Forwarded from Gizchina.com
Google Chrome Hit by Critical Security Flaw – Update Now!
https://www.gizchina.com/2025/06/05/google-chrome-hit-by-critical-security-flaw-update-now/
https://www.gizchina.com/2025/06/05/google-chrome-hit-by-critical-security-flaw-update-now/
Forwarded from Gizchina.com
OnePlus Pad 3 Launches with Bigger Screen and Faster Performance
https://www.gizchina.com/2025/06/05/oneplus-pad-3-launches-with-bigger-screen-and-faster-performance/
https://www.gizchina.com/2025/06/05/oneplus-pad-3-launches-with-bigger-screen-and-faster-performance/
Forwarded from Gizchina.com
Windows 11 Adoption Slows Down — What’s Behind the Decline?
https://www.gizchina.com/2025/06/06/windows-11-adoption-slows-down-whats-behind-the-decline/
https://www.gizchina.com/2025/06/06/windows-11-adoption-slows-down-whats-behind-the-decline/
Forwarded from Gizchina.com
Xiaomi Smart Band 10 Marketing Leak Confirms Key Specs
https://www.gizchina.com/2025/06/06/xiaomi-smart-band-10-marketing-leak-confirms-key-specs/
https://www.gizchina.com/2025/06/06/xiaomi-smart-band-10-marketing-leak-confirms-key-specs/
Forwarded from Gizchina.com
Never Lose a Text Again: Android SMS Backup Made Simple
https://www.gizchina.com/2025/06/06/never-lose-a-text-again-android-sms-backup-made-simple/
https://www.gizchina.com/2025/06/06/never-lose-a-text-again-android-sms-backup-made-simple/
Forwarded from Gizchina.com
HOTWAV Unveils R9 Plus: A Rugged Tablet Built for Extreme Conditions and Heavy-Duty Use
https://www.gizchina.com/2025/06/06/hotwav-unveils-r9-plus-a-rugged-tablet-built/
https://www.gizchina.com/2025/06/06/hotwav-unveils-r9-plus-a-rugged-tablet-built/
Forwarded from Android Security & Malware
BrutDroid — Android Security Toolkit that automates tedious emulator setup with one command (emulator, Magisk, Frida, Burp certificates, etc.)
https://github.com/Brut-Security/BrutDroid/
https://github.com/Brut-Security/BrutDroid/
Forwarded from The Hacker News
🚨 One PASSWORD to rule them all?
A critical flaw (CVSS 9.9) in Cisco ISE cloud deployments (AWS, Azure, OCI) means static credentials are reused across systems—allowing unauthenticated attackers to access configs, data, and more.
Details → https://thehackernews.com/2025/06/critical-cisco-ise-auth-bypass-flaw.html
🔐 No fix—only factory reset.
A critical flaw (CVSS 9.9) in Cisco ISE cloud deployments (AWS, Azure, OCI) means static credentials are reused across systems—allowing unauthenticated attackers to access configs, data, and more.
Details → https://thehackernews.com/2025/06/critical-cisco-ise-auth-bypass-flaw.html
🔐 No fix—only factory reset.
Forwarded from The Hacker News
🚨 Dark web carding site BidenCash taken down by U.S. DoJ
🔹 15M+ stolen credit cards sold
🔹 $17M in criminal profits
🔹 3.3M cards leaked for free to attract buyers
🔹 117K+ users served since 2022
Seized in global sting with FBI & Europol.
Read: https://thehackernews.com/2025/06/doj-seizes-145-domains-tied-to.html
🔹 15M+ stolen credit cards sold
🔹 $17M in criminal profits
🔹 3.3M cards leaked for free to attract buyers
🔹 117K+ users served since 2022
Seized in global sting with FBI & Europol.
Read: https://thehackernews.com/2025/06/doj-seizes-145-domains-tied-to.html
Forwarded from The Hacker News
🔥 2025’s biggest cyber threat? The accounts you forgot existed.
Machine IDs now outnumber humans 45:1 — and they’re 7.5x more dangerous.
Leaked secrets, orphaned privileges, siloed teams.
Attackers see the full map. Do you?
👉 How to close identity gaps before it’s too late: https://thehackernews.com/expert-insights/2025/06/identity-first-security-multilayered.html
Machine IDs now outnumber humans 45:1 — and they’re 7.5x more dangerous.
Leaked secrets, orphaned privileges, siloed teams.
Attackers see the full map. Do you?
