Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
579 videos
530 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
No deleted account found from 64 scanned users from this group 🚫👻
Forwarded from The Hacker News
🚨 The bait? Fake coding assignments.

North Korean hackers pushed 67 new malware-laced npm packages—over 17K downloads already.

They’re now using a stealthier loader called XORIndex to hijack dev machines, steal crypto, and drop Python backdoors.

Read → https://thehackernews.com/2025/07/north-korean-hackers-flood-npm-registry.html
Forwarded from The Hacker News
🚨 AsyncRAT didn’t just survive—it multiplied.

Since its 2019 GitHub release, this open-source trojan has spawned a swarm of powerful variants like DCRat and Venom RAT—stealing webcams, logging keystrokes, evading antivirus, and more.

Details here → https://thehackernews.com/2025/07/asyncrats-open-source-code-sparks-surge.html
eSIM might not be as safe as you think: researchers hack and clone numbers
https://security-explorations.com/esim-security.html
This media is not supported in your browser
VIEW IN TELEGRAM
Include computers into Bluetooth mesh network for Bitchat app
✅️ More devices = more nodes
✅️ Wider communication range https://github.com/kaganisildak/bitchat-python
RaspyJack
Turn a Raspberry Pi Zero 2 W + Waveshare 1.44″ LCD into a pocket-sized, SharkJack-style network multitool.
Key features:
• Recon: Multi-profile Nmap scans
• Shells: Reverse-shell launcher (pick IP on the fly or use a preset)
• Creds Capture: Responder, ARP MITM + sniff, DNS-spoof phishing
• Loot Viewer: Read Nmap / Responder / DNSSpoof logs on the screen
https://github.com/7h30th3r0n3/Raspyjack
Forwarded from The Hacker News
🚨 Sick of chasing meaningless vuln alerts?

Function-level runtime reachability shows only the code that's actually executing—no fluff, no false positives.

It’s like turning off the noise and seeing just the real threats.

Here’s why it changes everything ↓ https://thehackernews.com/expert-insights/2025/07/everything-to-know-about-runtime.html
Forwarded from cKure Red
🔥Fabian Bräunlein and Luca Melette, security researchers, have recently unveiled their research on European streetlights and power plants, which utilize the radio ripple control system developed by EFR.

Their findings indicate that EFR systems employ an 💣 unencrypted RF 🚨 protocol to transmit control commands via longwave radio to a multitude of devices, including relays in solar/wind plants, heat pumps, and streetlights.

🔥Upon being notified of these research findings, the company responded by threatening the researchers with legal action; however, 🐉the research has since been published.

📹https://youtu.be/DAf-T3bFJFs
📰https://positive.security/blog/blinkencity-38c3
📰https://fahrplan.events.ccc.de/congress/2024/fahrplan/media/38c3/submissions/HSNZGR/resources/20241228-BlinkenCity-38c3_53qew19.pdf
Please open Telegram to view this post
VIEW IN TELEGRAM