Forwarded from The Hacker News
🚨 Google patched 120 Android security flaws — including 2 already exploited in real-world attacks.
Hackers don’t need your clicks. They don’t need your permission. They’re already in.
Update immediately. Full story → https://thehackernews.com/2025/09/android-security-alert-google-patches.html
Hackers don’t need your clicks. They don’t need your permission. They’re already in.
Update immediately. Full story → https://thehackernews.com/2025/09/android-security-alert-google-patches.html
Forwarded from The Hacker News
⚠️ Hackers are already weaponizing HexStrike AI—a tool built for ethical hacking—to exploit fresh Citrix flaws.
What was meant to protect networks is now fueling real-world cyberattacks at scale.
Patch fast. Details here → https://thehackernews.com/2025/09/threat-actors-weaponize-hexstrike-ai-to.html
What was meant to protect networks is now fueling real-world cyberattacks at scale.
Patch fast. Details here → https://thehackernews.com/2025/09/threat-actors-weaponize-hexstrike-ai-to.html
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
WhatsCLI
A command-line WhatsApp client written in Go and highly riceable with Lua scripts
🔗 Links:
- Installation
- Screenshots
- Features
- Source code
Developer: ArturCSega
🏷 Tags: #Social #MacOS #Windows #Linux
A command-line WhatsApp client written in Go and highly riceable with Lua scripts
🔗 Links:
- Installation
- Screenshots
- Features
- Source code
Developer: ArturCSega
❤️ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
⭐ Star the repo/app
☕ Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests
🏷 Tags: #Social #MacOS #Windows #Linux
Forwarded from GSMArena (IFTTT)
Here's our first look at the Infinix GT 30's Shadow Ash model launching globally next week
https://ift.tt/naAC9KL
https://ift.tt/naAC9KL
GSMArena.com
Here's our first look at the Infinix GT 30's Shadow Ash model launching globally next week
The Infinix GT 30 is available in India in three colors, but it will make its global debut with four color options. Yesterday, we exclusively reported that...
Forwarded from The Hacker News
Media is too big
VIEW IN TELEGRAM
Still in the dark about your identity risks? BeyondTrust flips the switch 💡
Their complimentary Identity Security Risk Assessment gives you rapid clarity on hidden privilege risks & best remediation steps.
Try it out today ⤵️ https://thn.news/secure-identity-check
Their complimentary Identity Security Risk Assessment gives you rapid clarity on hidden privilege risks & best remediation steps.
Try it out today ⤵️ https://thn.news/secure-identity-check
Forwarded from Hacker News
Brendan Long
%CPU Utilization Is A Lie
I deal with a lot of servers at work, and one thing everyone wants to know about their servers is how close they are to being at max utilization. It should be easy, right? Just pull up top or another system monitor tool, look at network, memory and CPU utilization…
Forwarded from Hacker News
Alexander Popov
Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel
Some memory corruption bugs are much harder to exploit than others. They can involve race conditions, crash the system, and impose limitations that make a researcher's life difficult. Working with such fragile vulnerabilities demands significant time and…
Forwarded from Hacker News
Forwarded from Hacker News
GitHub
GitHub - Tencent-Hunyuan/HunyuanWorld-Voyager: Voyager is an interactive RGBD video generation model conditioned on camera input…
Voyager is an interactive RGBD video generation model conditioned on camera input, and supports real-time 3D reconstruction. - Tencent-Hunyuan/HunyuanWorld-Voyager
Forwarded from Hacker News
actu.epfl.ch
Apertus: a fully open, transparent, multilingual language model
EPFL, ETH Zurich and the Swiss National Supercomputing Centre (CSCS) released Apertus today, Switzerland’s first large-scale, open, multilingual language model — a milestone in generative AI for transparency and diversity.
Forwarded from cKure
■■□□□ News circulating online.
Cloudflare just blocked the largest DDOS attack of all time at 11.5 Tbps. The attack was a UDP flood that came from Google Cloud.
Cloudflare just blocked the largest DDOS attack of all time at 11.5 Tbps. The attack was a UDP flood that came from Google Cloud.
