Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.65K photos
579 videos
505 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from The Hacker News
🚨 Critical NVIDIA GPU bug lets attackers hijack AI containers with just 3 lines of code (CVSS 9.0).

Impacts 37% of cloud environments—risking full server takeover & model theft.

Read the full report → https://thehackernews.com/2025/07/critical-nvidia-container-toolkit-flaw.html
Forwarded from The Hacker News
🚨 Google sues 25 China-based actors behind BADBOX 2.0 — a botnet infecting 10M+ devices with malware before they even reach users.

The kicker? They used hacked TVs & apps to steal ad money from Google itself.

Details here → https://thehackernews.com/2025/07/google-sues-25-chinese-entities-over.html
Forwarded from Gizchina.com
Ulefone Armor X16 Pro Hands-On: A Perfect Balance of 10,360mAh Battery and Comfort Grip
https://www.gizchina.com/2025/07/17/ulefone-armor-x16-pro-review/
Gigabyte: Severe failures reach UEFI firmware

Researchers have discovered critical vulnerabilities in gigabyte firmware implementations, allowing attackers to disable UEFI safety mechanisms and take control of affected systems. Failures reside in System Management Mode (SMM), a highly privileged CPU mode dealing with low -level operations.

The exploitation of vulnerabilities, tracked as CVE-2025-7026 to CVE-2025-7029, allows the execution of arbitrary code before loading the operating system. This enables writing in memory specified by the attacker and the control of critical flash operations.

An attacker with local or remote administrative privileges can explore these failures to execute arbitrary code on SMM, bypassing operating system protections. Successful exploration can disable UEFI safety mechanisms such as Secure Boot.

Persistent firmware implants, not detected by traditional tools, can be installed, ensuring continuous control over the system. Binarly has identified and reported the failures, warning that these implants may persist even after reinstallation of the operating system.

Gigabyte recognized the flaws and launched firmware updates to solve them. Users should monitor Gigabyte's security site to get update instructions.

https://www.securityweek.com/flaws-in-gigabyte-firmware-allow-security-bypass-backdoor-deployment/