Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
579 videos
530 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from Gizchina.com
HOTWAV Unveils R9 Plus: A Rugged Tablet Built for Extreme Conditions and Heavy-Duty Use
https://www.gizchina.com/2025/06/06/hotwav-unveils-r9-plus-a-rugged-tablet-built/
BrutDroid — Android Security Toolkit that automates tedious emulator setup with one command (emulator, Magisk, Frida, Burp certificates, etc.)
https://github.com/Brut-Security/BrutDroid/
Forwarded from The Hacker News
🚨 One PASSWORD to rule them all?

A critical flaw (CVSS 9.9) in Cisco ISE cloud deployments (AWS, Azure, OCI) means static credentials are reused across systems—allowing unauthenticated attackers to access configs, data, and more.

Details → https://thehackernews.com/2025/06/critical-cisco-ise-auth-bypass-flaw.html

🔐 No fix—only factory reset.
Forwarded from The Hacker News
🚨 Dark web carding site BidenCash taken down by U.S. DoJ

🔹 15M+ stolen credit cards sold
🔹 $17M in criminal profits
🔹 3.3M cards leaked for free to attract buyers
🔹 117K+ users served since 2022

Seized in global sting with FBI & Europol.

Read: https://thehackernews.com/2025/06/doj-seizes-145-domains-tied-to.html
Forwarded from The Hacker News
🔥 2025’s biggest cyber threat? The accounts you forgot existed.

Machine IDs now outnumber humans 45:1 — and they’re 7.5x more dangerous.

Leaked secrets, orphaned privileges, siloed teams.
Attackers see the full map. Do you?

👉 How to close identity gaps before it’s too late: https://thehackernews.com/expert-insights/2025/06/identity-first-security-multilayered.html
Forwarded from The Hacker News
Iran-linked hackers are spying on Kurdish & Iraqi officials using custom malware.

The group BladedFeline breached:
• KRG diplomats
• Iraq gov networks
• Uzbekistan telecom

Backdoors used: Whisper, Spearal, Shahmaran, Slippery Snakelet.

🕵️‍♂️ Full story → https://thehackernews.com/2025/06/iran-linked-bladedfeline-hits-iraqi-and.html
Forwarded from The Hacker News
🚨“Bitter” hacking group targets governments and diplomats worldwide using advanced malware and spear-phishing.

Recent attacks spread from South Asia to Turkey. Active during business hours.

Learn more → https://thehackernews.com/2025/06/bitter-hacker-group-expands-cyber.html
Forwarded from The Hacker News
⚠️ Ukraine hit by PathWiper malware wiping critical data via hacked admin tools. Linked to Russia-based APT groups.

🚨 Meanwhile, Silent Werewolf launches stealth attacks on Russian & Moldovan sectors using advanced loaders.

Stay informed—learn here: https://thehackernews.com/2025/06/new-pathwiper-data-wiper-malware.html
Forwarded from The Hacker News
🚨 Enterprise security is under siege!

30% of attacks target web assets, 21% hit APIs & IoT devices.

⚠️ Too many alerts
⚠️ Scattered tests
⚠️ Limited visibility = High risk

🔍 AI-powered full-path attack simulation + centralized control = real defense.

Learn what it means → https://thehackernews.com/expert-insights/2025/06/solving-enterprise-security-challenge.html
Forwarded from The Hacker News
🚨Alert: Positive Technologies has confirmed the deadly CVE-2025-49113 exploit—authenticated users can run arbitrary commands through PHP object deserialization.

Read: https://thehackernews.com/2025/06/critical-10-year-old-roundcube-webmail.html

Action: Update Roundcube immediately to the latest version.
Forwarded from The Hacker News
Think like an attacker to defend better.

AEV continuously simulates cyber-attacks to show how hackers exploit your system.

It helps teams prioritize fixes—credentials, misconfigs, etc.—beyond patching.

Stay ahead by understanding attackers, not just checking boxes: https://thehackernews.com/2025/06/inside-mind-of-adversary-why-more.html
Forwarded from The Hacker News
🚨 Tech support scam busted: 4 arrested in India, 2 fake call centers taken down targeting Japanese victims via AI-powered tricks.

66,000+ malicious domains removed since 2024 through global CBI-Microsoft-Japan effort.

Cybercrime is evolving—global teamwork is the key.

Learn more: https://thehackernews.com/2025/06/microsoft-helps-cbi-dismantle-indian.html
Forwarded from Winaero
Why we still use QWERTY: the history of the most inefficient keyboard layout

Despite being designed for 19th-century typewriters, QWERTY remains the dominant keyboard layout—even though more efficient alternatives like Dvorak and Colemak exist. Here’s why change is so hard:

QWERTY was created to prevent mechanical typewriter jams, not for speed or ergonomics. But it became standard due to early adoption—retraining billions of users is costly. These days, it remains deeply integrated in education, software, and hardware (BIOS, shortcuts, cloud services).

The Failed Alternatives: Dvorak & Colemak

* Dvorak (1936): Reduces finger movement by ~90%, but adoption stalled due to QWERTY’s dominance.
* Colemak (2006): A gentler upgrade, keeping common shortcuts—yet still niche.

Switching to any of them takes months of training, and QWERTY muscle memory fades, making shared computers a hassle.

While voice input and brain-computer interfaces show promise, they remain impractical for daily use due to noise sensitivity, privacy concerns, and technical limitations. Programmers, writers, and professionals still rely on keyboards because voice and neural tech can’t match typing precision. Even "smart" keyboards with LCD keys remain niche due to cost and compatibility issues. For now, QWERTY persists—not because it’s ideal, but because the alternatives aren’t ready to replace it.

So, QWERTY persists not because it’s best, but because the cost of change—time, training, and compatibility—is too high for most. For now, evolution, not revolution, is the likely path forward.
Forwarded from cKure Red
🤩Google Chrome’s unique handling of referrer-policy creates a major loophole for silent data siphoning.

CVE-2025-4664 proves that even trusted browsers are not immune to catastrophic zero-day vulnerabilities.

Cross-origin data is up for grabs if you haven't updated Chrome or Chromium.


https://wazuh.com/blog/detecting-chrome-cve-2025-4664-vulnerability-with-wazuh/

https://www.techradar.com/pro/security/billions-of-chrome-users-at-risk-from-new-data-stealing-browser-vulnerability-how-to-stay-safe
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from cKure Red
🟥 Facebook app and other Meta apps are malware that bypass security audits to leak user data to meta servers.

The covert method Meta uses to track mobile browsing without consent — even in incognito mode or with a VPN on all androis devices.

Patch immediately: Reset the phone and make sure not to install any app by Meta.


https://english.elpais.com/technology/2025-06-03/the-covert-method-meta-uses-to-track-mobile-browsing-without-consent-even-in-incognito-mode-or-with-a-vpn.html
Please open Telegram to view this post
VIEW IN TELEGRAM