Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
🗼5G Is Coming Soon
The American Broadband Deployment Act of 2025 (H.R. 2281) has been introduced in Congress. If it passes, state and local governments will lose their ability to stop 5G small-cell installations in their communities.
These aren’t traditional cell towers. “Small Personal Wireless Service Facilities” are compact 5G mmWave antennas mounted under 50 feet—on light poles, traffic signals, buildings. You’ve likely already seen them without realizing it.
The bill overrides local regulations and streamlines approvals.
This dense 5G infrastructure is a key layer for cameras, sensors, robotics, drones, and AI-driven surveillance—while impacts on people, animals, and the environment are an afterthought.
Raise the alarm. Share this locally.
🪧 Read the full article on Substack
📲 Get privacy gear
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
The American Broadband Deployment Act of 2025 (H.R. 2281) has been introduced in Congress. If it passes, state and local governments will lose their ability to stop 5G small-cell installations in their communities.
These aren’t traditional cell towers. “Small Personal Wireless Service Facilities” are compact 5G mmWave antennas mounted under 50 feet—on light poles, traffic signals, buildings. You’ve likely already seen them without realizing it.
The bill overrides local regulations and streamlines approvals.
This dense 5G infrastructure is a key layer for cameras, sensors, robotics, drones, and AI-driven surveillance—while impacts on people, animals, and the environment are an afterthought.
Raise the alarm. Share this locally.
🪧 Read the full article on Substack
📲 Get privacy gear
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from KernelSU Next Bot
KernelSU_Next_v3.0.0-32-g5dc52a42_32889-release.apk
9 MB
Dev Manager Build (Normal)
#ci_2889
Commit
Workflow run
#ci_2889
manager: implement new method to get manager app uid (fix developer mode crash)
Commit
Workflow run
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from KernelSU Next Bot
KernelSU_Next_v3.0.0-32-g5dc52a42-spoofed_32889-release.apk
9 MB
Dev Manager Build (Spoofed)
#ci_2889
Commit
Workflow run
#ci_2889
manager: implement new method to get manager app uid (fix developer mode crash)
Commit
Workflow run
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from CI/beta
SukiSU_v4.1.0_40388-release.apk
12 MB
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🤦 Hackers built #ransomware — then left the key behind.
CyberVolk’s new VolkLocker targets 💻 Windows and 🐧 Linux.
The flaw? the lock key is hard-coded and saved as a plain file on the system.
Files can be unlocked for free — but after 48 hours, it can wipe 🗑️ personal folders.
🔗 Read: https://thehackernews.com/2025/12/volklocker-ransomware-exposed-by-hard.html
CyberVolk’s new VolkLocker targets 💻 Windows and 🐧 Linux.
The flaw? the lock key is hard-coded and saved as a plain file on the system.
Files can be unlocked for free — but after 48 hours, it can wipe 🗑️ personal folders.
🔗 Read: https://thehackernews.com/2025/12/volklocker-ransomware-exposed-by-hard.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
🚨 Active phishing attacks in Russia spread Phantom Stealer.
Fake bank transfer emails use ISO attachments. The malware steals browser data, crypto wallets, passwords, and files, then sends them out via Telegram or Discord.
Finance, payroll, accounting, and legal teams are the main targets.
🔗 Read: https://thehackernews.com/2025/12/phantom-stealer-spread-by-iso-phishing.html
Fake bank transfer emails use ISO attachments. The malware steals browser data, crypto wallets, passwords, and files, then sends them out via Telegram or Discord.
Finance, payroll, accounting, and legal teams are the main targets.
🔗 Read: https://thehackernews.com/2025/12/phantom-stealer-spread-by-iso-phishing.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
⚡ Your SaaS wasn’t hacked. It was impersonated via the browser.
Attackers ran clean, verified Chrome and Edge extensions for years. Millions of installs. One silent update flipped them into spyware.
Not a device attack. Not a cloud breach. Both at once. The browser sat in the middle, unseen, holding the keys.
🔗 Learn more: https://thehackernews.com/2025/12/a-browser-extension-risk-guide-after.html
Attackers ran clean, verified Chrome and Edge extensions for years. Millions of installs. One silent update flipped them into spyware.
Not a device attack. Not a cloud breach. Both at once. The browser sat in the middle, unseen, holding the keys.
🔗 Learn more: https://thehackernews.com/2025/12/a-browser-extension-risk-guide-after.html
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
Sensitive data is everywhere: SaaS, cloud, AI pipelines, and most teams can’t see it.
That’s why DSPM is becoming a top security priority for 2026.
Next-gen DSPM goes beyond visibility→ real-time context, automation, and AI-aware protection.
Learn more: https://thn.news/dspm-top-tools
That’s why DSPM is becoming a top security priority for 2026.
Next-gen DSPM goes beyond visibility→ real-time context, automation, and AI-aware protection.
Learn more: https://thn.news/dspm-top-tools
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from The Hacker News
FreePBX’s worst flaw isn’t a bug — it’s a legacy setting.
If AUTHTYPE is set to webserver, attackers can fake a login header and get admin access. From there, they can add their own user and run code on the system.
Default configs are safe. Old tweaks aren’t.
🔗 Read: https://thehackernews.com/2025/12/freepbx-authentication-bypass-exposed.html
If AUTHTYPE is set to webserver, attackers can fake a login header and get admin access. From there, they can add their own user and run code on the system.
Default configs are safe. Old tweaks aren’t.
🔗 Read: https://thehackernews.com/2025/12/freepbx-authentication-bypass-exposed.html