Privacy + Secure Tech Corner Channel ๐Ÿ›ก๏ธ
90 subscribers
6.65K photos
578 videos
497 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from The Hacker News
โš ๏ธ 15,000+ Four-Faith routers are exposed, with attackers actively exploiting a command injection flaw (CVE-2024-12856).

1๏ธโƒฃ Attackers execute commands remotely via the adj_time_year parameter.
2๏ธโƒฃ Reverse shells enable hackers to stay hidden and in control.

Read: https://thehackernews.com/2024/12/15000-four-faith-routers-exposed-to-new.html
Forwarded from The Hacker News
๐Ÿ›‘ 600,000+ users impacted! A widespread campaign compromised 16+ extensions, including tools for AI and VPNs, using phishing and malicious code injection.

Learn more: https://thehackernews.com/2024/12/16-chrome-extensions-hacked-exposing.html
Forwarded from The Hacker News
What if your password manager or note-taking tool became a hackerโ€™s entry point? Recent attacks on Chrome Store extensions reveal just how exposed your organization might be.

โ“ Why It Matters:
ยป Browser extensions are a silent threatโ€”granted access to sensitive data like cookies and identities.
ยป Credential theft can lead to organizational data breaches and compliance nightmares.

๐Ÿ’กKey Takeaways:
ยป Limit user-installed extensions.
ยป Implement risk-based policies to block risky permissions.
ยป Stay updated on the latest threats.

๐Ÿ”— Check out this guide to learn how: https://thehackernews.com/2024/12/when-good-extensions-go-bad-takeaways.html
Forwarded from The Hacker News
๐Ÿšจ Are hospitals prepared for the next big cyber attack? The HHS proposes new HIPAA updates to safeguard patient data and critical systems.

๐Ÿ‘‰Proposed Solutions:
๐Ÿ’พ Encrypt sensitive data everywhere
๐Ÿ“Š Map assets and identify vulnerabilities
โฑ Set recovery protocols within 72 hours

Read more: https://thehackernews.com/2024/12/new-hipaa-rules-mandate-72-hour-data.html
Forwarded from It's FOSS
Happy Birthday to the legend! ๐ŸŽ‚ ๐ŸŽ‰

Linus Torvalds, born on December 28, 1969, is the creator of the Linux kernel and Git, two groundbreaking inventions that transformed software development. His work on Linux revolutionized open-source operating systems, and Git became the standard tool for version control. ๐Ÿง
Forwarded from It's FOSS
A lifetime membership offer for It's FOSS Pro to show your support and get rid of ads! โค๏ธ

https://news.itsfoss.com/tuxmas-day-4/
CRX Installer

CRX Installer is a Firefox extension that enables the installation of Chrome extensions on browsers such as Floorp, Firefox Nightly, Firefox Developer Edition, Librewolf, and Zen Browser.  It does not function with the standard version of Firefox. For browsers other than Floorp, users must set xpinstall.signatures.required to false in the about:config settings to utilize this extension.

๐Ÿ”— Links:
- Add it to your Firefox
- Demo video
- Source code
Developer: FoxRefire

๐Ÿท๏ธ Tags: #Browser #Extension
InstaEclipse (Xposed module)

InstaEclipse is an LSPosed module designed to enhance your Instagram experience with advanced features like developer options, ghost mode, distraction-free mode, and more. This module is built to stay compatible with new Instagram releases by leveraging dynamic analysis to locate targeted classes and methods automatically.

๐Ÿ”— Links:
- Download
- Screenshots
- Features
- Support group
- Source code
Developer: Abdul (ReSo7200)

๐Ÿท๏ธ Tags: #Android #Xposed #Root #Tools
Youtube Times

A Firefox Extension that replaces the undescriptive youtube time with the exact absolute time of release. Perfect for all your Internet Historian needs!

๐Ÿ”— Links:
- Add it to your Firefox
- Sample pictures
- How it works
- Source code
Developer: RandomGamingDev

๐Ÿท๏ธ Tags: #Browser #Extension #Utilities
SoundRemote

An Android app that, when paired up with SoundRemote server, allows to capture and stream audio from a PC to an Android device, execute keyboard commands on the PC remotely from the Android app either directly through its UI or by binding to certain events such as device shaking or incoming phone call and control media on the PC through the Android media notification.

๐Ÿ”— Links:
- Download: GitHub | IzzySoft
- Screenshots
- Source Code
- Developer: SoundRemote

๐Ÿท๏ธ Tags: #android #desktop #sound
Ghostty

Ghostty is a fast, feature-rich, and cross-platform terminal emulator that uses platform-native UI and GPU acceleration.

๐Ÿ”— Links:
- Download
- Screenshots
- Source Code
- Developer: Mitchellh

๐Ÿท๏ธ Tags: #Linux #MacOS
Forwarded from ๐— ๐—˜๐—ข๐—ช ๐——๐—จ๐— ๐—ฃ (๐— ๐—˜๐—ข๐—ช๐—ป๐—ฎ ๐Ÿ’…)
โš ๏ธUrgent: Phone Hacking Scam on Telegram - Malicious Magisk Module Warning

This scammer on Telegram [UID 1878505335] is spreading a dangerous Magisk module to hack/destroy phones and demand money. (stoplamers gang)
[See Screenshot 1- CHAT BETWEEN SCAMMER & VICTIM]


What Happened:
โ€ข [UID 7576386418] Victim Ganesh's phone was hacked via Scammer's module.
โ€ข Scammer demanded $100, threatening to destroy the phone if they didn't pay.
โ€ข This guy alerted me to this scam.
โ€ข I went undercover to investigate how it works
[See Screenshot 2- CHAT BETWEEN SCAMMER & Investigator] MUST READ


Here's how it went down:

There were only two things needed: "Zygisk" and the "virus module" (click to read more)

I was really surprised to find out it didn't even require a restart. Once you flashed it, it was basically done.

So I contacted the person and, pretending to be someone else, said I wanted to access my girlfriend's phone. I acted like a nibba & He seemed to believe my story and sent me the module.
To see how it works, I needed to install it. Instead of using the real module, I made two fake modules. I just copied module.prop file from his module, repacked it with my update binary, and flashed it using "kernel su".

The person was then trying to do things to my phone, but nothing was happening.๐Ÿ˜ญ๐Ÿคฃ I was just watching it and was really laughing hard because it wasn't working. Then he sent commands to run in the terminal, related to the service.sh file inside his module. Since I hadnโ€™t installed the original module, the commands didn't do anything. He then seemed confused and started asking for my Android and kernel versions๐Ÿ˜‚. Finally, he sent something I wouldnโ€™t run as it was an obvious privacy concern. So, I've decided to just hold on to things for now since I have enough evidence
What Happens If You Flash This Module?:

โ€ข Scammer gets full access to your phone (data, messages, photos, chats etc.)
โ€ข Scammer can steal your data and money.
โ€ข Scammer can lock or destroy your phone. (he remotely destroyed victim's device making it unbootable)
โ€ข You will be blackmailed.

- Moral from this incident
โ€ข Do not flash modules from unknown sources
โ€ข Only use trusted modules.
โ€ข Be suspicious of free or "too good to be true" modules.
โ€ข Research modules before installing.
๏ปฟ
Stay safe and share this information with your friends to help stop these scams!

~ Regards // Mona
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘1
Forwarded from ๐— ๐—˜๐—ข๐—ช๐—ป๐—ฎ ๐Ÿ’…
Photo from victim