Forwarded from Hacker News
IT Notes
Make Your Own Backup System – Part 2: Forging the FreeBSD Backup Stronghold
Build a bulletproof backup server with FreeBSD, ZFS, and jails. Complete guide covering encryption, security hardening, and multiple backup strategies for enterprise-grade data protection.
Forwarded from Hacker News
www.google.com
🔎 bad UX – Google Search
Forwarded from cKure
■□□□□ Extract — Grep — Curl | A $50000 Bug POC Methodology.
https://infosecwriteups.com/extract-grep-curl-a-50000-bug-poc-methodology-16365489de92
https://infosecwriteups.com/extract-grep-curl-a-50000-bug-poc-methodology-16365489de92
Medium
Extract — Grep — Curl | A $50000 Bug POC Methodology
Methodology from one of the highest earned bounties
Forwarded from cKure
■■□□□ DoS campaign continue to batter Israel 🇮🇱 as disruptions continue.
In a message, by the hacker group.
In a message, by the hacker group.
The website of MEPROLIGHT an Israeli company specializing in the manufacture of optical systems and illuminated optical sights used in weapons for many militaries and law enforcement agencies around the world has been taken down
https://check-host.net/check-report/2adfe3e7kdde
https://check-host.net/check-report/2adfe1c4ke32
#DieNet
Forwarded from cKure
■■■□□ Hackers actively exploit critical RCE in WordPress Alone theme.
https://www.bleepingcomputer.com/news/security/hackers-actively-exploit-critical-rce-in-wordpress-alone-theme/
https://www.bleepingcomputer.com/news/security/hackers-actively-exploit-critical-rce-in-wordpress-alone-theme/
Forwarded from cKure
■■■■■ #️⃣ hashcat v7.0.0 released!
https://hashcat.net/forum/thread-13330.html
After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had.https://hashcat.net/forum/thread-13330.html
Please open Telegram to view this post
VIEW IN TELEGRAM
■■□□□ Interesting thread!
ChatGPT quietly scrubbed today nearly 50,000 shared conversations from Google's index.
https://fixupx.com/henkvaness/status/1951252284953763844
https://nitter.poast.org/henkvaness/status/1951252284953763844
ChatGPT quietly scrubbed today nearly 50,000 shared conversations from Google's index after our investigation. They thought they'd solved the problem. They were wrong. (1/5)
A new Digital Digging investigation, conducted with @osint77760, has uncovered 110,000 ChatGPT conversations preserved in http://Archive.org's Wayback Machine—a digital time capsule OpenAI can't touch. (2/5)
@osint77760 While OpenAI scrambled to de-index conversations from Google, they forgot the internet's most basic rule—nothing truly disappears. http://Archive.org had already captured everything. (3/5)
@osint77760 In one particularly damning conversation, an Italian-speaking lawyer for a multinational energy corporation laid bare their strategy to displace indigenous Amazonian communities. (4/5)
@osint77760 Read the full story here https://www.digitaldigging.org/p/chatgpt-confessions-gone-they-are
ChatGPT quietly scrubbed today nearly 50,000 shared conversations from Google's index.
