Forwarded from Hacker News
Anthropic
Anthropic awarded $200M DOD agreement for AI capabilities
The U.S. Department of Defense (DOD), through its Chief Digital and Artificial Intelligence Office (CDAO), has awarded Anthropic a two-year prototype other transaction agreement with a $200 million ceiling. As part of the agreement, Anthropic will prototype…
Forwarded from It's FOSS
Why did my Arch update just eat 30 GB? 😩
Here's what happened.
https://itsfoss.com/aur-electron-update-issue/
Here's what happened.
https://itsfoss.com/aur-electron-update-issue/
It's FOSS
The Curious Case of AUR Fetching 30 GB for Electron Updates
No one has time for a 30 GB update, right?
No deleted account found from
64 scanned users from this group 🚫👻Forwarded from The Hacker News
🚨 The bait? Fake coding assignments.
North Korean hackers pushed 67 new malware-laced npm packages—over 17K downloads already.
They’re now using a stealthier loader called XORIndex to hijack dev machines, steal crypto, and drop Python backdoors.
Read → https://thehackernews.com/2025/07/north-korean-hackers-flood-npm-registry.html
North Korean hackers pushed 67 new malware-laced npm packages—over 17K downloads already.
They’re now using a stealthier loader called XORIndex to hijack dev machines, steal crypto, and drop Python backdoors.
Read → https://thehackernews.com/2025/07/north-korean-hackers-flood-npm-registry.html
Forwarded from The Hacker News
🚨 AsyncRAT didn’t just survive—it multiplied.
Since its 2019 GitHub release, this open-source trojan has spawned a swarm of powerful variants like DCRat and Venom RAT—stealing webcams, logging keystrokes, evading antivirus, and more.
Details here → https://thehackernews.com/2025/07/asyncrats-open-source-code-sparks-surge.html
Since its 2019 GitHub release, this open-source trojan has spawned a swarm of powerful variants like DCRat and Venom RAT—stealing webcams, logging keystrokes, evading antivirus, and more.
Details here → https://thehackernews.com/2025/07/asyncrats-open-source-code-sparks-surge.html
Forwarded from Gizchina.com
Xiaomi Holds Strong in Q2 2025, Ships 42.5 Million Phones Despite Industry Challenges
https://www.gizchina.com/2025/07/15/xiaomi-holds-strong-in-q2-2025-ships-42-5-million-phones-despite-industry-challenges/
https://www.gizchina.com/2025/07/15/xiaomi-holds-strong-in-q2-2025-ships-42-5-million-phones-despite-industry-challenges/
Forwarded from Gizchina.com
Nvidia to Resume AI Chip Sales in China After Trump Meeting
https://www.gizchina.com/2025/07/15/nvidia-to-resume-ai-chip-sales-in-china-after-trump-meeting/
https://www.gizchina.com/2025/07/15/nvidia-to-resume-ai-chip-sales-in-china-after-trump-meeting/
Forwarded from Android Security & Malware
eSIM might not be as safe as you think: researchers hack and clone numbers
https://security-explorations.com/esim-security.html
https://security-explorations.com/esim-security.html
Forwarded from Android Security & Malware
This media is not supported in your browser
VIEW IN TELEGRAM
Include computers into Bluetooth mesh network for Bitchat app
✅️ More devices = more nodes
✅️ Wider communication range https://github.com/kaganisildak/bitchat-python
✅️ More devices = more nodes
✅️ Wider communication range https://github.com/kaganisildak/bitchat-python
Forwarded from Android Security & Malware
Fake Android Money Transfer App Targeting Bengali-Speaking Users
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/fake-android-money-transfer-app-targeting-bengali-speaking-users/
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/fake-android-money-transfer-app-targeting-bengali-speaking-users/
McAfee Blog
Fake Android Money Transfer App Targeting Bengali-Speaking Users | McAfee Blog
Authored by Dexter Shin McAfee’s Mobile Research Team discovered a new and active Android malware campaign targeting Bengali-speaking users, mainly
Forwarded from Android Security & Malware
RaspyJack
Turn a Raspberry Pi Zero 2 W + Waveshare 1.44″ LCD into a pocket-sized, SharkJack-style network multitool.
Key features:
• Recon: Multi-profile Nmap scans
• Shells: Reverse-shell launcher (pick IP on the fly or use a preset)
• Creds Capture: Responder, ARP MITM + sniff, DNS-spoof phishing
• Loot Viewer: Read Nmap / Responder / DNSSpoof logs on the screen
https://github.com/7h30th3r0n3/Raspyjack
Turn a Raspberry Pi Zero 2 W + Waveshare 1.44″ LCD into a pocket-sized, SharkJack-style network multitool.
Key features:
• Recon: Multi-profile Nmap scans
• Shells: Reverse-shell launcher (pick IP on the fly or use a preset)
• Creds Capture: Responder, ARP MITM + sniff, DNS-spoof phishing
• Loot Viewer: Read Nmap / Responder / DNSSpoof logs on the screen
https://github.com/7h30th3r0n3/Raspyjack
Forwarded from The Hacker News
🚨 Sick of chasing meaningless vuln alerts?
Function-level runtime reachability shows only the code that's actually executing—no fluff, no false positives.
It’s like turning off the noise and seeing just the real threats.
Here’s why it changes everything ↓ https://thehackernews.com/expert-insights/2025/07/everything-to-know-about-runtime.html
Function-level runtime reachability shows only the code that's actually executing—no fluff, no false positives.
It’s like turning off the noise and seeing just the real threats.
Here’s why it changes everything ↓ https://thehackernews.com/expert-insights/2025/07/everything-to-know-about-runtime.html
Forwarded from cKure Red
Their findings indicate that EFR systems employ an
Please open Telegram to view this post
VIEW IN TELEGRAM