Forwarded from The Hacker News
💣 Europol just dismantled a SIM farm-for-hire platform that powered 49 million fake accounts used for global fraud.
It let anyone rent verified phone numbers from 80+ countries — to scam, extort, or launder money.
Details → https://thehackernews.com/2025/10/europol-dismantles-sim-farm-network.html
It let anyone rent verified phone numbers from 80+ countries — to scam, extort, or launder money.
Details → https://thehackernews.com/2025/10/europol-dismantles-sim-farm-network.html
Forwarded from The Hacker News
🕵️ China says the NSA hacked its national time servers — the system that keeps everything in sync.
If that clock went down, it could’ve hit banks, power grids, even space launches.
The attack used foreign SMS exploits, forged certs, and 42 stealth tools.
Read → https://thehackernews.com/2025/10/mss-claims-nsa-used-42-cyber-tools-in.html
If that clock went down, it could’ve hit banks, power grids, even space launches.
The attack used foreign SMS exploits, forged certs, and 42 stealth tools.
Read → https://thehackernews.com/2025/10/mss-claims-nsa-used-42-cyber-tools-in.html
Forwarded from The Hacker News
🚨 131 Chrome extensions were caught turning WhatsApp Web into spam bots.
They look like “CRM tools,” but secretly send bulk messages.
Over 20,000 users already installed them.
Full details ↓ https://thehackernews.com/2025/10/131-chrome-extensions-caught-hijacking.html
They look like “CRM tools,” but secretly send bulk messages.
Over 20,000 users already installed them.
Full details ↓ https://thehackernews.com/2025/10/131-chrome-extensions-caught-hijacking.html
Forwarded from The Hacker News
🔴 Silent breaches, blockchain malware, and new Android exploits — this week’s threat roundup proves attackers are getting bolder and smarter.
Catch the highlights:
⚡ F5 breach
⚡ EtherHiding malware
⚡ Cisco rootkits
⚡ Pixnapping 2FA theft
Read WEEKLY RECAP → https://thehackernews.com/2025/10/weekly-recap-f5-breached-linux-rootkits.html
Catch the highlights:
⚡ F5 breach
⚡ EtherHiding malware
⚡ Cisco rootkits
⚡ Pixnapping 2FA theft
Read WEEKLY RECAP → https://thehackernews.com/2025/10/weekly-recap-f5-breached-linux-rootkits.html
Forwarded from The Hacker News
🚨 A fake CAPTCHA just breached hospitals, universities, and city networks.
The scary part? Victims copied the attack code themselves — straight from their browser.
It’s called ClickFix, and it hijacks users through “fix this page” pop-ups — no downloads, no phishing email needed.
See how it slips past every control ↓ https://thehackernews.com/2025/10/analysing-clickfix-3-reasons-why.html
The scary part? Victims copied the attack code themselves — straight from their browser.
It’s called ClickFix, and it hijacks users through “fix this page” pop-ups — no downloads, no phishing email needed.
See how it slips past every control ↓ https://thehackernews.com/2025/10/analysing-clickfix-3-reasons-why.html
Forwarded from The Hacker News
A Chinese-linked hacking group breached Europe’s telecom defenses — weaponizing antivirus software.
They planted a backdoor in legitimate Norton and Bkav installs.
Payload: SnappyBee, a new ShadowPad variant delivered via DLL side-loading.
Learn more ↓ https://thehackernews.com/2025/10/hackers-used-snappybee-malware-and.html
They planted a backdoor in legitimate Norton and Bkav installs.
Payload: SnappyBee, a new ShadowPad variant delivered via DLL side-loading.
Learn more ↓ https://thehackernews.com/2025/10/hackers-used-snappybee-malware-and.html
Forwarded from The Hacker News
Russia’s COLDRIVER hackers rebuilt their malware tools in just 5 days.
Meet NOROBOT, YESROBOT, and MAYBEROBOT — hidden behind fake CAPTCHA checks and PowerShell tricks.
Google just exposed how they did it ↓ https://thehackernews.com/2025/10/google-identifies-three-new-russian.html
Meet NOROBOT, YESROBOT, and MAYBEROBOT — hidden behind fake CAPTCHA checks and PowerShell tricks.
Google just exposed how they did it ↓ https://thehackernews.com/2025/10/google-identifies-three-new-russian.html
Forwarded from The Hacker News
⚠️ 7 out of 10 threats faced by SOCs begin with phishing.
Phishkits dominate the threat landscape and become increasingly harder to detect.
Act now to set up strong defenses with fresh, actionable intel from 15K orgs ⤵️ https://thn.news/threat-intel-tg
Phishkits dominate the threat landscape and become increasingly harder to detect.