https://fixupx.com/henkvaness/status/1951252284953763844
https://nitter.poast.org/henkvaness/status/1951252284953763844
ChatGPT quietly scrubbed today nearly 50,000 shared conversations from Google's index after our investigation. They thought they'd solved the problem. They were wrong. (1/5)
A new Digital Digging investigation, conducted with @osint77760, has uncovered 110,000 ChatGPT conversations preserved in http://Archive.org's Wayback Machine—a digital time capsule OpenAI can't touch. (2/5)
@osint77760 While OpenAI scrambled to de-index conversations from Google, they forgot the internet's most basic rule—nothing truly disappears. http://Archive.org had already captured everything. (3/5)
@osint77760 In one particularly damning conversation, an Italian-speaking lawyer for a multinational energy corporation laid bare their strategy to displace indigenous Amazonian communities. (4/5)
@osint77760 Read the full story here https://www.digitaldigging.org/p/chatgpt-confessions-gone-they-are
🧵 Thread • FixupX
𝚑𝚎𝚗𝚔 𝚟𝚊𝚗 𝚎𝚜𝚜 (@henkvaness)
ChatGPT quietly scrubbed today nearly 50,000 shared conversations from Google's index after our investigation. They thought they'd solved the problem. They were wrong. (1/5)
No deleted account found from
67 scanned users from this group 🚫👻#A16 #Official #TD #GSI #DerpFest #AOSP
Build Date: 2025 08 01
July Security Patch
DerpFest 16.0 | A16 QPR0 | TREBLE GSI OFFICIAL-signed
Changelog:
SCREENSHOTS - LINK
SUPPORT GROUP - LINK
Maintainer: Doze-off
Download: LINK
@TrebleGsis_PrivacySecure_Chat
@TrebleGsis_PrivacySecure_Channel
Build Date: 2025 08 01
July Security Patch
DerpFest 16.0 | A16 QPR0 | TREBLE GSI OFFICIAL-signed
Changelog:
Sync latest source of DerpFestNote
MicroG build
arm32_binder64 build
More little things here and there, just enjoy derpfest
Telegram file download here
circle to search works depending on your device as the feature has not been fully implemented
SCREENSHOTS - LINK
SUPPORT GROUP - LINK
Maintainer: Doze-off
Download: LINK
@TrebleGsis_PrivacySecure_Chat
@TrebleGsis_PrivacySecure_Channel
The CIA is preparing for a powerful artificial intelligence “game changer” to emerge and upend the spy business.
CIA Deputy Director Michael Ellis told The Washington Times it is “still unclear” when artificial general intelligence may arrive, but the agency is gearing up.
CIA Deputy Director Michael Ellis told The Washington Times it is “still unclear” when artificial general intelligence may arrive, but the agency is gearing up.
Forwarded from KernelSU Next
https://github.com/Kernel-SU/ksuinit/commits/master/
Ksuinit finally open sourced, so ksu is now fully open source!
Bruh i wasted time on my own ksuninit... Oh well i will fork and work on it instead.
Ksuinit finally open sourced, so ksu is now fully open source!
Bruh i wasted time on my own ksuninit... Oh well i will fork and work on it instead.
GitHub
Commits · Kernel-SU/ksuinit
Contribute to Kernel-SU/ksuinit development by creating an account on GitHub.
This media is not supported in your browser
VIEW IN TELEGRAM
Xbox to introduce age verification in the UK.
You know it's getting pretty bad, when the government, starts to fully want verification of your ID to play a video game....
This is purely wanted for surveillance and analyzing the information used while people are chatting with friends. So if you try to use other ways of communication, you're linked to your government ID. No anonymity.
https://news.xbox.com/en-us/2025/07/28/xbox-age-verification-uk/
You know it's getting pretty bad, when the government, starts to fully want verification of your ID to play a video game....
This is purely wanted for surveillance and analyzing the information used while people are chatting with friends. So if you try to use other ways of communication, you're linked to your government ID. No anonymity.
https://news.xbox.com/en-us/2025/07/28/xbox-age-verification-uk/
Forwarded from The Hacker News
🚨 Akira ransomware is hitting SonicWall SSL VPNs—some fully patched.
Researchers suspect a zero-day or credential abuse. Attacks surged in late July.
Org? Disable SSL VPN until further notice.
Full details ↓ https://thehackernews.com/2025/08/akira-ransomware-exploits-sonicwall.html
Researchers suspect a zero-day or credential abuse. Attacks surged in late July.
Org? Disable SSL VPN until further notice.
Full details ↓ https://thehackernews.com/2025/08/akira-ransomware-exploits-sonicwall.html
https://linuxmint.hu/hir/2025/08/ujabb-rosszindulatu-program-az-arch-aur-ban
Another Malware Found in Arch AUR
Another Malware Found in Arch AUR: Another Malicious Code Found in the Popular Package Repository
Just ten days after the previous incident, another malicious software was found among the Arch Linux AUR packages. This time, the attackers hid a Remote Access Trojan (RAT) in a seemingly harmless package disguised as a browser.
What exactly happened?
The AUR (Arch User Repository) is a collection of software created by the Arch Linux community and maintained by users, which many consider to be one of the greatest advantages of Arch, almost a “hidden treasure”. However, due to its completely open upload system, it can also become a target for malware.
