Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
584 videos
550 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from The Hacker News
Lotus Panda is back, using new Sagerunex variants to target key sectors in Asia.

Now, they're hiding in plain sight, using Dropbox and Zimbra for command-and-control—making detection tougher than ever.

Get the full analysis here: https://thehackernews.com/2025/03/chinese-apt-lotus-panda-targets.html
Forwarded from The Hacker News
Identity is the top target for cybercriminals—80% of breaches are due to compromised credentials.

With cloud services and fragmented tech stacks, the risk is higher than ever. Securing Identity is crucial to protecting your enterprise.

Learn more about strengthening your security strategy: https://thehackernews.com/2025/03/identity-new-cybersecurity-battleground.html
Forwarded from The Hacker News
Google launches AI-powered scam detection for Android, warning users during conversations—without compromising privacy.

Read more: https://thehackernews.com/2025/03/google-rolls-out-ai-scam-detection-for.html
Forwarded from The Hacker News
Dark Caracal is targeting Latin American businesses with the Poco RAT trojan. It can upload files, capture screenshots, and run commands.

Discover more about this sophisticated attack: https://thehackernews.com/2025/03/dark-caracal-uses-poco-rat-to-target.html
Forwarded from The Hacker News
Silk Typhoon has shifted from exploiting Microsoft Exchange flaws to targeting IT supply chains.

By compromising remote management tools and cloud apps, they gain access to networks, paving the way for large-scale espionage.

Read the full analysis here: https://thehackernews.com/2025/03/china-linked-silk-typhoon-expands-cyber.html
Forwarded from The Hacker News
Many organizations rely on 10+ security tools, but they often don’t integrate.

This creates hidden gaps—misconfigurations and untracked devices. Cybersecurity teams need a unified view to spot these risks and close vulnerabilities before attackers do.

Learn more about strengthening your security: https://thehackernews.com/expert-insights/2025/03/why-aggregating-your-asset-inventory.html
Forwarded from NoGoolag
Looks like the Israeli ID verification company AU10TIX may indeed be working with Antifa journos to dox people through their X verification.

The guy in question is CaptiveDreamer7.

Contrary to the linked post, X *still* uses Au10tix for verification.

🔗
Forwarded from NoGoolag
This is a screenshot I just took showing X is still using Au10tix for verification.

Elon Musk only paused using their services temporarily after they had a massive security breach.

Interestingly, the ADL backed off him shortly after this partnership was launched in Sept 2023.
🔎 A huge update is coming to Google Search!

Google has announced an experimental "AI Mode" powered by Gemini 2.0 that can answer more complex questions and supports multi-part queries as well as follow-up questions.

More details + video👇

🔗 https://www.androidauthority.com/google-search-ai-mode-experiment-3532243/
Forwarded from The Hacker News
USB drive attacks are a serious cybersecurity threat, using everyday devices to bypass network defenses.

Malware spreads through public drop-offs, mailed USBs, and social engineering, putting organizations at risk of data breaches, financial loss, and downtime.

Read the full analysis here: https://thehackernews.com/2025/03/defending-against-usb-drive-attacks.html