Act now to set up strong defenses with fresh, actionable intel from 15K orgs ⤵️ https://thn.news/threat-intel-tg
Forwarded from The Hacker News
⚠️ Your AppSec blind spots are costing you.
The gap between code and cloud runtime drives 90% of delayed fixes—and missed accountability.
Map vulnerabilities, misconfigs, and secrets across your pipeline to regain control.
Cut the noise. Reduce risk. Start now ↓ https://thehacker.news/code-to-cloud-appsec
The gap between code and cloud runtime drives 90% of delayed fixes—and missed accountability.
Map vulnerabilities, misconfigs, and secrets across your pipeline to regain control.
Cut the noise. Reduce risk. Start now ↓ https://thehacker.news/code-to-cloud-appsec
Forwarded from The Hacker News
🔥 Your Cisco, ASUS, QNAP, or Synology router might secretly be part of a botnet.
A new threat called PolarEdge is hiding inside routers, turning them into undetectable spies using a secret TLS server and a hidden config file.
Exploit chain, IOCs & decryption trick ↓ https://thehackernews.com/2025/10/polaredge-targets-cisco-asus-qnap.html
A new threat called PolarEdge is hiding inside routers, turning them into undetectable spies using a secret TLS server and a hidden config file.
Exploit chain, IOCs & decryption trick ↓ https://thehackernews.com/2025/10/polaredge-targets-cisco-asus-qnap.html
Forwarded from The Hacker News
Meta just rolled out new anti-scam tools for WhatsApp & Messenger.
⚠️ Screen-share warnings
🤖 AI scam detection
🚨 Instant alerts
... but one setting quietly breaks 🔐 encryption.
Learn more ↓ https://thehackernews.com/2025/10/meta-rolls-out-new-tools-to-protect.html
⚠️ Screen-share warnings
🤖 AI scam detection
🚨 Instant alerts
... but one setting quietly breaks 🔐 encryption.
Learn more ↓ https://thehackernews.com/2025/10/meta-rolls-out-new-tools-to-protect.html
Forwarded from The Hacker News
Every new AI tool in your SOC adds another way in for attackers.
The defender might now be the weak spot.
AI agents are making decisions on their own — and trust just became an identity problem.
Learn how to secure them before someone else does → https://thehackernews.com/2025/10/securing-ai-to-benefit-from-ai.html
The defender might now be the weak spot.
AI agents are making decisions on their own — and trust just became an identity problem.
Learn how to secure them before someone else does → https://thehackernews.com/2025/10/securing-ai-to-benefit-from-ai.html
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
🧠 Apple’s Enhanced Visual Search: Scanning Your Photos Without Consent
In my recent webinar Media Master: Open Source Photo and Video Editing, I covered three AI systems built into Big Tech phones. One of the most concerning is Apple’s Enhanced Visual Search — a feature that scans your photos for landmarks and sends that data to Apple’s servers… without your consent.
Even worse, some users found it re-enables itself after being turned off. It’s not just cloud photos — it’s every photo your iPhone takes.
📺 Watch the full Media Master: Open Source Photo and Video Editing webinar to learn how to protect your memories and take back control.
🛡️ Check out our privacy gear.
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
In my recent webinar Media Master: Open Source Photo and Video Editing, I covered three AI systems built into Big Tech phones. One of the most concerning is Apple’s Enhanced Visual Search — a feature that scans your photos for landmarks and sends that data to Apple’s servers… without your consent.
Even worse, some users found it re-enables itself after being turned off. It’s not just cloud photos — it’s every photo your iPhone takes.
📺 Watch the full Media Master: Open Source Photo and Video Editing webinar to learn how to protect your memories and take back control.
🛡️ Check out our privacy gear.
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
Forwarded from #TBOT: Take Back Our Tech
My dear solutionaries,
I've just finished the Digital ID report I've been working on for the past few months. The report is ~9K words (after cutting it down) looking at the Digital ID programs in every continent.
To say I'm sick of researching this topic would be an understatement. Still, we must pay attention as its the next paradigm in digital surveillance and contol.
(unless you want to move near the Amazon jungle, the deserts of Africa, or Antartica).
I hope to have a download available for the e-book by tomorrow.
One thing the research makes obvious is that banks are captured, and we need for alternative monetary systems. Two areas that I want to focus on are cryptocurrency or barter/credit networks. Does anyone have solutions?
I've just finished the Digital ID report I've been working on for the past few months. The report is ~9K words (after cutting it down) looking at the Digital ID programs in every continent.
