Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
583 videos
548 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from NoGoolag
Media is too big
VIEW IN TELEGRAM
Mozilla lost touch with reality; how becoming rich through failure stunts mental & emotional growth

https://wiki.rossmanngroup.com/wiki/Mozilla_introduces_TOS_to_Firefox
https://wiki.rossmanngroup.com/wiki/Mozilla
https://librewolf.net/

00:00:00 - tl;dr solution use librewolf
00:00:52 - my tl;dr thoughts
00:01:08 - what mozilla did
00:02:28 - mozilla crashed archive.org.....
00:03:03 - Louis gets trolled by a monster
00:03:56 - firefox' removes statement on not selling personal data.
00:04:40 - terms were changed without explicitly alerting users
00:05:08 - mozilla did this at the WORST POSSIBLE TIME
00:07:05 - the worst communication policy
00:07:14 - California consumer protection act
00:08:03 - The suspicious part mozilla put in
00:08:26 - What is "selling data" ?
00:08:54 - Existing business practices exist in grey areas to CCPA
00:12:46 - Just use librewolf to avoid all this....
00:16:27 - Privacy policy is still fairly strong
00:17:20 - How money for nothing destroys people & companies
Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China | gfw report

We present Wallbleed, a buffer over-read vulnerability that existed in the DNS injection subsystem of the Great Firewall of China. Wallbleed caused certain nation-wide censorship middleboxes to reveal up to 125 bytes of their memory when censoring a crafted DNS query. It afforded a rare insight into one of the Great Firewall’s well-known network attacks, namely DNS injection, in terms of its internal architecture and the censor’s operational behaviors.

#DNS #DNSInjection #GreatFirewall #China
Forwarded from The Hacker News
A botnet malware is rapidly spreading across 226 countries, infecting over 1.5 million Android TV devices.

RSA and XXTEA encryption make it harder to detect and trace the botnet’s activity.

Read the full analysis here: https://thehackernews.com/2025/03/vo1d-botnets-peak-surpasses-159m.html
Forwarded from The Hacker News
Ransomware attacks jumped 11% in 2024, hitting a record 5,414 incidents. Disruptions in Q2 and Q4 caused a surge, as law enforcement cracked down on major cybercrime groups.

Read the full analysis on this growing threat: https://thehackernews.com/2025/03/the-new-ransomware-groups-shaking-up.html
Forwarded from The Hacker News
Paragon Partition Manager's BioNTdrv.sys driver has a critical vulnerability (CVE-2025-0289) exploited in ransomware attacks.

Attackers with local access can escalate privileges and run malicious code on Windows systems.

Read the full analysis here: https://thehackernews.com/2025/03/hackers-exploit-paragon-partition.html
Forwarded from The Hacker News
The U.K. ICO is investigating TikTok, Reddit, and Imgur for potential child data privacy violations.

The focus is on whether these platforms are using minors' personal data to target content.

Read the full story here: https://thehackernews.com/2025/03/uk-ico-investigates-tiktok-reddit-and.html
Forwarded from The Hacker News
A new phishing campaign uses the ClickFix technique to launch a multi-stage attack via SharePoint.

It hides behind trusted services and uses the Havoc C2 framework to avoid detection.

Read the full analysis here: https://thehackernews.com/2025/03/hackers-use-clickfix-trick-to-deploy.html
Forwarded from The Hacker News
A threat group is exploiting AWS misconfigurations to send phishing emails.

TGR-UNK-0011 uses exposed AWS access keys to bypass email security, blending in with trusted communications.

Learn more about their tactics: https://thehackernews.com/2025/03/hackers-exploit-aws-misconfigurations.html
Forwarded from The Hacker News
⚠️ Google’s March 2025 Android Security Bulletin warns of 44 vulnerabilities, including two actively exploited flaws: CVE-2024-43093 and CVE-2024-50302, with one tied to a zero-day attack on activists.

Get the full details: https://thehackernews.com/2025/03/googles-march-2025-android-security.html
Forwarded from The Hacker News
The U.S. CISA has added five vulnerabilities to its Known Exploited Vulnerabilities (KEV) list, affecting software from Cisco, Microsoft, and Progress WhatsUp Gold.

Learn how this impacts you and how to protect yourself: https://thehackernews.com/2025/03/cisco-hitachi-microsoft-and-progress.html
Forwarded from The Hacker News
A mass exploitation campaign targets ISPs in China and the U.S. West Coast, affecting over 4,000 IPs with brute-force attacks and malware, including crypto miners and info stealers.

Cybercriminals bypass security and steal data using PowerShell and Telegram.

Read here: https://thehackernews.com/2025/03/over-4000-isp-networks-targeted-in.html
Forwarded from The Hacker News
A new phishing campaign targets critical UAE sectors with a Go-based backdoor, Sosano. The attack uses a compromised Indian electronics company to deliver a targeted payload.

Learn more: https://thehackernews.com/2025/03/suspected-iranian-hackers-used.html
Forwarded from The Hacker News
Cyberattacks are getting smarter—are you?

Threat-Led Vulnerability Management (TLVM) helps you focus on the vulnerabilities most likely to be exploited, making your defenses stronger and your resources smarter.

Discover how to optimize your strategy: https://thehackernews.com/expert-insights/2025/03/why-now-is-time-to-adopt-threat-led.html
Forwarded from The Hacker News
⚠️ ALERT: VMware ESXi, Workstation, and Fusion products have critical vulnerabilities that are being actively exploited.

These flaws could allow remote code execution and information disclosure.

Learn more about the vulnerabilities and fixes here: https://thehackernews.com/2025/03/vmware-security-flaws-exploited-in.html
Forwarded from The Hacker News
Credential stuffing is getting harder to stop, but attackers are evolving. Stolen credentials, often just $10, drive 80% of web app attacks, and the threat is growing.

With billions of compromised credentials out there, attacks can spread quickly and widely.

Learn more about this shift in attack strategies: https://thehackernews.com/2025/03/how-new-ai-agents-will-transform.html