Forwarded from The Hacker News
AI-driven attacks move faster than humans can react.
The real risk? Teams flying blind.
ANYRUN flips the script — predicting attacks before they strike. 99% unique IOCs. Zero lag. Full context.
Early detection turns panic into power → https://thehackernews.com/2025/10/why-early-threat-detection-is-must-for.html
The real risk? Teams flying blind.
ANYRUN flips the script — predicting attacks before they strike. 99% unique IOCs. Zero lag. Full context.
Early detection turns panic into power → https://thehackernews.com/2025/10/why-early-threat-detection-is-must-for.html
Forwarded from The Hacker News
🚨 North Korea–linked BlueNoroff is running two active campaigns — GhostCall & GhostHire — into 2025.
GhostCall fakes Zoom/Teams meetings to drop malware via bogus SDK “updates.”
GhostHire targets Web3 devs on Telegram with booby-trapped GitHub tests.
Full report ↓ https://thehackernews.com/2025/10/researchers-expose-ghostcall-and.html
GhostCall fakes Zoom/Teams meetings to drop malware via bogus SDK “updates.”
GhostHire targets Web3 devs on Telegram with booby-trapped GitHub tests.
Full report ↓ https://thehackernews.com/2025/10/researchers-expose-ghostcall-and.html
Forwarded from The Hacker News
🚨 New Android Trojan ‘Herodotus’ is on the move.
It’s hitting phones in 🇮🇹 Italy & 🇧🇷 Brazil — stealing 2FA codes, logins, even lock PINs — and typing like a human to slip past fraud detection.
🔗 Read full report → https://thehackernews.com/2025/10/new-android-trojan-herodotus-outsmarts.html
It’s hitting phones in 🇮🇹 Italy & 🇧🇷 Brazil — stealing 2FA codes, logins, even lock PINs — and typing like a human to slip past fraud detection.
🔗 Read full report → https://thehackernews.com/2025/10/new-android-trojan-herodotus-outsmarts.html
No deleted account found from
💬 Send /lang to change language of the bot
85 scanned users from this group 🚫👻💬 Send /lang to change language of the bot
https://github.com/dorumrr/de1984/releases/tag/v1.1.0
De1984
Privacy isn’t default. Take it back with De1984 Firewall and Package control.
✨ Features
🛡️ Firewall
VPN-based firewall (no root required)
Block apps from accessing WiFi, Mobile Data, or Roaming
Per-app network control with granular permissions
📦 Package Management (with Shizuku or root)
Enable/disable users of system apps
Force stop running apps
Uninstall system and user apps
Works with Shizuku (no root required) or traditional root access
🔒 Privacy First
Zero tracking or analytics
No telemetry
Local-only data storage
100% open source (MIT License)
📋 Requirements
Android 8.0 (API 26) or higher
Shizuku or root access optional (required for package management features)
VPN permission (for firewall functionality)
🔐 Permissions
INTERNET: For firewall functionality (VPN-based)
ACCESS_NETWORK_STATE: Monitor network connectivity
BIND_VPN_SERVICE: Create local VPN for firewall
QUERY_ALL_PACKAGES: View installed apps (optional)
Shizuku or root access: For advanced package management (optional)
De1984
Privacy isn’t default. Take it back with De1984 Firewall and Package control.
✨ Features
🛡️ Firewall
VPN-based firewall (no root required)
Block apps from accessing WiFi, Mobile Data, or Roaming
Per-app network control with granular permissions
📦 Package Management (with Shizuku or root)
Enable/disable users of system apps
Force stop running apps
Uninstall system and user apps
Works with Shizuku (no root required) or traditional root access
🔒 Privacy First
Zero tracking or analytics
No telemetry
Local-only data storage
100% open source (MIT License)
📋 Requirements
Android 8.0 (API 26) or higher
Shizuku or root access optional (required for package management features)
VPN permission (for firewall functionality)
🔐 Permissions
INTERNET: For firewall functionality (VPN-based)
ACCESS_NETWORK_STATE: Monitor network connectivity
BIND_VPN_SERVICE: Create local VPN for firewall
QUERY_ALL_PACKAGES: View installed apps (optional)
Shizuku or root access: For advanced package management (optional)
GitHub
Release De1984 Firewall and Package Control - v1.1.0 · dorumrr/de1984
• Added Shizuku support for package management (no root required!)
