Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
581 videos
542 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from The Hacker News
🚨 SysAid flaw lets hackers hijack admin accounts — CISA confirms active attacks.

Attackers are exploiting two critical bugs (CVSS 9.3) to steal data & possibly execute code.

Patches are out. Deadline: Aug 12.

Full details → https://thehackernews.com/2025/07/cisa-warns-sysaid-flaws-under-active.html
Forwarded from The Hacker News
🚨 Google just launched OSS Rebuild—a powerful weapon against open-source supply chain attacks.

It rebuilds & verifies packages independently, catching tampered code others miss.

No extra work for maintainers.

Full details ↓ https://thehackernews.com/2025/07/google-launches-oss-rebuild-to-expose.html
Insecure authentication due to missing brute-force protection and runtime manipulation in Two App Studio Journey v5.5.9 for iOS (CVE-2025-41459)
Journey is a journaling app for iOS that stores personal entries and media
https://cirosec.de/en/news/vulnerability-in-two-app-studio-journey/
Forwarded from The Hacker News
🚨 Most “critical” CVEs aren’t even exploitable in your app.

Security teams are drowning in false positives—because most scanners ignore whether the vulnerable function actually runs.

Function-level runtime reachability changes everything.

Here’s what it gets right ↓ https://thehackernews.com/expert-insights/2025/07/everything-to-know-about-runtime.html
Forwarded from The Hacker News
Overexposed to risk with public images?

Get ActiveState's free secure containers—rebuilt, scanned, and now on Docker Hub.

🛡️ Cut out CVEs and patching hassle. Just pull, trust, and deploy: https://thn.news/activestate-dockerhuby
Forwarded from The Hacker News
🚨 This Windows trojan just became the first to weaponize Microsoft’s accessibility tools.

The Coyote malware is stealing banking and crypto logins from 75+ institutions—by reading what’s on your screen.

Here’s how it works → https://thehackernews.com/2025/07/new-coyote-malware-variant-exploits.html
Forwarded from The Hacker News
🚨 Most Kerberoasting attacks still bypass detection—despite being a 10+ year-old threat.

Why? Legacy tools miss subtle, low-and-slow attacks.

@BeyondTrust just built a statistical model that spots what rules-based tools can’t—with fewer false positives.

How it works ↓ https://thehackernews.com/2025/07/kerberoasting-detections-new-approach.html
Forwarded from Hacker News
NPM stylus package contained malicious code and was removed from the registry
Article, Comments
Media is too big
VIEW IN TELEGRAM
⚡️First eSIM Hack Hints at Phone Backdoors

A Polish security lab just hacked the eUICC—the chip that manages SIMs and stores carrier secrets. They targeted IoT devices running Kigen OS, which powers over 2 billion SIMs worldwide. By exploiting insecure Java applets, they gained access to protected memory, cloned SIMs, and exposed sensitive data that was supposed to stay locked away.

Read full article on Substack.

Even worse, Oracle shrugged off responsibility. Vulnerable Java Card setups could exist across major devices—Samsung, Apple, and possibly others.

This is why we built Above DataSIM. It skips phone numbers and SMS entirely, eliminating the usual attack surface. Pair it with Above Phone, which runs GrapheneOS out of the box, and a VPN, and you’ve got layered, resilient protection against emerging threats like this one.

🤖 Follow the show
👩‍💻
Get private phones, laptops, and tablets
📲
Learn more on our webinars
🏫
Sign up for our back to school webinar