Forwarded from The Hacker News
🚨 Developers, check your NuGet packages.
A fake NuGet package “Netherеum.All” — spelled with a Cyrillic ‘e’ — was stealing wallet keys from Ethereum .NET projects.
It even faked 11.7M downloads to look real.
Full story ↓ https://thehackernews.com/2025/10/fake-nethereum-nuget-package-used.html
A fake NuGet package “Netherеum.All” — spelled with a Cyrillic ‘e’ — was stealing wallet keys from Ethereum .NET projects.
It even faked 11.7M downloads to look real.
Full story ↓ https://thehackernews.com/2025/10/fake-nethereum-nuget-package-used.html
Forwarded from The Hacker News
🔴 A fake “Zoom meeting” from Ukraine’s President’s Office just hacked aid workers. The CAPTCHA wasn’t real — it opened a live remote shell through WebSocket.
A one-day domain. Six months of setup. Russian servers behind it.
The trojan’s still active ↓ https://thehackernews.com/2025/10/ukraine-aid-groups-targeted-through.html
A one-day domain. Six months of setup. Russian servers behind it.
The trojan’s still active ↓ https://thehackernews.com/2025/10/ukraine-aid-groups-targeted-through.html
Forwarded from The Hacker News
⚠️ An Iranian hacking group used a real email account to plant a new backdoor in 100+ Middle East government networks.
They sent it through real diplomatic inboxes — and it worked.
Read ↓ https://thehackernews.com/2025/10/iran-linked-muddywater-targets-100.html
They sent it through real diplomatic inboxes — and it worked.
Read ↓ https://thehackernews.com/2025/10/iran-linked-muddywater-targets-100.html
Forwarded from The Hacker News
🚨 CISA just warned about a critical bug in Motex Lanscope (CVE-2025-61932).
Hackers can take control of systems by sending one malicious packet.
It’s already being used in real attacks.
Fix it before Nov 12 ↓ https://thehackernews.com/2025/10/critical-lanscope-endpoint-manager-bug.html
Hackers can take control of systems by sending one malicious packet.
It’s already being used in real attacks.
Fix it before Nov 12 ↓ https://thehackernews.com/2025/10/critical-lanscope-endpoint-manager-bug.html
Forwarded from The Hacker News
🚨 New Adobe Commerce flaw (CVE-2025-54236, CVSS 9.1) under active attack.
Over 250 exploit attempts in 24 hours—mostly on unpatched Magento sites.
PoC is public. Patch now.
Details → https://thehackernews.com/2025/10/over-250-magento-stores-hit-overnight.html
Over 250 exploit attempts in 24 hours—mostly on unpatched Magento sites.
PoC is public. Patch now.
Details → https://thehackernews.com/2025/10/over-250-magento-stores-hit-overnight.html
Forwarded from The Hacker News
🎁 Hackers found a new jackpot — cloud gift cards.
A group called Jingle Thief broke into retail cloud systems and quietly issued fake gift cards for months, hiding inside Microsoft 365 accounts.
Full story ↓ https://thehackernews.com/2025/10/jingle-thief-hackers-exploit-cloud.html
A group called Jingle Thief broke into retail cloud systems and quietly issued fake gift cards for months, hiding inside Microsoft 365 accounts.
Full story ↓ https://thehackernews.com/2025/10/jingle-thief-hackers-exploit-cloud.html
Forwarded from The Hacker News
In this 20-minute session, learn how to harden your images, secure dependencies, and lock down your CI/CD pipeline against real-world supply chain attacks.
📅 Tuesday, Oct 28 | 8 AM PST | 11 AM EST
🎥 Register Now ↓ https://thn.news/secure-stack-webinar
📅 Tuesday, Oct 28 | 8 AM PST | 11 AM EST
🎥 Register Now ↓ https://thn.news/secure-stack-webinar
Forwarded from The Hacker News
🚨 Static secrets are fading fast.
Teams using managed identities cut 95% of credential hassle—yet hidden API keys still lurk in legacy systems.
The fix? Run NHI discovery to find every key, then migrate 70–80% to managed identities.
Your roadmap ↓ https://thehackernews.com/2025/10/why-organizations-are-abandoning-static.html
Teams using managed identities cut 95% of credential hassle—yet hidden API keys still lurk in legacy systems.
The fix? Run NHI discovery to find every key, then migrate 70–80% to managed identities.
Your roadmap ↓ https://thehackernews.com/2025/10/why-organizations-are-abandoning-static.html
Forwarded from The Hacker News
From crypto fines to malware & data leaks — the week’s biggest cyber hits:
🇨🇦 Cryptomus fined $176M
🛰️ Starlink scam crackdown
🤖 AI vuln in Oat++ MCP
📧 Tykit phishing campaign
.... 15+ more important news stories.
