Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
581 videos
542 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from The Hacker News
🚨 This Windows trojan just became the first to weaponize Microsoft’s accessibility tools.

The Coyote malware is stealing banking and crypto logins from 75+ institutions—by reading what’s on your screen.

Here’s how it works → https://thehackernews.com/2025/07/new-coyote-malware-variant-exploits.html
Forwarded from The Hacker News
🚨 Most Kerberoasting attacks still bypass detection—despite being a 10+ year-old threat.

Why? Legacy tools miss subtle, low-and-slow attacks.

@BeyondTrust just built a statistical model that spots what rules-based tools can’t—with fewer false positives.

How it works ↓ https://thehackernews.com/2025/07/kerberoasting-detections-new-approach.html
Forwarded from Hacker News
NPM stylus package contained malicious code and was removed from the registry
Article, Comments
Media is too big
VIEW IN TELEGRAM
⚡️First eSIM Hack Hints at Phone Backdoors

A Polish security lab just hacked the eUICC—the chip that manages SIMs and stores carrier secrets. They targeted IoT devices running Kigen OS, which powers over 2 billion SIMs worldwide. By exploiting insecure Java applets, they gained access to protected memory, cloned SIMs, and exposed sensitive data that was supposed to stay locked away.

Read full article on Substack.

Even worse, Oracle shrugged off responsibility. Vulnerable Java Card setups could exist across major devices—Samsung, Apple, and possibly others.

This is why we built Above DataSIM. It skips phone numbers and SMS entirely, eliminating the usual attack surface. Pair it with Above Phone, which runs GrapheneOS out of the box, and a VPN, and you’ve got layered, resilient protection against emerging threats like this one.

🤖 Follow the show
👩‍💻
Get private phones, laptops, and tablets
📲
Learn more on our webinars
🏫
Sign up for our back to school webinar
No deleted account found from 66 scanned users from this group 🚫👻
Forwarded from The Hacker News
A hacker group just pivoted from Craft CMS to Magento & Docker—using real pentest tools to hide malware in-memory.

Even if you stop their crypto miner, they still profit off your bandwidth.

Here’s how it works ↓ https://thehackernews.com/2025/07/threat-actor-mimo-targets-magento-and.html