Forwarded from The Hacker News
🚨 Russia-backed hackers used Signal chat to drop malware-laced Word docs on Ukrainian systems.
The twist? One image file secretly loads an in-memory attack chain that evades detection.
Learn what BEARDSHELL & COVENANT really do ↓ https://thehackernews.com/2025/06/apt28-uses-signal-chat-to-deploy.html
The twist? One image file secretly loads an in-memory attack chain that evades detection.
Learn what BEARDSHELL & COVENANT really do ↓ https://thehackernews.com/2025/06/apt28-uses-signal-chat-to-deploy.html
Forwarded from The Hacker News
🚨 U.S. House just banned WhatsApp for all staff over major security concerns.
Lack of data transparency. No stored encryption. “High-risk,” says the memo.
Meta's furious—but it's official.
Full story → https://thehackernews.com/2025/06/us-house-bans-whatsapp-on-official.html
Lack of data transparency. No stored encryption. “High-risk,” says the memo.
Meta's furious—but it's official.
Full story → https://thehackernews.com/2025/06/us-house-bans-whatsapp-on-official.html
Forwarded from The Hacker News
🚨 Hackers are hijacking misconfigured Docker APIs to run crypto miners—through the Tor network.
They mount the host OS, enable root SSH access, and drop XMRig—all while staying anonymous.
Here’s how it works → https://thehackernews.com/2025/06/hackers-exploit-misconfigured-docker.html
They mount the host OS, enable root SSH access, and drop XMRig—all while staying anonymous.
Here’s how it works → https://thehackernews.com/2025/06/hackers-exploit-misconfigured-docker.html
Forwarded from Hacker News
Electronic Frontier Foundation
The NO FAKES Act Has Changed – and It’s So Much Worse
A bill purporting to target the issue of misinformation and defamation caused by generative AI has mutated into something that could change the internet forever, harming speech and innovation from
Forwarded from It's FOSS
This media is not supported in your browser
VIEW IN TELEGRAM
You were supposed to destroy them, not join them 🥲
Forwarded from The Hacker News
🚨 Attackers are hijacking Microsoft Exchange login pages to steal passwords in plain text.
No malware download. No outbound traffic. Just invisible JavaScript keyloggers hiding in plain sight.
65 victims across 26 countries—and counting.
Details → https://thehackernews.com/2025/06/hackers-target-65-microsoft-exchange.html
No malware download. No outbound traffic. Just invisible JavaScript keyloggers hiding in plain sight.
65 victims across 26 countries—and counting.
Details → https://thehackernews.com/2025/06/hackers-target-65-microsoft-exchange.html
Forwarded from Hacker News
starship.rs
Starship: Cross-Shell Prompt
Starship is the minimal, blazing fast, and extremely customizable prompt for any shell! Shows the information you need, while staying sleek and minimal. Quick installation available for Bash, Fish, ZSH, Ion, Tcsh, Elvish, Nu, Xonsh, Cmd, and Powershell.
Forwarded from Hacker News
Forwarded from Gizchina.com
Ulefone Armor 34 Pro with Super Projector Is A 25500mAh Power Giant
https://www.gizchina.com/2025/06/24/ulefone-armor-34-pro-with-super-projector-is-a-25500mah-power-giant/
https://www.gizchina.com/2025/06/24/ulefone-armor-34-pro-with-super-projector-is-a-25500mah-power-giant/
Forwarded from Gizchina.com
HyperOS 2.2 Rolling Out to Xiaomi, Redmi, and POCO Phones in Europe
https://www.gizchina.com/2025/06/24/hyperos-2-2-rolling-out-to-xiaomi-redmi-and-poco-phones-in-europe/
https://www.gizchina.com/2025/06/24/hyperos-2-2-rolling-out-to-xiaomi-redmi-and-poco-phones-in-europe/
No deleted account found from
59 scanned users from this group 🚫👻Forwarded from The Hacker News
⚡ You patch CVEs. Hackers exploit what’s exposed—over-permissioned accounts, forgotten assets, weak logins.