• Minor fixes and performance improvements
• Minor fixes and performance improvements
https://github.com/dorumrr/privacyFlip/releases/tag/v1.4.1
PrivacyFlip
Automatic lock/unlock privacy control for Android devices 🔐📱✨
PrivacyFlip automatically manages your device's privacy features based on lock/unlock state. When you lock your device, it can disable Wi-Fi, Bluetooth, mobile data, location services, NFC, and even camera/microphone sensors (experimental). When you unlock, it intelligently restores the features you want back on.
Works with Root or Shizuku - Choose your preferred privilege method!
Stop leaking data and being tracked when your phone is locked. Automatic lock/unlock privacy control for rooted Android devices 🔐📱✨
🔒 Features
Automatic Privacy Control
Lock Detection: Instantly disables privacy features when screen locks
Unlock Detection: Waits for proper authentication (not just screen-on)
Smart Restoration: Configurable feature re-enabling on unlock
Privacy Features Controlled
📶 Wi-Fi - Disable/enable wireless connectivity
📱 Bluetooth - Control Bluetooth radio
📡 Mobile data - Manage cellular data connection
📍 Location services - Control GPS and location tracking
📳 NFC - Control Near Field Communication sensor
Experimental Features (Android 12+)
📷 Camera - Disable/enable camera sensor privacy
🎤 Microphone - Disable/enable microphone sensor privacy
Customizable Timing
Lock Delay: 0-60 seconds before privacy actions trigger
Unlock Delay: 0-60 seconds before features are restored
Instant Mode: Set delays to 0 for immediate action
📱 Requirements
Minimum: Android 7.0+ (API level 24) Camera/Microphone Features: Android 12+ (API level 31)
Choose ONE of the following privilege methods:
Option 1: Root Access (Recommended for rooted devices)
Root access via Magisk, SuperSU, or similar
Best performance with UID 0 privileges
Option 2: Shizuku (For non-rooted devices)
Shizuku app installed and running
ADB privileges via USB debugging or wireless ADB
No root required - works with ADB-level permissions
Option 3: Sui (Best of both worlds)
Rooted device with Magisk installed
Sui Magisk module installed
Best user experience - no permission prompts, automatic startup
🏗️ Architecture & Dependencies
Zero Google Dependencies - Complete F-Droid compliance
Pure AndroidX - Modern Android development without Google services
Traditional Android Views - Efficient UI with ViewBinding
Navigation Component - Fragment-based navigation
MVVM Pattern - Reactive architecture with LiveData
Dual Privilege Support - Abstraction layer for Root and Shizuku
Key Dependencies
libsu - Reliable root access management
Shizuku API - ADB privilege management
Sui - Magisk module for Shizuku API
AndroidX Core Libraries - Modern Android framework components
Work Manager - Background task scheduling
Navigation Component - Fragment navigation (Google Material excluded)
ViewBinding - Type-safe view references
Privilege Detection Priority
Sui - Magisk module providing Shizuku API with root (best UX)
Root - Traditional root access via Magisk/SuperSU
Shizuku - ADB privileges via Shizuku app (no root required)
PrivacyFlip
Automatic lock/unlock privacy control for Android devices 🔐📱✨
PrivacyFlip automatically manages your device's privacy features based on lock/unlock state. When you lock your device, it can disable Wi-Fi, Bluetooth, mobile data, location services, NFC, and even camera/microphone sensors (experimental). When you unlock, it intelligently restores the features you want back on.
Works with Root or Shizuku - Choose your preferred privilege method!
Stop leaking data and being tracked when your phone is locked. Automatic lock/unlock privacy control for rooted Android devices 🔐📱✨
🔒 Features
Automatic Privacy Control
Lock Detection: Instantly disables privacy features when screen locks
Unlock Detection: Waits for proper authentication (not just screen-on)
Smart Restoration: Configurable feature re-enabling on unlock
Privacy Features Controlled
📶 Wi-Fi - Disable/enable wireless connectivity
📱 Bluetooth - Control Bluetooth radio
📡 Mobile data - Manage cellular data connection
📍 Location services - Control GPS and location tracking
📳 NFC - Control Near Field Communication sensor
Experimental Features (Android 12+)
📷 Camera - Disable/enable camera sensor privacy
🎤 Microphone - Disable/enable microphone sensor privacy
Note: Camera and microphone controls require a timing window between screen lock and device lock. The app will warn you if your device is configured for instant locking.
