Privacy + Secure Tech Corner Channel 🛡️
92 subscribers
6.67K photos
587 videos
555 files
16.3K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
Fortinet has confirmed a new FortiWeb flaw — CVE-2025-58034 — already exploited in the wild.

It lets authenticated attackers execute OS commands via crafted requests.

Full story ↓ https://thehackernews.com/2025/11/fortinet-warns-of-new-fortiweb-cve-2025.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
We say “trust but verify.”

In SaaS, most teams trust once—and never verify again. Old tokens stay valid. Apps keep broad access.

That’s how attackers move in quietly.

Gal Nakash explains why Zero Trust fails in practice and what to fix ↓ https://thehackernews.com/expert-insights/2025/11/the-problem-with-trust-but-verify-is.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🚨 Hackers turned software updates into malware.

ESET found a China-linked group called PlushDaemon using a tool named EdgeStepper to hijack internet routers and reroute updates straight to fake servers.

So that “safe update”? It could install spyware instead.

Full story ↓ https://thehackernews.com/2025/11/edgestepper-implant-reroutes-dns.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🚨 New exploit found in ServiceNow’s Now Assist AI platform.

Researchers showed one AI agent could recruit others to steal data and send emails — even with protections enabled.

Misconfigurations, not models, opened the door.

How it happened ↓ https://thehackernews.com/2025/11/servicenow-ai-agents-can-be-tricked.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
⚠️ Hackers just took over tens of thousands of old ASUS routers around the world.

They used six known bugs to build a massive hidden network — still active right now. Each router even shares a weird 100-year security certificate.

Full story → https://thehackernews.com/2025/11/wrthug-exploits-six-asus-wrt-flaws-to.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
Hackers are using trusted apps to attack.

ThreatLocker’s Ringfencing stops them — blocking PowerShell, macros, and other risky actions before they spread.

Learn how it works → https://thehackernews.com/2025/11/application-containment-how-to-use.html
This media is not supported in your browser
VIEW IN TELEGRAM