Privacy + Secure Tech Corner Channel 🛡️
89 subscribers
6.65K photos
574 videos
480 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from The Hacker News
UPDATE: A sophisticated Chinese hacking group, CL-STA-0049, is exploiting vulnerabilities in IIS servers to deploy the stealthy Squidoor backdoor.

Squidoor’s multi-platform capabilities target both Windows & Linux systems.

https://thehackernews.com/2025/02/finaldraft-malware-exploits-microsoft.html#update
Forwarded from The Hacker News
🚨 Sticky Werewolf is back with a new wave of attacks, focusing on organizations in Russia and Belarus.

This time, the threat actor is using a previously undocumented implant to deliver the Lumma Stealer malware.

Read the full article: https://thehackernews.com/2025/02/sticky-werewolf-uses-undocumented.html
Forwarded from The Hacker News
A recent study reveals that large language model datasets contain nearly 12,000 live secrets, including API keys and passwords.

These “live” secrets aren’t just exposed – they allow for successful authentication with their respective services.

Read the full article: https://thehackernews.com/2025/02/12000-api-keys-and-passwords-found-in.html
Forwarded from The Hacker News
🛑 Microsoft exposes Storm-2139, a dangerous network hijacking generative AI services for illegal content creation.

This sophisticated cybercrime ring is manipulating AI to produce harmful content, including explicit materials.

Read the full story: https://thehackernews.com/2025/02/microsoft-exposes-llmjacking.html
Forwarded from The Hacker News
Cybercriminals are leveraging fake CAPTCHA images in phishing PDFs to distribute the dangerous Lumma Stealer malware.

260 unique domains and 5,000 phishing PDFs, mostly hosted on Webflow, are part of this ongoing campaign.

Learn more about the tactics: https://thehackernews.com/2025/02/5000-phishing-pdfs-on-260-domains.html
Forwarded from The Hacker News
🔐 RDP allows remote work and efficient IT management, but it’s also a prime target for cyberattacks.

50% of SMBs use RDP daily, cutting costs and downtime—but exposing systems to the internet increases vulnerability.

Find out how to fortify your RDP and reduce the risk in the full article: https://thehackernews.com/2025/02/rdp-double-edged-sword-for-it-teams.html
Forwarded from NoGoolag
Evil Crow RF: A Portable Radio Frequency Device | Mobile Hacker

As mobile hackers, we often find that our smartphones, while powerful in many ways, lack the essential radio frequency (RF) features needed for wireless security testing. These limitations can be frustrating when trying to explore wireless signals directly from our mobile devices. However, with the Evil Crow RF V2, these limitations can be easily overcome. This tool expands your smartphone’s capabilities, allowing you to dive into RF analysis, penetration testing, and signal manipulation—bringing mobile hacking to a whole new level.

The #EvilCrow RF V2 allows users to perform a variety of tasks and attacks, including:

Receive signal
Transmit signal
Replay attacks
Bruteforce
Jamming
Scanner
Mousejacking
Rolljam attack
Rollback attack
Kaiju analyzer (online rolling code analyzer and generator)

#RF #Mobile #Hacking