Customizable Timing
Lock Delay: 0-60 seconds before privacy actions trigger
Unlock Delay: 0-60 seconds before features are restored
Instant Mode: Set delays to 0 for immediate action
📱 Requirements
Minimum: Android 7.0+ (API level 24) Camera/Microphone Features: Android 12+ (API level 31)
Choose ONE of the following privilege methods:
Option 1: Root Access (Recommended for rooted devices)
Root access via Magisk, SuperSU, or similar
Best performance with UID 0 privileges
Option 2: Shizuku (For non-rooted devices)
Shizuku app installed and running
ADB privileges via USB debugging or wireless ADB
No root required - works with ADB-level permissions
Option 3: Sui (Best of both worlds)
Rooted device with Magisk installed
Sui Magisk module installed
Best user experience - no permission prompts, automatic startup
🏗️ Architecture & Dependencies
Zero Google Dependencies - Complete F-Droid compliance
Pure AndroidX - Modern Android development without Google services
Traditional Android Views - Efficient UI with ViewBinding
Navigation Component - Fragment-based navigation
MVVM Pattern - Reactive architecture with LiveData
Dual Privilege Support - Abstraction layer for Root and Shizuku
Key Dependencies
libsu - Reliable root access management
Shizuku API - ADB privilege management
Sui - Magisk module for Shizuku API
AndroidX Core Libraries - Modern Android framework components
Work Manager - Background task scheduling
Navigation Component - Fragment navigation (Google Material excluded)
ViewBinding - Type-safe view references
Privilege Detection Priority
Sui - Magisk module providing Shizuku API with root (best UX)
Root - Traditional root access via Magisk/SuperSU
Shizuku - ADB privileges via Shizuku app (no root required)
GitHub
Release Privacy Flip v1.4.1 · dorumrr/privacyFlip
• Fixed dark mode alert for Experimental Features
Forwarded from The Hacker News
🔥 Researchers just broke Intel & AMD’s newest “secure” enclaves — again.
A sub-$1K hardware rig can steal attestation keys from fully patched systems running SGX, TDX, and SEV-SNP with Ciphertext Hiding.
Even constant-time crypto and DDR5 encryption couldn’t stop it.
Learn how TEE-Fail cracks open AI and confidential VMs ↓ https://thehackernews.com/2025/10/new-teefail-side-channel-attack.html
A sub-$1K hardware rig can steal attestation keys from fully patched systems running SGX, TDX, and SEV-SNP with Ciphertext Hiding.
Even constant-time crypto and DDR5 encryption couldn’t stop it.
Learn how TEE-Fail cracks open AI and confidential VMs ↓ https://thehackernews.com/2025/10/new-teefail-side-channel-attack.html
Forwarded from Android Security & Malware
GhostGrab is a new Android malware blending crypto mining with banking credential theft.
It hijacks SMS OTPs, harvests PII, and runs a hidden Monero miner—draining battery while stealing funds.
It compromised over 30 devices and C&C server leaks over 2800 victim SMS
https://www.cyfirma.com/research/ghostgrab-android-malware/
It hijacks SMS OTPs, harvests PII, and runs a hidden Monero miner—draining battery while stealing funds.
It compromised over 30 devices and C&C server leaks over 2800 victim SMS
https://www.cyfirma.com/research/ghostgrab-android-malware/
Forwarded from Mishaal's Android News Feed
📍The Pixel 6 Pro and Pixel 7 Pro are incompatible with Find Hub’s precision finding feature despite having UWB
Google confirmed to me that only the Pixel 8 and later support precision finding, though it didn't say why.
Here's what we know👇
🔗https://www.androidauthority.com/older-pixel-phones-uwb-precision-finding-3610901/
Google confirmed to me that only the Pixel 8 and later support precision finding, though it didn't say why.
Here's what we know👇
🔗https://www.androidauthority.com/older-pixel-phones-uwb-precision-finding-3610901/
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
⚡️Full Disk Encryption Right Out of The Box
In my recent chat with Mike Adams, we talked about how the Above Book takes security to the next level right out of the box. Every one of these laptops ships with full-disk encryption enabled by default, so your data is protected from the moment you turn it on. You’ll get a chance to set your own password and keep everything locked down, so no one can just walk off with your data. It’s all about giving you peace of mind and total control over your privacy.
🪧 Watch the full interview here
💻 Learn more about the Abovebook
🚨Learn what life is like with Above Phone - Rise Above: Device Overview Webinar, Oct 29
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
In my recent chat with Mike Adams, we talked about how the Above Book takes security to the next level right out of the box. Every one of these laptops ships with full-disk encryption enabled by default, so your data is protected from the moment you turn it on. You’ll get a chance to set your own password and keep everything locked down, so no one can just walk off with your data. It’s all about giving you peace of mind and total control over your privacy.
🪧 Watch the full interview here
💻 Learn more about the Abovebook
🚨Learn what life is like with Above Phone - Rise Above: Device Overview Webinar, Oct 29
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK