Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
579 videos
530 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from ATT • Tech News (aan (placeholder))
The US is preparing to get TikTok banned from the Play Store and App Store... again!

John Moolenaar of the Republicans and Raja Krishnamoorthi of the Democrats issued a warning to ByteDance and Shou Zi Chew (TikTok CEO) to do a "qualified divestiture" from US market to avoid risk to the national security.

We already know all about ByteDance and Tiktok and how they collect data and their link to the CCP, we don't need to talk about that.

Alphabet and Apple have been instructed to remove TikTok from their app stores by January 19. Neither of them have commented yet.

TikTok quickly has to appeal to the supreme court to avoid getting banned from the US.

Will it happen this time around?

🔗 Read more here!

👨‍💻 @agamtechtricks
Forwarded from The Hacker News
🛡️ FBI: Hackers are hijacking IoT devices (web cameras, DVRs) using old vulnerabilities and weak passwords.

🛡️ CISA: Actively exploited flaws in Adobe ColdFusion and Windows Kernel. Public exploits exist.

🛡️ Routers: Over 20,000 DrayTek routers hit by ransomware via a zero-day exploit.

🔒 What’s the pattern? Unpatched systems + edge devices = easy targets for attackers.

—Patch critical systems immediately.
—Audit IoT, routers, and edge devices.

Enforce strong passwords and proactive monitoring.

🔗 Full analysis: https://thehackernews.com/2024/12/cisa-and-fbi-raise-alerts-on-exploited.html
Forwarded from The Hacker News
🛑 The Mask APT is back—this time, they’re smarter.

A decade-old espionage group is exploiting trusted tools like MDaemon WorldClient and HitmanPro drivers to bypass your defenses—undetected.

—They infect Windows, macOS, Android, and iOS seamlessly.
—New attacks spotted in 2019, 2022, and 2024 prove their persistence.
—Goreto malware uses Google Drive to fetch commands, leveraging tools we all rely on.

🔗 Full analysis reveals how this group operates: https://thehackernews.com/2024/12/the-mask-apt-resurfaces-with.html
Forwarded from The Hacker News
⚠️ Would you trust “UpdateMe.exe” or “SecurityPatch.exe”?

Cybercriminals are disguising malware as software updates to deliver CoinLurker, a stealer targeting cryptocurrency wallets.

Did you know:
• Evades detection using stolen EV certificates and advanced obfuscation
• Steals data from crypto wallets (Bitcoin, Ledger Live, Exodus)
• Harvests credentials from tools like Telegram, Discord, FileZilla

🛡️ Protect Your Team:
• Use ad-blocking tools to filter suspicious links
• Train employees to spot fake software updates
• Monitor downloads for anomalies

👉 Read details here: https://thehackernews.com/2024/12/hackers-exploit-webview2-to-deploy.html
Forwarded from The Hacker News
⚠️ Imagine this: Your team downloads what looks like a regular PDF. Behind the scenes? Malware that steals data, controls devices, and watches everything.

This isn’t fiction. The Bitter APT group is targeting high-value Turkish defense firm using:

• Fake World Bank PDFs as lures.
• NTFS Alternate Data Streams (ADS) to hide PowerShell malware inside harmless files.
• WmRAT & MiyaRAT to steal data, take screenshots, and run remote commands.

🔗 Learn more: https://thehackernews.com/2024/12/bitter-apt-targets-turkish-defense.html
Forwarded from The Hacker News
🔒 Is your team hunting threats... or drowning in data?

Cyber attackers don’t wait. Neither should you. 5 expert techniques from @anyrun_app can help you:

• Spot threats targeting your region
• Validate suspicious IPs & scripts fast
• Track evolving TTPs to stay ahead of attackers
• Build real-time threat intel for proactive defense

⏱️ Early detection = less damage, fewer disruptions, and smarter resource allocation.

👉 Start preventing attacks. Learn the techniques here: https://thehackernews.com/2024/12/5-practical-techniques-for-effective.html
Forwarded from The Hacker News
💣 From LNK to MSC — Tax-themed phishing lures are delivering stealthy backdoors using MSC files disguised as PDFs to target Pakistan.

» MSC files mimic legit Windows Management tools, making detection harder.
» The attack combines stealthy delivery and scheduled tasks for persistence.

🔗 Details here: https://thehackernews.com/2024/12/hackers-use-microsoft-msc-files-to.html
Forwarded from Gizchina.com
Honor GT Launched with 120Hz AMOLED, 50MP Camera, and 5300mAh Battery
https://www.gizchina.com/2024/12/17/honor-gt-smartphone-launch/
Forwarded from Gizchina.com
Honor Pad V9 Launches with 11.5″ 144Hz Display, Dimensity 8350, and 10,100mAh Battery
https://www.gizchina.com/2024/12/17/honor-pad-v9-launch/