To say I'm sick of researching this topic would be an understatement. Still, we must pay attention as its the next paradigm in digital surveillance and contol.
(unless you want to move near the Amazon jungle, the deserts of Africa, or Antartica).
I hope to have a download available for the e-book by tomorrow.
One thing the research makes obvious is that banks are captured, and we need for alternative monetary systems. Two areas that I want to focus on are cryptocurrency or barter/credit networks. Does anyone have solutions?
Forwarded from Above Phone Announcements
Dear Abovians,
The right to ‘identification’ has been presented to us as an essential human right; Digital ID programs operational in 90% of countries. After months of researching, we conclude that Digital ID is the cornerstone of the next generation of surveillance.
We are taking a stand by publishing our Digital ID report, raising awareness and presenting solutions to help others avoid Digital ID.
These systems have been planned for decades, they reach the farthest corners of the globe; the goal is to consolidate every human being under Digital Public Infrastructure (DPI) which combines identity, payments, and information exchange.
This is a global issue, and there is a lesson to be learned from every region.
North America surprises its residents with surprise biometric ID renewals. Europe and the U.K aspire for universal interoperability. South America, the Middle East, and Africa show us that developing countries receive hundreds of millions in funding for documenting their population. In Asia, we see the bleak future of Life Under Digital ID, where people live under a Digital Caste System. Rights can be taken away with a single misstep or even completely at random.
Digital ID is the first and most important component of DPI. Once enough people enroll in Digital ID, the subsequent components are easily layered ontop.
You give up your rights as soon as you enroll your legal identity with your biometrics.
Our new report will give you knowlege to prepare for the years ahead, and emphasizes that community is the answer. We have a narrow window of a few years to build resilient people-first networks to provide for ourselves and each other.
Download the report here.
Wherever you reside on earth — we are united in this challenge.
— Hakeem Anwar, Founder of Above and #TBOT
The right to ‘identification’ has been presented to us as an essential human right; Digital ID programs operational in 90% of countries. After months of researching, we conclude that Digital ID is the cornerstone of the next generation of surveillance.
We are taking a stand by publishing our Digital ID report, raising awareness and presenting solutions to help others avoid Digital ID.
These systems have been planned for decades, they reach the farthest corners of the globe; the goal is to consolidate every human being under Digital Public Infrastructure (DPI) which combines identity, payments, and information exchange.
This is a global issue, and there is a lesson to be learned from every region.
North America surprises its residents with surprise biometric ID renewals. Europe and the U.K aspire for universal interoperability. South America, the Middle East, and Africa show us that developing countries receive hundreds of millions in funding for documenting their population. In Asia, we see the bleak future of Life Under Digital ID, where people live under a Digital Caste System. Rights can be taken away with a single misstep or even completely at random.
Digital ID is the first and most important component of DPI. Once enough people enroll in Digital ID, the subsequent components are easily layered ontop.
You give up your rights as soon as you enroll your legal identity with your biometrics.
Our new report will give you knowlege to prepare for the years ahead, and emphasizes that community is the answer. We have a narrow window of a few years to build resilient people-first networks to provide for ourselves and each other.
Download the report here.
Wherever you reside on earth — we are united in this challenge.
— Hakeem Anwar, Founder of Above and #TBOT
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
📱 Your Devices Are Pre-Hacked—You Just Didn’t Consent Yet
In Media Master: Open Source Photo and Video Editing, I walk through how big tech phones and laptops come with features that are silently installed and activated without your consent. Companies claim it’s for your privacy—so private, they don’t even need to ask.
This is how things like contact tracing, digital ID, and vaccine passport systems get rolled out globally—instantly.
I also share how the Above Phone flips this model completely. No hidden connections. No backdoors. Just full control, from the stock camera to the open-source media apps we recommend.
📺 Watch the full Media Master: Open Source Photo and Video Editing webinar
🛡️ Browse our privacy gear.
🚨Learn what life is like with Above Phone - Rise Above: Device Overview Webinar, Oct 29
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
In Media Master: Open Source Photo and Video Editing, I walk through how big tech phones and laptops come with features that are silently installed and activated without your consent. Companies claim it’s for your privacy—so private, they don’t even need to ask.
This is how things like contact tracing, digital ID, and vaccine passport systems get rolled out globally—instantly.
I also share how the Above Phone flips this model completely. No hidden connections. No backdoors. Just full control, from the stock camera to the open-source media apps we recommend.
📺 Watch the full Media Master: Open Source Photo and Video Editing webinar
🛡️ Browse our privacy gear.
🚨Learn what life is like with Above Phone - Rise Above: Device Overview Webinar, Oct 29
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK