Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.65K photos
579 videos
505 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from The Hacker News
🇰🇵 North Korean malware #InvisibleFerret uses fake tech job interviews

It's target: corporate info, crypto data, source code 🎯

Read comprehensive technical analysis of this threat from @AnyRun_app
https://thn.news/invisibleferret-tech-analysis
Forwarded from The Hacker News
🔐 New FREE Risk Assessment for Security Teams!

As GenAI and SaaS apps become essential, your organization’s security risks are growing. Employees' browser behavior could be leaking sensitive data.

🔍 Gain actionable insights and uncover hidden risks with this customized risk assessment: https://thehackernews.com/2025/01/discover-hidden-browsing-threats-free.html
Forwarded from The Hacker News
🛑 Zero-Day Exploit in Cambium Routers!

Threat actors are exploiting this flaw to deploy the AIRASHI botnet, carrying out powerful DDoS attacks of up to 3 Tbps.

Take action to secure your IoT devices before it’s too late.

Learn more here: https://thehackernews.com/2025/01/hackers-exploit-zero-day-in-cnpilot.html
Forwarded from The Hacker News
🔥 The Trump administration has just terminated all DHS advisory committee memberships, including the key Cyber Safety Review Board (CSRB).

CSRB's past work included:
⤷ Reporting on Log4Shell and LAPSUS$ intrusions
⤷ Holding tech firms accountable for cybersecurity lapses
⤷ Investigating Salt Typhoon, a Chinese hacking group targeting U.S. telecoms

Read → https://thehackernews.com/2025/01/trump-terminates-dhs-advisory-committee.html
Forwarded from The Hacker News
🔒 Google uncovers "TRIPLESTRENGTH," a financially motivated hacker group targeting cloud environments for cryptojacking and ransomware.

Their extensive reach includes Google Cloud, AWS, and Microsoft Azure.

👉 Read the full report: https://thehackernews.com/2025/01/triplestrength-targets-cloud-platforms.html
Forwarded from The Hacker News
🚨 Critical Cisco Flaw Exposes Admin Access!

A new vulnerability in Cisco Meeting Management (CVE-2025-20156) could allow attackers to gain full administrator control. 🔐

Also, CISA and FBI issue a warning on Ivanti exploit chains—targeting government and private sector networks.

Learn more: https://thehackernews.com/2025/01/cisco-fixes-critical-privilege.html
Forwarded from The Hacker News
⚠️ A new BackConnect (BC) malware linked to QakBot is out, and it's evolving FAST.

Both QakBot and Black Basta are using this shared tool to ramp up their attacks, affecting thousands.

Find out: https://thehackernews.com/2025/01/qakbot-linked-bc-malware-adds-enhanced.html
Forwarded from The Hacker News
🔎 Is your website tracking users more than necessary?

🚨 45% of third-party apps on websites access sensitive user data unnecessarily.

Take steps to secure your site—get actionable tips in the full report: https://thehackernews.com/2025/01/new-research-state-of-web-exposure-2025.html
Forwarded from The Hacker News
👉 50-80% of enterprise breaches are due to credential & user-based attacks.

Legacy authentication methods are outdated and vulnerable, but cutting-edge authentication systems are now making attacks impossible.

Learn how to upgrade your security today: https://thehackernews.com/2025/01/eliminate-identity-based-threats.html
Forwarded from The Hacker News
Did you know security teams can now enforce MFA on user accounts directly in their web browser — even for apps that don’t allow mandatory MFA enforcement?

With Push Security, spend less time chasing users to configure MFA or trying to manually enforce it across hundreds of apps.

https://thn.news/mfa-enforce-other
Forwarded from The Hacker News
🔒 HellCat & Morpheus Ransomware Sharing Identical Code!

Cybercriminals are using the same payload for attacks—just with victim-specific tweaks. Smaller, more agile groups like these may dominate the threat landscape moving forward.

👉 Read analysis: https://thehackernews.com/2025/01/experts-find-shared-codebase-linking.html
Forwarded from The Hacker News
🔴 A new malware campaign is exploiting fake CAPTCHA verifications to spread Lumma Stealer, affecting global organizations.

Targets are being tricked into downloading malware outside of the browser context.

Read the full report: https://thehackernews.com/2025/01/beware-fake-captcha-campaign-spreads.html
Forwarded from The Hacker News
⚠️ URGENT: Security Flaws Found in Palo Alto Networks Firewalls

⤷ BootHole CVE-2020-10713: Secure Boot bypass
⤷ LogoFAIL & PixieFail: Code execution via firmware & network stack vulnerabilities
⤷ Misconfigured SPI flash access in PA-415

👉 Read: https://thehackernews.com/2025/01/palo-alto-firewalls-found-vulnerable-to.html
Forwarded from The Hacker News
🕵️‍♂️ J-magic Campaign </>

A New Breed of Malware – Attackers are using "magic packets" to remotely control Juniper routers and deploying a variant of the publicly available backdoor "cd00r" into enterprise networks.

Find out more: https://thehackernews.com/2025/01/custom-backdoor-exploiting-magic-packet.html
Forwarded from The Hacker News
🚨 Urgent Alert: CVE-2020-11023 is back in the spotlight!

CISA adds this jQuery flaw to its Known Exploited Vulnerabilities list after active exploitation was detected.

Learn more: https://thehackernews.com/2025/01/cisa-adds-five-year-old-jquery-xss-flaw.html

Review your jQuery versions and update immediately.
Forwarded from The Hacker News
🔑 Google introduces Identity Check, a new feature for Android devices that locks sensitive settings behind biometric authentication when outside trusted locations.

Powered by AI, it helps protect devices against unauthorized access.

👉 Check out: https://thehackernews.com/2025/01/androids-new-identity-check-feature.html
Forwarded from The Hacker News
Why Zero Trust Is the Future of Cybersecurity

🔑 Only verified users get access to specific IT resources.
🔒 Context-based security, driven by AI, ensures nothing slips through the cracks.
🌐 No more backhauling traffic—secure, fast, direct-to-app access.

Explore the full article: https://thehackernews.com/expert-insights/2025/01/zero-trust-security-why-its-essential.html
Forwarded from The Hacker News
🚨 5 indicted in a major North Korean IT worker scam targeting U.S. companies!

⤷ $866,000 funneled through shell accounts
⤷ Remote laptop farms deceived employers into hiring fake workers
⤷ One suspect arrested, others face up to 20 years in prison

👉 Learn More: https://thehackernews.com/2025/01/doj-indicts-5-individuals-for-866k.html
Forwarded from The Hacker News
🛑 Over 100 Vulnerabilities in LTE & 5G Discovered.

These flaws could give hackers a backdoor into cellular networks—disrupting communications at a city-wide level.

⤷ Attacks on phone calls, messaging, and data.
⤷ Exploiting buffer overflows and memory errors.
⤷ Non-authenticated mobile devices can exploit these flaws.

Read the full details: https://thehackernews.com/2025/01/ransacked-over-100-security-flaws-found.html
Forwarded from The Hacker News
Learn cybersecurity risk management from the experts at Georgetown. Attend our webinar on February 6.

https://thn.news/cyber-risk-mgmt-ig
Forwarded from The Hacker News
🔑 Only 14% of Organizations Can Recover SaaS Data in MINUTES!

The rest? It takes hours, or even days—putting compliance and productivity at serious risk.

Lost time = lost revenue.

🔐 Find out how to level up your data resilience in the 2025 SaaS Backup and Recovery Report: https://thehackernews.com/2025/01/insights-from-2025-saas-backup-and-recovery-report.html