👉 How to close identity gaps before it’s too late: https://thehackernews.com/expert-insights/2025/06/identity-first-security-multilayered.html
Forwarded from The Hacker News
Iran-linked hackers are spying on Kurdish & Iraqi officials using custom malware.
The group BladedFeline breached:
• KRG diplomats
• Iraq gov networks
• Uzbekistan telecom
Backdoors used: Whisper, Spearal, Shahmaran, Slippery Snakelet.
🕵️♂️ Full story → https://thehackernews.com/2025/06/iran-linked-bladedfeline-hits-iraqi-and.html
The group BladedFeline breached:
• KRG diplomats
• Iraq gov networks
• Uzbekistan telecom
Backdoors used: Whisper, Spearal, Shahmaran, Slippery Snakelet.
🕵️♂️ Full story → https://thehackernews.com/2025/06/iran-linked-bladedfeline-hits-iraqi-and.html
Forwarded from The Hacker News
🚨“Bitter” hacking group targets governments and diplomats worldwide using advanced malware and spear-phishing.
Recent attacks spread from South Asia to Turkey. Active during business hours.
Learn more → https://thehackernews.com/2025/06/bitter-hacker-group-expands-cyber.html
Recent attacks spread from South Asia to Turkey. Active during business hours.
Learn more → https://thehackernews.com/2025/06/bitter-hacker-group-expands-cyber.html
Forwarded from The Hacker News
⚠️ Ukraine hit by PathWiper malware wiping critical data via hacked admin tools. Linked to Russia-based APT groups.
🚨 Meanwhile, Silent Werewolf launches stealth attacks on Russian & Moldovan sectors using advanced loaders.
Stay informed—learn here: https://thehackernews.com/2025/06/new-pathwiper-data-wiper-malware.html
🚨 Meanwhile, Silent Werewolf launches stealth attacks on Russian & Moldovan sectors using advanced loaders.
Stay informed—learn here: https://thehackernews.com/2025/06/new-pathwiper-data-wiper-malware.html
Forwarded from The Hacker News
🚨 Enterprise security is under siege!
30% of attacks target web assets, 21% hit APIs & IoT devices.
⚠️ Too many alerts
⚠️ Scattered tests
⚠️ Limited visibility = High risk
🔍 AI-powered full-path attack simulation + centralized control = real defense.
Learn what it means → https://thehackernews.com/expert-insights/2025/06/solving-enterprise-security-challenge.html
30% of attacks target web assets, 21% hit APIs & IoT devices.
⚠️ Too many alerts
⚠️ Scattered tests
⚠️ Limited visibility = High risk
🔍 AI-powered full-path attack simulation + centralized control = real defense.
Learn what it means → https://thehackernews.com/expert-insights/2025/06/solving-enterprise-security-challenge.html
Forwarded from The Hacker News
🚨Alert: Positive Technologies has confirmed the deadly CVE-2025-49113 exploit—authenticated users can run arbitrary commands through PHP object deserialization.
Read: https://thehackernews.com/2025/06/critical-10-year-old-roundcube-webmail.html
Action: Update Roundcube immediately to the latest version.
Read: https://thehackernews.com/2025/06/critical-10-year-old-roundcube-webmail.html
Action: Update Roundcube immediately to the latest version.
Forwarded from The Hacker News
Think like an attacker to defend better.
AEV continuously simulates cyber-attacks to show how hackers exploit your system.
It helps teams prioritize fixes—credentials, misconfigs, etc.—beyond patching.
Stay ahead by understanding attackers, not just checking boxes: https://thehackernews.com/2025/06/inside-mind-of-adversary-why-more.html
AEV continuously simulates cyber-attacks to show how hackers exploit your system.
It helps teams prioritize fixes—credentials, misconfigs, etc.—beyond patching.
Stay ahead by understanding attackers, not just checking boxes: https://thehackernews.com/2025/06/inside-mind-of-adversary-why-more.html
Forwarded from The Hacker News
🚨 Tech support scam busted: 4 arrested in India, 2 fake call centers taken down targeting Japanese victims via AI-powered tricks.
66,000+ malicious domains removed since 2024 through global CBI-Microsoft-Japan effort.
Cybercrime is evolving—global teamwork is the key.
Learn more: https://thehackernews.com/2025/06/microsoft-helps-cbi-dismantle-indian.html
66,000+ malicious domains removed since 2024 through global CBI-Microsoft-Japan effort.
Cybercrime is evolving—global teamwork is the key.
