Forwarded from The Hacker News
⚠️ Over 100 SonicWall SSL VPN accounts breached — not brute-forced.
Attackers used legit creds and traced back to a single IP.
Even patched devices are falling to Akira ransomware campaigns.
Learn more → https://thehackernews.com/2025/10/experts-warn-of-widespread-sonicwall.html
Attackers used legit creds and traced back to a single IP.
Even patched devices are falling to Akira ransomware campaigns.
Learn more → https://thehackernews.com/2025/10/experts-warn-of-widespread-sonicwall.html
Forwarded from The Hacker News
⚡ Apple’s Siri recordings are under criminal investigation in France.
A whistleblower says they captured “intimate” conversations — enough to identify users.
Apple denies misuse, but prosecutors aren’t convinced.
Read ↓ https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html#france-opens-probe-into-apple-siri-voice-recordings
A whistleblower says they captured “intimate” conversations — enough to identify users.
Apple denies misuse, but prosecutors aren’t convinced.
Read ↓ https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html#france-opens-probe-into-apple-siri-voice-recordings
Forwarded from The Hacker News
🐭 A $35 gaming mouse just became a spy tool.
UC Irvine researchers turned its optical sensor into a microphone that steals conversations from air-gapped PCs.
It hides inside legit apps like games. Read the PoC → https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html#mic-e-mouse-attack-for-covert-data-exfiltration
UC Irvine researchers turned its optical sensor into a microphone that steals conversations from air-gapped PCs.
It hides inside legit apps like games. Read the PoC → https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html#mic-e-mouse-attack-for-covert-data-exfiltration
Forwarded from The Hacker News
⚠️ WARNING: Oracle just confirmed a new vulnerability (CVE-2025-61884) in E-Business Suite.
No login required. Full data access possible.
Even worse—similar flaws were just exploited by Cl0p-linked actors.
Read the latest news here → https://thehackernews.com/2025/10/new-oracle-e-business-suite-bug-could.html
No login required. Full data access possible.
Even worse—similar flaws were just exploited by Cl0p-linked actors.
Read the latest news here → https://thehackernews.com/2025/10/new-oracle-e-business-suite-bug-could.html
Forwarded from The Hacker News
🚨A new Rust-based backdoor called ChaosBot is hijacking corporate networks — and running its C2 over Discord.
It hides behind Microsoft Edge, abuses service accounts, and even checks for VMware to dodge analysis.
One slip → full network access ↓ https://thehackernews.com/2025/10/new-rust-based-malware-chaosbot-hijacks.html
It hides behind Microsoft Edge, abuses service accounts, and even checks for VMware to dodge analysis.
One slip → full network access ↓ https://thehackernews.com/2025/10/new-rust-based-malware-chaosbot-hijacks.html
Forwarded from The Hacker News
Hackers just turned GitHub into their command center.
When police take down their servers, the malware just… reboots itself from GitHub.
The twist? It hides configs inside images using steganography. This isn’t a glitch — it’s resilience by design.
Read how it works → https://thehackernews.com/2025/10/astaroth-banking-trojan-abuses-github.html
When police take down their servers, the malware just… reboots itself from GitHub.
The twist? It hides configs inside images using steganography. This isn’t a glitch — it’s resilience by design.
Read how it works → https://thehackernews.com/2025/10/astaroth-banking-trojan-abuses-github.html
Forwarded from The Hacker News
⚠️ Microsoft just locked down Internet Explorer mode in Edge after real-world zero-day attacks.
Hackers abused the old IE engine (Chakra) to hijack devices — bypassing modern browser defenses.
Full story ↓ https://thehackernews.com/2025/10/microsoft-locks-down-ie-mode-after.html
Hackers abused the old IE engine (Chakra) to hijack devices — bypassing modern browser defenses.
Full story ↓ https://thehackernews.com/2025/10/microsoft-locks-down-ie-mode-after.html
Forwarded from The Hacker News
🟥 RondoDox Botnet just went nuclear.
It’s now exploiting 56 vulnerabilities across 30+ vendors — from routers to web servers.
The irony? 18 of those flaws don’t even have CVEs yet.
Learn more → https://thehackernews.com/2025/10/researchers-warn-rondodox-botnet-is.html
It’s now exploiting 56 vulnerabilities across 30+ vendors — from routers to web servers.
The irony? 18 of those flaws don’t even have CVEs yet.
Learn more → https://thehackernews.com/2025/10/researchers-warn-rondodox-botnet-is.html
Forwarded from The Hacker News
Your WAF can’t see this.
Attackers are skimming payment data right now through unmonitored JavaScript—while your dashboards stay clean.
The worst part? It’s happening in your customers’ browsers.
See what every retailer must fix before Black Friday ↓ https://thehackernews.com/2025/10/why-unmonitored-javascript-is-your.html
Attackers are skimming payment data right now through unmonitored JavaScript—while your dashboards stay clean.
The worst part? It’s happening in your customers’ browsers.
See what every retailer must fix before Black Friday ↓ https://thehackernews.com/2025/10/why-unmonitored-javascript-is-your.html
Forwarded from The Hacker News
⚡ Latest Weekly Recap is out...
🚨 Oracle 0-Day exploited
🤖 Nation-state AI abuse on the rise
🎣 npm phishing spreading fast
💀 New ransomware cartel emerges
…and more
The threat landscape is moving fast — here’s what defenders need to know.
🔗 https://thehackernews.com/2025/10/weekly-recap-whatsapp-worm-critical.html
🚨 Oracle 0-Day exploited
🤖 Nation-state AI abuse on the rise
🎣 npm phishing spreading fast
💀 New ransomware cartel emerges
…and more
The threat landscape is moving fast — here’s what defenders need to know.
