Forwarded from Hacker News
OTF
Who Owns, Operates, and Develops Your VPN Matters: An analysis of transparency vs. anonymity in the VPN ecosystem, and implications…
New research: Eight popular, commercial VPN apps operate deceptively and put more than 700 million users at risk of authoritarian surveillance.
Forwarded from The Hacker News
🚨 Hackers were caught hiding malware inside Ethereum smart contracts.
Two npm packages used blockchain tricks to drop payloads on dev systems—part of a wider fake crypto-trading-bot campaign on GitHub.
The new frontier of supply chain attacks → https://thehackernews.com/2025/09/malicious-npm-packages-exploit-ethereum.html
Two npm packages used blockchain tricks to drop payloads on dev systems—part of a wider fake crypto-trading-bot campaign on GitHub.
The new frontier of supply chain attacks → https://thehackernews.com/2025/09/malicious-npm-packages-exploit-ethereum.html
Forwarded from Root Detector (Reveny)
native-root-detector-v7.4.0.apk
15.3 MB
- Toggle for custom rom detection
- Follow system theme
- Fix crash issues
- New Zygisk Detection
- Shamiko detection
- Fix TrickyStore detection
- New mounts detection
- New HMA detection
- New abnormal Package Manager detection
And a special thanks to all contributors who helped make this release possible.
- Follow system theme
- Fix crash issues
- New Zygisk Detection
- Shamiko detection
- Fix TrickyStore detection
- New mounts detection
- New HMA detection
- New abnormal Package Manager detection
And a special thanks to all contributors who helped make this release possible.
Forwarded from It's FOSS
YouTube
Lesser Known Top command Usage: Useful Flags and Interactive Keys
The top command is one of the most popular tools to monitor processes in Linux. But most users only know the basics and use it only to check which process is eating up the CPU.
In this video, we explore the lesser known options, interactive shortcuts, and…
In this video, we explore the lesser known options, interactive shortcuts, and…
Forwarded from GSMArena (IFTTT)
YouTube is now going after Premium Family Plan accounts that aren't in the same location
https://ift.tt/26nvu5t
https://ift.tt/26nvu5t
GSMArena.com
YouTube is now going after Premium Family Plan accounts that aren't in the same location
Their perks will be suspended in 14 days. YouTube is now following in the footsteps of Netflix and Disney+, as it's started to crack down on usage of...
🔥Infinity X 3.2 custom rom and gsi update brings
🚀 Strong, basic and device integrity fix
🔥Amazing performance
💯New features
😎Try right now on any device
https://youtu.be/MIC-IHy14x8
🚀 Strong, basic and device integrity fix
🔥Amazing performance
💯New features
😎Try right now on any device
https://youtu.be/MIC-IHy14x8
YouTube
Strong integrity fix using Infinity X 3.2 custom gsi rom🚀
Hey what's up guys welcome back you are watching 4U tech in the world of custom roms and gsi there are few highly Customizable roms on of that is infinity X.
We already uploaded and indepth reviewed all builds of infinity X at our channel. If you watch…
We already uploaded and indepth reviewed all builds of infinity X at our channel. If you watch…
Forwarded from The Hacker News
🛡️ Cyberattacks are hitting endpoints harder than ever.
Gartner’s 2025 report just confirmed: SentinelOne remains a Leader in endpoint protection — for the 5th year straight.
What that says about AI-driven defense ↓ https://thehackernews.com/2025/07/ai-driven-trends-in-endpoint-security.html
Gartner’s 2025 report just confirmed: SentinelOne remains a Leader in endpoint protection — for the 5th year straight.
What that says about AI-driven defense ↓ https://thehackernews.com/2025/07/ai-driven-trends-in-endpoint-security.html
Forwarded from The Hacker News
🚨 CISA just flagged 2 new TP-Link router flaws as actively exploited—one allows remote code execution, the other leaks passwords.
Many of the affected models are end-of-life. No more patches coming.
Here’s what you need to know ↓ https://thehackernews.com/2025/09/cisa-flags-tp-link-router-flaws-cve.html
Many of the affected models are end-of-life. No more patches coming.
Here’s what you need to know ↓ https://thehackernews.com/2025/09/cisa-flags-tp-link-router-flaws-cve.html
Forwarded from The Hacker News
🇫🇷 France just fined Google €325M and Shein €150M for breaking cookie consent laws.
Both pushed ads on users without clear permission. Google now has 6 months to comply—or pay €100k per day.
Full story → https://thehackernews.com/2025/09/google-fined-379-million-by-french.html
Both pushed ads on users without clear permission. Google now has 6 months to comply—or pay €100k per day.
Full story → https://thehackernews.com/2025/09/google-fined-379-million-by-french.html
Forwarded from Hacker News
Is Google Down? - EU networking issue
Article, Comments
Article, Comments
Might be of interest for devs and users that don't want to stay with Google
https://sfconservancy.org/blog/2025/sep/03/sfc-qa-on-how-to-keep-your-sideloading/
"Phone freedom tips, and related Q&A" video chat details:
Friday, Sep 5 (2025), at 15:00 UTC (08:00 US/Pacific, 11:00 US/Eastern, 17:00 CEST)
https://sfconservancy.org/blog/2025/sep/03/sfc-qa-on-how-to-keep-your-sideloading/
"Phone freedom tips, and related Q&A" video chat details:
Friday, Sep 5 (2025), at 15:00 UTC (08:00 US/Pacific, 11:00 US/Eastern, 17:00 CEST)
Software Freedom Conservancy
Join SFC for a Q&A on how to keep your sideloading, and other phone freedom tips
You may have heard that Google will be limiting sideloading in the next few months, which is likely to be enforced through Google Play Services, something that runs on virtually all Android phones. Google plans include blocking sideloading of apps where…
No deleted account found from
82 scanned users from this group 🚫👻Forwarded from The Hacker News
Cybercriminals are exploiting a loophole with X’s AI assistant Grok.
They trick it into sharing malicious links in promoted posts—links that normally should be blocked—reaching millions of users.
Researchers call it “Grokking.”
Here’s how it works ↓ https://thehackernews.com/2025/09/cybercriminals-exploit-xs-grok-ai-to.html
They trick it into sharing malicious links in promoted posts—links that normally should be blocked—reaching millions of users.
Researchers call it “Grokking.”
Here’s how it works ↓ https://thehackernews.com/2025/09/cybercriminals-exploit-xs-grok-ai-to.html