Learn more: https://thehackernews.com/2025/06/microsoft-helps-cbi-dismantle-indian.html
Forwarded from Winaero
Why we still use QWERTY: the history of the most inefficient keyboard layout
Despite being designed for 19th-century typewriters, QWERTY remains the dominant keyboard layout—even though more efficient alternatives like Dvorak and Colemak exist. Here’s why change is so hard:
QWERTY was created to prevent mechanical typewriter jams, not for speed or ergonomics. But it became standard due to early adoption—retraining billions of users is costly. These days, it remains deeply integrated in education, software, and hardware (BIOS, shortcuts, cloud services).
The Failed Alternatives: Dvorak & Colemak
* Dvorak (1936): Reduces finger movement by ~90%, but adoption stalled due to QWERTY’s dominance.
* Colemak (2006): A gentler upgrade, keeping common shortcuts—yet still niche.
Switching to any of them takes months of training, and QWERTY muscle memory fades, making shared computers a hassle.
While voice input and brain-computer interfaces show promise, they remain impractical for daily use due to noise sensitivity, privacy concerns, and technical limitations. Programmers, writers, and professionals still rely on keyboards because voice and neural tech can’t match typing precision. Even "smart" keyboards with LCD keys remain niche due to cost and compatibility issues. For now, QWERTY persists—not because it’s ideal, but because the alternatives aren’t ready to replace it.
So, QWERTY persists not because it’s best, but because the cost of change—time, training, and compatibility—is too high for most. For now, evolution, not revolution, is the likely path forward.
Despite being designed for 19th-century typewriters, QWERTY remains the dominant keyboard layout—even though more efficient alternatives like Dvorak and Colemak exist. Here’s why change is so hard:
QWERTY was created to prevent mechanical typewriter jams, not for speed or ergonomics. But it became standard due to early adoption—retraining billions of users is costly. These days, it remains deeply integrated in education, software, and hardware (BIOS, shortcuts, cloud services).
The Failed Alternatives: Dvorak & Colemak
* Dvorak (1936): Reduces finger movement by ~90%, but adoption stalled due to QWERTY’s dominance.
* Colemak (2006): A gentler upgrade, keeping common shortcuts—yet still niche.
Switching to any of them takes months of training, and QWERTY muscle memory fades, making shared computers a hassle.
While voice input and brain-computer interfaces show promise, they remain impractical for daily use due to noise sensitivity, privacy concerns, and technical limitations. Programmers, writers, and professionals still rely on keyboards because voice and neural tech can’t match typing precision. Even "smart" keyboards with LCD keys remain niche due to cost and compatibility issues. For now, QWERTY persists—not because it’s ideal, but because the alternatives aren’t ready to replace it.
So, QWERTY persists not because it’s best, but because the cost of change—time, training, and compatibility—is too high for most. For now, evolution, not revolution, is the likely path forward.
Winaero
Why We Still Use QWERTY: The History of the Most Inefficient Keyboard Layout
Why do we still type on QWERTY in the 21st century, even though this layout was born in the era of mechanical typewriters and is not considered the most
Forwarded from cKure Red
CVE-2025-4664 proves that even trusted browsers are not immune to catastrophic zero-day vulnerabilities.
Cross-origin data is up for grabs if you haven't updated Chrome or Chromium.
https://wazuh.com/blog/detecting-chrome-cve-2025-4664-vulnerability-with-wazuh/
https://www.techradar.com/pro/security/billions-of-chrome-users-at-risk-from-new-data-stealing-browser-vulnerability-how-to-stay-safe
Please open Telegram to view this post
VIEW IN TELEGRAM
Wazuh
Detecting Chrome CVE-2025-4664 vulnerability with Wazuh | Wazuh
Detect the Chrome CVE-2025-4664 vulnerability on Windows and Linux using Wazuh. Learn how to scan and secure your endpoints now.
Forwarded from cKure Red
The covert method Meta uses to track mobile browsing without consent — even in incognito mode or with a VPN on all androis devices.
Patch immediately: Reset the phone and make sure not to install any app by Meta.
https://english.elpais.com/technology/2025-06-03/the-covert-method-meta-uses-to-track-mobile-browsing-without-consent-even-in-incognito-mode-or-with-a-vpn.html
Please open Telegram to view this post
VIEW IN TELEGRAM
EL PAÍS English
The covert method Meta uses to track mobile browsing without consent — even in incognito mode or with a VPN
A group of researchers has uncovered a system that Instagram and Facebook have been using since September 2024 to collect users’ web browsing history on Android devices