After the previous incident ten days ago, a Remote Access Trojan (RAT) has now been added to the package repository. This time, the malicious code was hidden in a package called google-chrome-stable. The package not only installed the Google Chrome browser, but also used a Python script to download and run an external resource containing the malicious code every time it was started.
This type of malware can give attackers full access to the infected machine, allowing them to steal data, install additional malicious software, or even spy on it.
How did the package get uploaded?
The problematic package was uploaded by a newly registered user under the username “forsenontop”. In the PKGBUILD file, an install script (google-chrome-bin.install) called a launcher script (google-chrome-stable.sh) that ran a Python command with the -c option before Chrome was launched. This command pulled in an external resource on every launch, which downloaded the malware.
The good news is that the package was only available in the AUR for a few hours before it was detected and immediately removed by administrators. However, it still received a few upvotes, suggesting that several users may have already installed it.
What should affected users do?
If someone has installed the malicious package, they should immediately remove it and run a full security scan on their system. However, experts in the Arch community say that the safest solution is a full system reinstall (OS preinstall) to rule out any backdoors or hidden malicious code.
What’s the lesson?
This incident once again highlights that while the AUR is an extremely useful resource, the security of packages is not the responsibility of the official Arch Linux developers, but rather the community.
The incident clearly demonstrates how easy it is to upload a legitimate-looking package using a fake account. That’s why it’s important for users to always check the history of a package:
Check how long the package has been around.
Check the uploader’s reputation and the contents of the PKGBUILD file.
Avoid freshly uploaded packages with no history, even if the name seems official.
Browsers, as in the previous incident, are a particularly attractive target for attackers, as they are among the most widely used software.
Strengthen your future protection
Always check the PKGBUILD contents before installing:
yay -G packagename cd packagename less PKGBUILD
Avoid newly uploaded packages. If the AUR package has no history or reviews, it is not recommended to install it.
Another Malware Found in Arch AUR
Another Malware Found in Arch AUR: Another Malicious Code Found in the Popular Package Repository
Just ten days after the previous incident, another malicious software was found among the Arch Linux AUR packages. This time, the attackers hid a Remote Access Trojan (RAT) in a seemingly harmless package disguised as a browser.
What exactly happened?
The AUR (Arch User Repository) is a collection of software created by the Arch Linux community and maintained by users, which many consider to be one of the greatest advantages of Arch, almost a “hidden treasure”. However, due to its completely open upload system, it can also become a target for malware.
After the previous incident ten days ago, a Remote Access Trojan (RAT) has now been added to the package repository. This time, the malicious code was hidden in a package called google-chrome-stable. The package not only installed the Google Chrome browser, but also used a Python script to download and run an external resource containing the malicious code every time it was started.
This type of malware can give attackers full access to the infected machine, allowing them to steal data, install additional malicious software, or even spy on it.
How did the package get uploaded?
The problematic package was uploaded by a newly registered user under the username “forsenontop”. In the PKGBUILD file, an install script (google-chrome-bin.install) called a launcher script (google-chrome-stable.sh) that ran a Python command with the -c option before Chrome was launched. This command pulled in an external resource on every launch, which downloaded the malware.
The good news is that the package was only available in the AUR for a few hours before it was detected and immediately removed by administrators. However, it still received a few upvotes, suggesting that several users may have already installed it.
What should affected users do?
If someone has installed the malicious package, they should immediately remove it and run a full security scan on their system. However, experts in the Arch community say that the safest solution is a full system reinstall (OS preinstall) to rule out any backdoors or hidden malicious code.
What’s the lesson?
This incident once again highlights that while the AUR is an extremely useful resource, the security of packages is not the responsibility of the official Arch Linux developers, but rather the community.
The incident clearly demonstrates how easy it is to upload a legitimate-looking package using a fake account. That’s why it’s important for users to always check the history of a package:
Check how long the package has been around.
Check the uploader’s reputation and the contents of the PKGBUILD file.
Avoid freshly uploaded packages with no history, even if the name seems official.
Browsers, as in the previous incident, are a particularly attractive target for attackers, as they are among the most widely used software.
Strengthen your future protection
Always check the PKGBUILD contents before installing:
yay -G packagename cd packagename less PKGBUILD
Avoid newly uploaded packages. If the AUR package has no history or reviews, it is not recommended to install it.