
arstechnica.com/security/202...
How to know if your Asus router is one of thousands hacked by China-state hackers
So far, the hackers are laying low, likely for later use.
arstechnica.com
November 23, 2025 at 7:17 AM
Gmail can read your emails and attachments to train its AI, unless you opt out
www.malwarebytes.com/blog/news/20...
[Correction] Gmail can read your emails and attachments to power "smart features"
Did you know that Gmail can use your emails and attachments for its smart features? Here's how to check your settings.
www.malwarebytes.com
November 23, 2025 at 7:13 AM