Read the latest #ThreatsDay Bulletin 👇 https://thehackernews.com/2025/10/threatsday-bulletin-176m-crypto-fine.html
🇨🇦 Cryptomus fined $176M
🛰️ Starlink scam crackdown
🤖 AI vuln in Oat++ MCP
📧 Tykit phishing campaign
.... 15+ more important news stories.
Read the latest #ThreatsDay Bulletin 👇 https://thehackernews.com/2025/10/threatsday-bulletin-176m-crypto-fine.html
Forwarded from The Hacker News
📢 WEBINAR ALERT!
You can’t secure what you can’t see. AI agents are spreading fast — unseen, unmanaged & risky.
Join this free #cybersecurity session to learn how leading security teams are regaining control & speed.
🗓️ 27 Oct, 2025
🔗 Watch This ↓ https://thehackernews.com/2025/10/secure-ai-at-scale-and-speed-learn.html
You can’t secure what you can’t see. AI agents are spreading fast — unseen, unmanaged & risky.
Join this free #cybersecurity session to learn how leading security teams are regaining control & speed.
🗓️ 27 Oct, 2025
🔗 Watch This ↓ https://thehackernews.com/2025/10/secure-ai-at-scale-and-speed-learn.html
Forwarded from The Hacker News
North Korean hackers are posing as recruiters—again.
This time, they’re stealing drone tech from Europe’s defense firms.
The trap? A fake job PDF hiding a remote access tool.
It’s been active—undetected—since March.
Read → https://thehackernews.com/2025/10/north-korean-hackers-lure-defense.html
This time, they’re stealing drone tech from Europe’s defense firms.
The trap? A fake job PDF hiding a remote access tool.
It’s been active—undetected—since March.
Read → https://thehackernews.com/2025/10/north-korean-hackers-lure-defense.html
No deleted account found from
💬 Send /lang to change language of the bot
81 scanned users from this group 🚫👻💬 Send /lang to change language of the bot
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
⚡️Palantir’s War Surveillance is Coming Home
In my recent conversation with Mike Adams, we dove into the troubling ways surveillance technology is being misused. We talked about how tools originally tested in conflict zones—like Palantir's tech in Gaza—are now quickly coming home. These surveillance tools, once used in war, are being turned on everyday people under the guise of security.
Palantir is glueing together data from every federal agency, building a surveillance network that can track and profile people in incredibly detailed ways. This is how tech developed "for war" ends up right in our own neighborhoods, and it's something we all need to be aware of.
🪧 Watch the full interview here
📲 Learn more about the Above Phone
🔒 Discover how Above Phone, services, and tools work together to protect your privacy — Rise Above: Device Overview Oct 29, 12 pm CDT.
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
In my recent conversation with Mike Adams, we dove into the troubling ways surveillance technology is being misused. We talked about how tools originally tested in conflict zones—like Palantir's tech in Gaza—are now quickly coming home. These surveillance tools, once used in war, are being turned on everyday people under the guise of security.
Palantir is glueing together data from every federal agency, building a surveillance network that can track and profile people in incredibly detailed ways. This is how tech developed "for war" ends up right in our own neighborhoods, and it's something we all need to be aware of.
🪧 Watch the full interview here
📲 Learn more about the Above Phone
🔒 Discover how Above Phone, services, and tools work together to protect your privacy — Rise Above: Device Overview Oct 29, 12 pm CDT.
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
⚡️Derrick Broze on the #TBOT Show
This is a clip from my latest #TBOT Show interview, where I sat down with my friend Derrick Broze—author, journalist, and founder of The Conscious Resistance Network.
Watch full interview on Substack.
We dive deep into the rise of Digital ID as part of the global technocratic control grid, and how things like autonomous zones in Mexico are creating real-world alternatives. Derrick shares what it means to live intentionally, build parallel systems, and take back power from the technocratic state.
In the second half (for paid members), we explore powerful personal themes—the tragedy of activism, living for the 7 generations, the choice to accept and reclaim your past, and the discipline that fuels Derrick’s work ethic.
It’s a conversation that challenges how we see freedom—a reminder that it begins with how we live, not just what we resist.
🚨Download the Digital ID Report and learn how these systems are being built worldwide
This is a clip from my latest #TBOT Show interview, where I sat down with my friend Derrick Broze—author, journalist, and founder of The Conscious Resistance Network.
Watch full interview on Substack.
We dive deep into the rise of Digital ID as part of the global technocratic control grid, and how things like autonomous zones in Mexico are creating real-world alternatives. Derrick shares what it means to live intentionally, build parallel systems, and take back power from the technocratic state.
In the second half (for paid members), we explore powerful personal themes—the tragedy of activism, living for the 7 generations, the choice to accept and reclaim your past, and the discipline that fuels Derrick’s work ethic.