Top CISOs explain why CTEM > vuln management—and how to make it work in the real world.
Here’s how they’re doing it → https://thehackernews.com/2025/06/between-buzz-and-reality-ctem.html
Top CISOs explain why CTEM > vuln management—and how to make it work in the real world.
Here’s how they’re doing it → https://thehackernews.com/2025/06/between-buzz-and-reality-ctem.html
Forwarded from The Hacker News
đź’Ą Researchers just shut down a cryptominer making $26K/year, dropping its hashrate from 3.3M to zero in seconds using XMRogue and bad shares!
This method forced the attacker to lose 76% of revenue and disrupt their operation.
Details here → https://thehackernews.com/2025/06/researchers-find-way-to-shut-down.html
This method forced the attacker to lose 76% of revenue and disrupt their operation.
Details here → https://thehackernews.com/2025/06/researchers-find-way-to-shut-down.html
Forwarded from Tech & Leaks Zone
When your phone starts decomposing before your contract ends. #PocoLife
https://www.reddit.com/r/PocoPhones/s/pTHRHHHdME
https://www.reddit.com/r/PocoPhones/s/pTHRHHHdME
Forwarded from Android Security & Malware
This media is not supported in your browser
VIEW IN TELEGRAM
FileFix – New Alternative to ClickFix Attack
https://www.mobile-hacker.com/2025/06/24/introducing-filefix-a-new-alternative-to-clickfix-attacks/
https://www.mobile-hacker.com/2025/06/24/introducing-filefix-a-new-alternative-to-clickfix-attacks/
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
📱 Fool’s Gold: Trump Phone Not Made In America
Trump Mobile promises a U.S.-made phone — but it’s phone’s specifications and appearance match a T-Mobile REVVL 7 Pro 5G.
This makes Trump Phone a re-skinned device, imported from China, and painted gold.The phone can’t be made in the U.S. At best, parts are assembled here.
Now to Trump Mobile, it also fails to impress - its re-selling the three major US carriers. But there is one thing that stands out.
In Trump Mobile’s privacy policy, in addition to the many tracking technologies they use, they also use an Artifical Intelligence and Automated Decision making system. The play here seems like a targetting advertising play. By using the phone, it gets to know who you are, and then Trump Mobile can serve you with targetted ads left and right.
This isn’t about freedom — it’s data exploitation wrapped in patriotism.
Want solutions? Read the full article on Substack
Watch this full episode
Follow the #TBOT Show
Get privacy gear
Trump Mobile promises a U.S.-made phone — but it’s phone’s specifications and appearance match a T-Mobile REVVL 7 Pro 5G.
This makes Trump Phone a re-skinned device, imported from China, and painted gold.The phone can’t be made in the U.S. At best, parts are assembled here.
Now to Trump Mobile, it also fails to impress - its re-selling the three major US carriers. But there is one thing that stands out.
In Trump Mobile’s privacy policy, in addition to the many tracking technologies they use, they also use an Artifical Intelligence and Automated Decision making system. The play here seems like a targetting advertising play. By using the phone, it gets to know who you are, and then Trump Mobile can serve you with targetted ads left and right.
This isn’t about freedom — it’s data exploitation wrapped in patriotism.
Want solutions? Read the full article on Substack
Watch this full episode
Follow the #TBOT Show
Get privacy gear
Forwarded from Hacker News
Mrbruh
ASUSpicious Flaw - Millions of Users’ Information Exposed Since 2022
ASUSpicious Flaw - Millions of Users’ Information Exposed Since 2022 Please note that it’s not particularly suspicious, it just made for a good play-on-words title.
Introduction What do most people do when they’re mistreated by a multi-billion dollar company…
Introduction What do most people do when they’re mistreated by a multi-billion dollar company…