Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
583 videos
548 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China | gfw report

We present Wallbleed, a buffer over-read vulnerability that existed in the DNS injection subsystem of the Great Firewall of China. Wallbleed caused certain nation-wide censorship middleboxes to reveal up to 125 bytes of their memory when censoring a crafted DNS query. It afforded a rare insight into one of the Great Firewall’s well-known network attacks, namely DNS injection, in terms of its internal architecture and the censor’s operational behaviors.

#DNS #DNSInjection #GreatFirewall #China
Forwarded from The Hacker News
A botnet malware is rapidly spreading across 226 countries, infecting over 1.5 million Android TV devices.

RSA and XXTEA encryption make it harder to detect and trace the botnet’s activity.

Read the full analysis here: https://thehackernews.com/2025/03/vo1d-botnets-peak-surpasses-159m.html
Forwarded from The Hacker News
Ransomware attacks jumped 11% in 2024, hitting a record 5,414 incidents. Disruptions in Q2 and Q4 caused a surge, as law enforcement cracked down on major cybercrime groups.

Read the full analysis on this growing threat: https://thehackernews.com/2025/03/the-new-ransomware-groups-shaking-up.html
Forwarded from The Hacker News
Paragon Partition Manager's BioNTdrv.sys driver has a critical vulnerability (CVE-2025-0289) exploited in ransomware attacks.

Attackers with local access can escalate privileges and run malicious code on Windows systems.

Read the full analysis here: https://thehackernews.com/2025/03/hackers-exploit-paragon-partition.html
Forwarded from The Hacker News
The U.K. ICO is investigating TikTok, Reddit, and Imgur for potential child data privacy violations.

The focus is on whether these platforms are using minors' personal data to target content.

Read the full story here: https://thehackernews.com/2025/03/uk-ico-investigates-tiktok-reddit-and.html
Forwarded from The Hacker News
A new phishing campaign uses the ClickFix technique to launch a multi-stage attack via SharePoint.

It hides behind trusted services and uses the Havoc C2 framework to avoid detection.

Read the full analysis here: https://thehackernews.com/2025/03/hackers-use-clickfix-trick-to-deploy.html
Forwarded from The Hacker News
A threat group is exploiting AWS misconfigurations to send phishing emails.

TGR-UNK-0011 uses exposed AWS access keys to bypass email security, blending in with trusted communications.

Learn more about their tactics: https://thehackernews.com/2025/03/hackers-exploit-aws-misconfigurations.html
Forwarded from The Hacker News
⚠️ Google’s March 2025 Android Security Bulletin warns of 44 vulnerabilities, including two actively exploited flaws: CVE-2024-43093 and CVE-2024-50302, with one tied to a zero-day attack on activists.

Get the full details: https://thehackernews.com/2025/03/googles-march-2025-android-security.html
Forwarded from The Hacker News
The U.S. CISA has added five vulnerabilities to its Known Exploited Vulnerabilities (KEV) list, affecting software from Cisco, Microsoft, and Progress WhatsUp Gold.

Learn how this impacts you and how to protect yourself: https://thehackernews.com/2025/03/cisco-hitachi-microsoft-and-progress.html
Forwarded from The Hacker News
A mass exploitation campaign targets ISPs in China and the U.S. West Coast, affecting over 4,000 IPs with brute-force attacks and malware, including crypto miners and info stealers.

Cybercriminals bypass security and steal data using PowerShell and Telegram.

Read here: https://thehackernews.com/2025/03/over-4000-isp-networks-targeted-in.html
Forwarded from The Hacker News
A new phishing campaign targets critical UAE sectors with a Go-based backdoor, Sosano. The attack uses a compromised Indian electronics company to deliver a targeted payload.

Learn more: https://thehackernews.com/2025/03/suspected-iranian-hackers-used.html
Forwarded from The Hacker News
Cyberattacks are getting smarter—are you?

Threat-Led Vulnerability Management (TLVM) helps you focus on the vulnerabilities most likely to be exploited, making your defenses stronger and your resources smarter.

Discover how to optimize your strategy: https://thehackernews.com/expert-insights/2025/03/why-now-is-time-to-adopt-threat-led.html
Forwarded from The Hacker News
⚠️ ALERT: VMware ESXi, Workstation, and Fusion products have critical vulnerabilities that are being actively exploited.

These flaws could allow remote code execution and information disclosure.

Learn more about the vulnerabilities and fixes here: https://thehackernews.com/2025/03/vmware-security-flaws-exploited-in.html
Forwarded from The Hacker News
Credential stuffing is getting harder to stop, but attackers are evolving. Stolen credentials, often just $10, drive 80% of web app attacks, and the threat is growing.

With billions of compromised credentials out there, attacks can spread quickly and widely.

Learn more about this shift in attack strategies: https://thehackernews.com/2025/03/how-new-ai-agents-will-transform.html
Forwarded from The Hacker News
Black Basta and CACTUS ransomware groups now share the same BackConnect module, signaling a shift in attack methods.

The overlap in tactics means cybersecurity professionals must watch for threats across multiple ransomware families.

Read here: https://thehackernews.com/2025/03/researchers-link-cactus-ransomware.html