🔗 https://thehackernews.com/2025/10/weekly-recap-whatsapp-worm-critical.html
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
⚡️Installing Apps Without Google Play Store is Easier Than You Think
In my recent chat with Mike Adams on Brighteon, we dove into a game-changer for installing apps away from Google play store. The Aurora Store makes it easy to get the apps you need without hunting down APKs, and it even shows you "nutrition facts" for each app—like which trackers are hidden inside. Think of it like reading a food label, but for your phone.
You might be surprised how many apps come bundled with trackers like Facebook, Google, and more. With Aurora Store, you can see exactly who's tracking your apps and keep control in your hands.
🪧 Watch the full interview here
📲 Learn more about the Above Phone
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
In my recent chat with Mike Adams on Brighteon, we dove into a game-changer for installing apps away from Google play store. The Aurora Store makes it easy to get the apps you need without hunting down APKs, and it even shows you "nutrition facts" for each app—like which trackers are hidden inside. Think of it like reading a food label, but for your phone.
You might be surprised how many apps come bundled with trackers like Facebook, Google, and more. With Aurora Store, you can see exactly who's tracking your apps and keep control in your hands.
🪧 Watch the full interview here
📲 Learn more about the Above Phone
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
Forwarded from fatalcoder524
Hi Guys,
People using my TCP Optimiser module, but module.prop got corrupted, and if it shows blank, please update to the following version manually. Else update to the latest version normally from Root Managers.
- Added support for Tun interface.
- Fix Module.prop corruption.
- Fix Vo-Wifi state detection.
https://github.com/fatalcoder524/TCP_Optimiser_Module/releases/download/v2.2/TCP_Optimiser-2.2-14.zip
People using my TCP Optimiser module, but module.prop got corrupted, and if it shows blank, please update to the following version manually. Else update to the latest version normally from Root Managers.
- Added support for Tun interface.
- Fix Module.prop corruption.
- Fix Vo-Wifi state detection.
https://github.com/fatalcoder524/TCP_Optimiser_Module/releases/download/v2.2/TCP_Optimiser-2.2-14.zip
Forwarded from Mishaal's Android News Feed
📞📶Google tried to kill this Pixel VoLTE-enabling app, but the developer already has a fix
The developer of Pixel IMS has rolled out an update that restores the ability to enable VoLTE and VoWiFi on Pixel phones in unsupported regions.
Here's how👇
🔗https://www.androidauthority.com/pixel-ims-update-fix-3606811/
The developer of Pixel IMS has rolled out an update that restores the ability to enable VoLTE and VoWiFi on Pixel phones in unsupported regions.
Here's how👇
🔗https://www.androidauthority.com/pixel-ims-update-fix-3606811/
Forwarded from Marooned Mendaroo
The update is here: https://github.com/kyujin-cho/pixel-volte-patch/releases/tag/1.3.0
GitHub
Release v1.3.0 · kyujin-cho/pixel-volte-patch
What's Changed
deps: update target API version to 34 (Android UDC) by @kyujin-cho in #261
feat: remove manually set config menu by @kyujin-cho in #262
feature: make Wi-Fi calling carrier name ...
deps: update target API version to 34 (Android UDC) by @kyujin-cho in #261
feat: remove manually set config menu by @kyujin-cho in #262
feature: make Wi-Fi calling carrier name ...
No deleted account found from
84 scanned users from this group 🚫👻Forwarded from fatalcoder524
Just a P.S.A. for all SusFS users!
1. SusFS has released sus_maps and we have already kept a version on build. So OnePlus builds with map_spoof will not be continued.
2. The current version of sus_maps doesn't work on mounts made by mountify. So for Mountify users, it might not work. But Simon has provided possible instructions on how you can try in Gitlab. (I have not tried that method to comment on it currently)
3. Sus_maps is a method of hiding memory maps and normally detectors say Found Injection. Adding those paths should fix your detections.
4. Possible stuff you can hide are fonts, drivers, zygisk modules etc..
5. It works only on umounted apps and not system wide. Since it's a powerful feature, it might cause instability if applied globally.
6. Most of you wouldn't even need to use this feature as far as I know.
7. The SusFS module is not yet updated. Please wait for it to be updated to fully use the feature. Devs and interested testers, Hope you know how to test it currently even without module being updated if required!
8. For Devs who like system-wide modifications, you can still use map_spoof but it's currently futile and incomplete. You can add your own code and continue though!
1. SusFS has released sus_maps and we have already kept a version on build. So OnePlus builds with map_spoof will not be continued.
2. The current version of sus_maps doesn't work on mounts made by mountify. So for Mountify users, it might not work. But Simon has provided possible instructions on how you can try in Gitlab. (I have not tried that method to comment on it currently)
3. Sus_maps is a method of hiding memory maps and normally detectors say Found Injection. Adding those paths should fix your detections.
4. Possible stuff you can hide are fonts, drivers, zygisk modules etc..
5. It works only on umounted apps and not system wide. Since it's a powerful feature, it might cause instability if applied globally.
6. Most of you wouldn't even need to use this feature as far as I know.
7. The SusFS module is not yet updated. Please wait for it to be updated to fully use the feature. Devs and interested testers, Hope you know how to test it currently even without module being updated if required!
8. For Devs who like system-wide modifications, you can still use map_spoof but it's currently futile and incomplete. You can add your own code and continue though!
No deleted account found from
💬 Send /lang to change language of the bot
84 scanned users from this group 🚫👻💬 Send /lang to change language of the bot