It’s a conversation that challenges how we see freedom—a reminder that it begins with how we live, not just what we resist.
🚨Download the Digital ID Report and learn how these systems are being built worldwide
Forwarded from The Survival Podcast Alerts
Global Digital ID & School Surveillance - Epi-3751
Hakeem Anwar from Above Agency joins us to discuss the rising threat of Global Digital ID & The equally disturbing roll out of School Surveillance of our children. Don’t miss this one, it will absolutely shock you!
https://www.thesurvivalpodcast.com/big-big-brother
Hakeem Anwar from Above Agency joins us to discuss the rising threat of Global Digital ID & The equally disturbing roll out of School Surveillance of our children. Don’t miss this one, it will absolutely shock you!
https://www.thesurvivalpodcast.com/big-big-brother
The Survival Podcast | Helping you live a better life, if times get tough or even if they don't
Global Digital ID & School Surveillance - Epi-3751
Hakeem Anwar from Above Agency joins us to discuss the rising threat of global digital ID & the disturbing roll out of school surveillance of our children.
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
📊 The Actual Outcomes of School Tech
The promise of educational technology was convenience and learning support. The reality? Students’ personal lives are exposed to administrators, teachers, and big tech itself.
Chromebooks running Google’s OS and Chrome browser quietly build profiles of children’s interests and habits—conditioning consumer behavior long before they even have spending power. Lawsuits have been filed, but legal loopholes allow the tracking to continue.
The outcome is a generation of students monitored, restricted, and denied true autonomy in how they learn.
But it doesn’t have to stay this way. By reclaiming freedom of device choice, schools and families can restore privacy, encourage independent learning, and give kids the tools to build real technical literacy.
📺 Watch the full Back to School Tech Awareness Webinar
📚 Get privacy gear
🔒 Discover how Above Phone, services, and tools work together to protect your privacy — Rise Above: Device Overview Oct 29, 12 pm CDT.
The promise of educational technology was convenience and learning support. The reality? Students’ personal lives are exposed to administrators, teachers, and big tech itself.
Chromebooks running Google’s OS and Chrome browser quietly build profiles of children’s interests and habits—conditioning consumer behavior long before they even have spending power. Lawsuits have been filed, but legal loopholes allow the tracking to continue.
The outcome is a generation of students monitored, restricted, and denied true autonomy in how they learn.
But it doesn’t have to stay this way. By reclaiming freedom of device choice, schools and families can restore privacy, encourage independent learning, and give kids the tools to build real technical literacy.
📺 Watch the full Back to School Tech Awareness Webinar
📚 Get privacy gear
🔒 Discover how Above Phone, services, and tools work together to protect your privacy — Rise Above: Device Overview Oct 29, 12 pm CDT.
Forwarded from Morgan Weedman, Wild Kernels Owner (DMs OPEN)
GKI Users!
Version 1.5.12 is uploading right now!
This does not include susmaps yet adding that next release!
Please test it thoroughly and report any issues here and on GitHub Issues.
Thanks everyone for your patience and continued support!
Deprecation Notice:
Magic Mount support has been deprecated. This is just the specific code he added to make it pickup every magic mount
It still works, but may cause some mounts to not get picked up by the auto features properly. Just do it yourself!
Should you switch back to overlayfs, no! Use what you want this doesnt mean it doesnt work! in fact i used magic mount still and so does @simonpunk the susfs dev
New Features:
BBG (Baseband-Guard)
A lightweight Linux Security Module (LSM) designed to protect your device’s critical partitions.
What it does:
Blocks unauthorized writes to key partitions/device nodes
Prevents malicious tampering with baseband and boot chain
Kernel-level protection via LSM hooks
Reduces risk of soft-brick or hard-brick scenarios
More info: https://github.com/vc-teahouse/Baseband-guard
Available Versions:
Normal Build
Default kernel configuration
Standard kernel module loading behavior
Recommended for most users
Bypass Build
Includes module check bypass modifications
What are kernel modules?
Kernel modules are loadable pieces of code that extend kernel functionality (for example, drivers or file systems).
These differ from KernelSU or Magisk modules.
The Problem:
When flashing custom kernels, devices may fail to load certain kernel modules due to version mismatches, missing dependencies, or signature verification issues.
This can lead to boot failures or instability.
The Solution:
This build changes one line from "false" to "true" to force the kernel to load the module anyway, bypassing the failure check that would normally prevent loading.
Version 1.5.12 is uploading right now!
This does not include susmaps yet adding that next release!
Please test it thoroughly and report any issues here and on GitHub Issues.
Thanks everyone for your patience and continued support!
