Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
579 videos
530 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Karui ToDo

An open source Google Tasks alternative to quickly jot down things to do.
Inspired by the system-24 theme and the Windows Mobile design system, this app's design is set to evolve into something even more eye-catching.

🔗 Links:
- Download
- Screenshots
- Features
- Source code
Developer: ronynn ʕ •ᴥ•ʔ

❤️ Special thanks to @maxxrew for recommending!

🏷️ Tags: #Android #Notes #Productivity
Forwarded from vx-underground
Today Microsoft announced Windows 11 will require a Microsoft account to create a local profile on the computer. They will be removing the bypass option available in the installation command prompt.

There will still be workarounds, but they're making it harder
Forwarded from The Hacker News
🚨 New Malware: RESURGE

China-linked hackers are exploiting Ivanti VPNs via CVE-2025-0282.

🛠️ RESURGE = rootkit + bootkit + web shell
🎯 Hits critical infrastructure
🔍 Linked to UNC5337 & Silk Typhoon

Patch now | Ivanti <22.7R2.5 is vulnerable

Full CISA alert: https://thehackernews.com/2025/03/resurge-malware-exploits-ivanti-flaw.html
Forwarded from cKure
■■■□□ Chrome Zero-Day Flaw Also Affects Firefox.

The finding is surprising since Firefox uses a different browser engine. But it looks like the flaw relates more to how browsers communicate with the Windows OS.

https://me.pcmag.com/en/browsers/29074/chrome-zero-day-flaw-also-affects-firefox
Forwarded from cKure
■■■■□ HackCat V3 | A cheap Flipper Zero at half the price.

​The HackCat V3 is a comprehensive, multi-functional penetration testing device that integrates a wide array of wireless security tools into.

https://www.hackster.io/hacker_nowful/hackcat-v3-india-s-first-multi-pentesting-device-a1a3bc
How Roaming Agreements Enable 5G MitM Attacks | media.ccc.de

End-users in cellular networks are at risk of connecting to fake base stations, and we show that mitigations pushed in 5G are insufficient.

Machine-in-the-Middle (MitM) attackers aim to overhear and manipulate network traffic. The MitM position can also be used as an entry point for baseband exploitation. Proceeding from there, attackers can gain full control of a user’s phone. Standardization bodies pushed many mitigations against MitM into the specification of cellular networks. However, roaming agreements still enable powerful attackers to perform seamless attacks – even in 5G!

In this talk, you’ll learn about the complex nature of cellular roaming and how roaming is implemented in recent smartphones. The specification puts a lot of trust in network operators. This impedes security in real-world deployments. We show that the capabilities of network operators exceed the intended capabilities of lawful interception. If those are abused, end-users have no possibility of noticing the attacks.

Attacks on roaming are challenging to prevent or even detect in practice. The specification needs a major update to make cellular roaming secure. Users at risk should be aware of the current state of the system. We discuss multiple mitigations, including solutions for end-user devices.

Licensed to the public under http://creativecommons.org/licenses/by/4.0

#Cellular #5g #Roaming