Forwarded from The Hacker News
๐ Researchers uncover DeepSeekโs XSS vulnerability and Anthropicโs Claudeโs โZombAIsโ technique, revealing how prompt injection can hijack user accounts and execute malicious commands.
Learn how these attacks work: https://thehackernews.com/2024/12/researchers-uncover-prompt-injection.html
Learn how these attacks work: https://thehackernews.com/2024/12/researchers-uncover-prompt-injection.html
Forwarded from The Hacker News
Exabyte-scale data is here, and traditional methods canโt handle the challenges of securing it across multi-cloud environments.
Learn how Sentraโs Data Security Platform helps organizations tackle these challenges.
Read: https://thn.news/sentra-exabyte-data-security
Learn how Sentraโs Data Security Platform helps organizations tackle these challenges.
Read: https://thn.news/sentra-exabyte-data-security
www.sentra.io
Achieve Exabyte Scale Enterprise Data Security | Sentra
Enterprise data security is harder with growing data and multi-cloud environments. Discover how Sentraโs DSP offers smart, scalable solutions to protect it.
Forwarded from ๐ฝ๐ผ๐ฝ๐ ๐ข๐๐ฆ | ๐๐ข๐ฆ๐ฆ, ๐๐ถ๐ณ๐ฒ, ๐ ๐ฒ๐บ๐ฒ๐ (รmer)
Express Cleaner
Express Cleaner helps you clean up your phone by removing unwanted files and freeing up storage space. Itโs simple to use and helps keep your device running smoothly.
๐ Links:
- Download
- Screenshots
- Features
- Support group
- Channel
Developer: NG Apps Studio
๐ท๏ธ Tags: #Android #Utilities
Express Cleaner helps you clean up your phone by removing unwanted files and freeing up storage space. Itโs simple to use and helps keep your device running smoothly.
๐ Links:
- Download
- Screenshots
- Features
- Support group
- Channel
Developer: NG Apps Studio
๐ท๏ธ Tags: #Android #Utilities
Forwarded from The Hacker News
๐จ Black Basta ransomware operators have adopted new social engineering tricks, targeting victims with email bombs and impersonating IT staff on Microsoft Teams.
Click for insights ๐ https://thehackernews.com/2024/12/black-basta-ransomware-evolves-with.html
Click for insights ๐ https://thehackernews.com/2024/12/black-basta-ransomware-evolves-with.html
Forwarded from Treble GSI's | Privacy + Secure
Deobfuscate Android App: LLM tool to find any potential security vulnerabilities in Android apps and deobfuscate Android app code
https://github.com/In3tinct/deobfuscate-android-app
https://github.com/In3tinct/deobfuscate-android-app
GitHub
GitHub - In3tinct/Androidmeda: LLM tool to deobfuscate android app and find any potential vulnerabilities in android apps and โฆ
LLM tool to deobfuscate android app and find any potential vulnerabilities in android apps and code. - In3tinct/Androidmeda
Forwarded from ๐ฝ๐ผ๐ฝ๐ ๐ข๐๐ฆ | ๐๐ข๐ฆ๐ฆ, ๐๐ถ๐ณ๐ฒ, ๐ ๐ฒ๐บ๐ฒ๐ (๊ญ ๐๐๐๐๐๐๐๐๐ ๐ป #SupportISKON)
Method Call
An Android automation application that works specifically by mapping phone numbers to a defined list of actions.
๐ Links:
- Download: IzzySoft | Github
- Screenshots
- SourceCode
๐ @popmodsnetwork
๐ Donate to our admins
๐ท Tags: #Android
An Android automation application that works specifically by mapping phone numbers to a defined list of actions.
๐ Links:
- Download: IzzySoft | Github
- Screenshots
- SourceCode
๐ @popmodsnetwork
๐ Donate to our admins
๐ท Tags: #Android
Forwarded from Hacker News
PT SWARM
New dog, old tricks: DaMAgeCard attack targets memory directly thru SD card reader
Did I ever tell you what the definition of insanity is? Insanity is doing the exactโฆ same ******* thingโฆ over and over again expectingโฆ **** to changeโฆ That. Is. Crazy.Far Cry 3 Intro The peripheral device industry has once again sacrificed security in theโฆ
Forwarded from Hacker News
Ssrn
Quantitative Fire Risk Assessment of Battery Home Storage Systems in Comparison to General House Fires in Germany and Other Batteryโฆ
Battery storage systems are becoming an integral part of the energy transition, as they offer the possibility of bridging time windows in which self-generated r
Forwarded from Treble GSI's | Privacy + Secure
๐ฑ (QR) Coding My Way Out of Here: C2 in Browser Isolation Environments.
https://cloud.google.com/blog/topics/threat-intelligence/c2-browser-isolation-environments/
https://cloud.google.com/blog/topics/threat-intelligence/c2-browser-isolation-environments/
Google Cloud Blog
(QR) Coding My Way Out of Here: C2 in Browser Isolation Environments | Google Cloud Blog
A technique to circumvent all types of browser isolation for the purpose of controlling a malicious implant via command and control.
Forwarded from Hacker News
New Atlas
Starlink's first constellation of direct-to-phone satellites is now in orbit
SpaceX has launched 20 of its Starlink satellites up into Earth's orbit, enabling direct-to-cellphone connectivity for subscribers anywhere on the planet. That completes the constellation's first orbital shell, following a launch of an initial batch of sixโฆ
Forwarded from Gizchina.com
OnePlus and Redmi phones tipped to feature bigger batteries next year
https://www.gizchina.com/2024/12/10/oneplus-and-redmi-phones-tipped-to-feature-bigger-batteries-next-year/
https://www.gizchina.com/2024/12/10/oneplus-and-redmi-phones-tipped-to-feature-bigger-batteries-next-year/
Forwarded from Hacker News