Privacy + Secure Tech Corner Channel 🛡️
92 subscribers
6.69K photos
588 videos
564 files
16.3K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from The Hacker News
Microsoft and Cloudflare just nuked a global phishing empire.

🔒 338 fake domains tied to “RaccoonO365” — a $355/month phishing-as-a-service — used to steal 5,000+ Microsoft 365 passwords across 94 countries were seized in a coordinated takedown.

Full story → https://thehackernews.com/2025/09/raccoono365-phishing-network-shut-down.html
Forwarded from The Hacker News
⚠️ VPNs are failing modern security.

They give hackers room to move, lack real-time visibility & break the least-privilege rule.

🔑 Zero-trust is the only way forward—see how KeeperPAM shuts every backdoor.

Full story → https://thehackernews.com/expert-insights/2025/09/the-limitations-of-vpn-based-access-for.html
Forwarded from The Hacker News
🚨 DoJ slams BreachForums’ creator with 3 YEARS in prison

Conor “Pompompurin” Fitzpatrick, 22, finally gets hard time after an appeals court tossed his shockingly light 17-day sentence.

He ran a hacker marketplace with 14 BILLION stolen records—and was caught with child abuse material.

Full story → https://thehackernews.com/2025/09/doj-resentences-breachforums-founder-to.html
Forwarded from The Hacker News
🚨 Scattered Spider isn’t gone—and now hitting U.S. banks.

Hackers tricked an exec, hijacked Azure accounts, raided VMware servers & tried to steal cloud data.

Their “retirement” was a smokescreen.

Full story → https://thehackernews.com/2025/09/scattered-spider-resurfaces-with.html
Forwarded from The Hacker News
Meet Georgetown's cybersecurity faculty on October 2 to learn more about the Cybersecurity Risk Management master's program.

Advance your cybersecurity career with Georgetown.

👉 View event: https://thn.news/scs-cybersec-2025
Forwarded from The Hacker News
⚠️ Most “AI security” tools can’t see what your team pastes into ChatGPT or uploads to personal AI apps.

Bans? They just drive shadow AI deeper.

🔑 Real fix: last-mile, in-browser controls—redact, warn, allow—no clunky agents or network reroutes.

Full guide → https://thehackernews.com/2025/09/rethinking-ai-data-security-buyers-guide.html
Forwarded from The Hacker News
🚨 China-backed hackers just impersonated top U.S. officials to steal intel.

They posed as the House China Committee chair & the U.S.-China Business Council, luring trade experts—then slipped in a Visual Studio Code backdoor.

Here’s the full report→ https://thehackernews.com/2025/09/chinese-ta415-uses-vs-code-remote.html
Forwarded from The Hacker News
⚠️ Quantum hackers could shatter today’s encryption overnight.
🤖 AI attacks already trick 60%—breaches cost $10M+.

The cyber storm is here. Join our next expert WEBINAR to learn how to lock down your data before Q-day.

👉 Save your seat now ↓ https://thehackernews.com/2025/09/from-quantum-hacks-to-ai-defenses.html
Windows Task Scheduler has an entry (under COMODO group), COMODO Telemetry {18AD3DFA-30C0-4B5F-84F7-F1870B1A4921}

Located in:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\COMODO\COMODO Telemetry {18AD3DFA-30C0-4B5F-84F7-F1870B1A4921}


AND the actual setting is @
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{0270F065-4692-4A79-A84D-4743DFF07213}


... So, we have to disable it in Task Sheduler right-click and "Disable" which will change the "Hash" REG_BINARY value in the Registry.

Next in order for it to stick, take ownership of that Registry f. KEY https://superuser.com/questions/1682239/get-permission-for-registry-key and remove the "Full Control" entry for SYSTEM

... Leaving it as Read (Only); meaning that on next system reboot, COMODO Telemetry will remain Disabled. :)

#ShutUpAndDance
#EOF
w00t! 🙂
Forwarded from R0rt1z2’s Dumpster
Happy to share the public release of a PoC for Carbonara, a 2023 MediaTek DA1 exploit that has been used by multiple tools over the past few years but never before had a public release / information / reference.

The PoC is called penumbra, and it was fully developed from scratch by shomy! Make sure to check it out: https://github.com/shomykohai/penumbra! It also includes a great documentation.

She reverse engineered a paid GSM tool and, with a bit of help from me to understand the exploit mechanics, produced both the PoC and clear documentation explaining how the exploit works.

As a bonus, here's an MTKClient pull request that adds support for Carbonara, making the exploit available to other SoCs that aren't currently supported by penumbra.

Once again, huge thanks to shomy for the original research and implementation!
Forwarded from NoGoolag
Media is too big
VIEW IN TELEGRAM
I Built a $20,000 Military Router for $106.23
https://www.youtube.com/watch?v=ofR7GFNZzJY

The Military contacted me...

I reverse-engineered a $20,000 military IP mesh radio using just $106.23 in open-source parts. This isn't a gimmick—it's a fully functional MANET router capable of push-to-talk, GPS sharing, ATAK integration, and more. In this video, I’ll show you how I built it, tested it, and deployed it in the real world—no subscriptions, no middlemen, just raw decentralized power. Whether you're off-grid, mission-ready, or just sick of Big Tech, this changes everything.

dataslayermedia

https://openmanet.net/
https://github.com/OpenMANET/

Build your own $20,000 MANET for $97 👉 https://buildwithparallel.com/products/haven

Buy On Pre-Built
https://morosx.com/

#mesh #router #openwrt #atak
Forwarded from Tech & Leaks Zone
Interestingly:

As we know, the exploit has been patched on newer devices. From what I could confirm, devices released after in 2024 and after are patched against Carbonara, but some are still vulnerable anyway (most likely, OEMs not pulling mediatek patches in time).
Some devices I could confirm being vulnerable are:

- Moto G23/G13
- Moto G24
- Honor 200 Lite

https://github.com/bkerler/mtkclient/pull/1558#issue-3426045597