Deprecation Notice:
Magic Mount support has been deprecated. This is just the specific code he added to make it pickup every magic mount
It still works, but may cause some mounts to not get picked up by the auto features properly. Just do it yourself!
Should you switch back to overlayfs, no! Use what you want this doesnt mean it doesnt work! in fact i used magic mount still and so does @simonpunk the susfs dev
New Features:
BBG (Baseband-Guard)
A lightweight Linux Security Module (LSM) designed to protect your device’s critical partitions.
What it does:
Blocks unauthorized writes to key partitions/device nodes
Prevents malicious tampering with baseband and boot chain
Kernel-level protection via LSM hooks
Reduces risk of soft-brick or hard-brick scenarios
More info: https://github.com/vc-teahouse/Baseband-guard
Available Versions:
Normal Build
Default kernel configuration
Standard kernel module loading behavior
Recommended for most users
Bypass Build
Includes module check bypass modifications
What are kernel modules?
Kernel modules are loadable pieces of code that extend kernel functionality (for example, drivers or file systems).
These differ from KernelSU or Magisk modules.
The Problem:
When flashing custom kernels, devices may fail to load certain kernel modules due to version mismatches, missing dependencies, or signature verification issues.
This can lead to boot failures or instability.
The Solution:
This build changes one line from "false" to "true" to force the kernel to load the module anyway, bypassing the failure check that would normally prevent loading.
GitHub
GitHub - vc-teahouse/Baseband-guard: A lightweight LSM (Linux Security Module) for the Android kernel, designed to block unauthorized…
A lightweight LSM (Linux Security Module) for the Android kernel, designed to block unauthorized writes to critical partitions/device nodes at the system level. - GitHub - vc-teahouse/Baseband-gua...
Forwarded from Wild Kernels Bot
🌽 New Kernel 🚀 Release Uploaded
📦 Repository: WildKernels/GKI_KernelSU_SUSFS
✏️ Commit: c8bb4089dd2aef0601ca830aafe8edad1ba21f46
🔗 View GitHub Release
📦 Repository: WildKernels/GKI_KernelSU_SUSFS
✏️ Commit: c8bb4089dd2aef0601ca830aafe8edad1ba21f46
🔗 View GitHub Release
GitHub
GitHub - WildKernels/GKI_KernelSU_SUSFS: GKI Kernels with KernelSU & SUSFS
GKI Kernels with KernelSU & SUSFS. Contribute to WildKernels/GKI_KernelSU_SUSFS development by creating an account on GitHub.
Forwarded from Wild Kernels Bot
🌽 New Kernel 🚀 Release Uploaded
📦 Repository: WildKernels/GKI_KernelSU_SUSFS
✏️ Commit: 1a77fd26d0c6b9d5524846ae8630698f75aa28ad
🔗 View GitHub Release
📦 Repository: WildKernels/GKI_KernelSU_SUSFS
✏️ Commit: 1a77fd26d0c6b9d5524846ae8630698f75aa28ad
🔗 View GitHub Release
GitHub
GitHub - WildKernels/GKI_KernelSU_SUSFS: GKI Kernels with KernelSU & SUSFS
GKI Kernels with KernelSU & SUSFS. Contribute to WildKernels/GKI_KernelSU_SUSFS development by creating an account on GitHub.
Forwarded from 5ec1cff (5ec1cff)
Tricky-Store-v1.4.0-235-e15da3d-release.zip
2.6 MB
TrickyStore 1.4.0
支持持久化存储已生成的密钥
支持自动解析 AVB key(联发科设备疑似使用了自定义算法,暂不支持)
支持自定义认证密钥的解析和导入
支持拦截并模拟更多 keystore 操作
修复一些证书链生成问题
新功能用法请参照安装包中的 README.MD 和 SECURITY.MD。
Support persistent storage of generated keys
Support automatic parsing of AVB keys (MediaTek devices seem to use a custom algorithm, currently not supported)
Support parsing and importing of custom attestation keys
Support intercepting and simulating more keystore operations
Fix some certificate chain generation issues
For usage of the new features, please refer to README.MD and SECURITY.MD in installation package.
real5ec1cff | Github
支持持久化存储已生成的密钥
支持自动解析 AVB key(联发科设备疑似使用了自定义算法,暂不支持)
支持自定义认证密钥的解析和导入
支持拦截并模拟更多 keystore 操作
修复一些证书链生成问题
新功能用法请参照安装包中的 README.MD 和 SECURITY.MD。
Support persistent storage of generated keys
Support automatic parsing of AVB keys (MediaTek devices seem to use a custom algorithm, currently not supported)
Support parsing and importing of custom attestation keys
Support intercepting and simulating more keystore operations
Fix some certificate chain generation issues
For usage of the new features, please refer to README.MD and SECURITY.MD in installation package.
real5ec1cff | Github