Russia To Mandate Preinstallation Of State Messaging App Max And Rustore On All Smartphones And Tablets
https://github.com/KARENKING112/max-deep-analysis-of-the-messenger
Here's a deep analysis of it.
https://github.com/KARENKING112/max-deep-analysis-of-the-messenger
Here's a deep analysis of it.
General report on the analysis of the application "Max"
General information about the "Max" app: The Max application is positioned as a fast and easy messenger for communication. High-quality calls, animated stickers, sending files up to 4 GB, as well as the presence of chatbots and mini-applications are declared. It is distributed on various platforms: Android (via Google Play, RuStore, AppGallery, iOS (via the App Store) and desktop versions. The application package - ru.oneme.app(According to Android Manifest.xml).
Code obfuscation: A significant part of the application code, especially in the module com.my.tracker.obfuscated, subjected to obfuscation. Names of classes (e0, c1, y2, b3, f1etc.), methods (a(), b(), c()) and variables in these osted files are meaningless and short, which makes the analysis of the logic of the application extremely difficult without debfusion. Oceanscape is often used to difficulty in reverse designing and hiding the true functions of code.
Data collected (MyTracker module): Module com.my.tracker(Judges by MyTracker.java, MyTrackerConfig.java, MyTrackerParams.java) is responsible for the extensive collection of user data and events.
The main categories of data collected:
User events :
Promotional events (trackAdEvent): Information about interaction with advertising.
Events of purchases (trackAppGalleryPurchaseEvent, trackPurchaseEvent): Details of purchases, including product ID, prices, currency, and additional parameters.
General user events (trackEvent): Universal collection of arbitrary events with customizable parameters (e.g. event name, category, value).
Events of invitations (trackInviteEvent): Tracking User invitations.
Start of applications (trackLaunchManually): Fixing each manual application start.
Level Events (trackLevelEvent): User progress by level.
Entrance Events (trackLoginEvent): User input information, including ID and login method.
Events of mini-applications (trackMiniAppEvent): User activity in mini-applications.
Events of registration (trackRegistrationEvent): Details about the user registration process.
Time spent in the annex/event (incrementEventTimeSpent, startAnytimeTimeSpent, stopAnytimeTimeSpent, startForegroundTimeSpent, stopForegroundTimeSpent): Detailed statistics of application use.
Personal data of the user :
Age (getAge, setAge)
Paul (getGender, setGender)
User ID (getCustomUserId/getCustomUserIds, setCustomUserId/setCustomUserIds)
Email Addresses (getEmail/getEmails, setEmail/setEmails)
ID from messengers and social networks: ICQ ID (getIcqIdOK.ru ID (getOkId), VK Connect ID (getVkConnectId), VK ID (getVkId)
Phone numbers (getPhone/getPhones, setPhone/setPhones)
Interface language (getLang, setLang)
Special IDs associated with MRGS (getMrgsAppId, getMrgsId, getMrgsUserId)
Arbitrary custom parameters (getCustomParam, setCustomParam): Allow developers to collect any additional information.
Attribution data :
Diplinki ( getDeeplinkFrom MyTrackerAttribution: Sources of user transfer to the application (e.g., from advertising campaigns or external links).
Data and system with it (Android Manifest.xml): File AndroidManifest.xmldescribes the requested permissions and components that allow the application to interact with the operating system and collect system data.
The main requested permissions:
Access to the network and location:
android.permission.INTERNET: Full access to the network.
android.permission.ACCESS_WIFI_STATE, android.permission.ACCESS_NETWORK_STATE, android.permission.CHANGE_NETWORK_STATE, android.permission.CHANGE_WIFI_STATE: Access to the state of Wi-Fi and cellular network, the ability to change their condition.
GitHub
GitHub - KARENKING112/max-deep-analysis-of-the-messenger
Contribute to KARENKING112/max-deep-analysis-of-the-messenger development by creating an account on GitHub.
Forwarded from cKure Red
https://hackers-arise.com/the-one-man-apt-part-i-a-picture-that-can-execute-code-on-the-target/
Please open Telegram to view this post
VIEW IN TELEGRAM