Forwarded from The Hacker News
🔥 2025’s biggest cyber threat? The accounts you forgot existed.
Machine IDs now outnumber humans 45:1 — and they’re 7.5x more dangerous.
Leaked secrets, orphaned privileges, siloed teams.
Attackers see the full map. Do you?
👉 How to close identity gaps before it’s too late: https://thehackernews.com/expert-insights/2025/06/identity-first-security-multilayered.html
Machine IDs now outnumber humans 45:1 — and they’re 7.5x more dangerous.
Leaked secrets, orphaned privileges, siloed teams.
Attackers see the full map. Do you?
👉 How to close identity gaps before it’s too late: https://thehackernews.com/expert-insights/2025/06/identity-first-security-multilayered.html
Forwarded from The Hacker News
Iran-linked hackers are spying on Kurdish & Iraqi officials using custom malware.
The group BladedFeline breached:
• KRG diplomats
• Iraq gov networks
• Uzbekistan telecom
Backdoors used: Whisper, Spearal, Shahmaran, Slippery Snakelet.
🕵️‍♂️ Full story → https://thehackernews.com/2025/06/iran-linked-bladedfeline-hits-iraqi-and.html
The group BladedFeline breached:
• KRG diplomats
• Iraq gov networks
• Uzbekistan telecom
Backdoors used: Whisper, Spearal, Shahmaran, Slippery Snakelet.
🕵️‍♂️ Full story → https://thehackernews.com/2025/06/iran-linked-bladedfeline-hits-iraqi-and.html
Forwarded from The Hacker News
🚨“Bitter” hacking group targets governments and diplomats worldwide using advanced malware and spear-phishing.
Recent attacks spread from South Asia to Turkey. Active during business hours.
Learn more → https://thehackernews.com/2025/06/bitter-hacker-group-expands-cyber.html
Recent attacks spread from South Asia to Turkey. Active during business hours.
Learn more → https://thehackernews.com/2025/06/bitter-hacker-group-expands-cyber.html
Forwarded from The Hacker News
⚠️ Ukraine hit by PathWiper malware wiping critical data via hacked admin tools. Linked to Russia-based APT groups.
🚨 Meanwhile, Silent Werewolf launches stealth attacks on Russian & Moldovan sectors using advanced loaders.
Stay informed—learn here: https://thehackernews.com/2025/06/new-pathwiper-data-wiper-malware.html
🚨 Meanwhile, Silent Werewolf launches stealth attacks on Russian & Moldovan sectors using advanced loaders.
Stay informed—learn here: https://thehackernews.com/2025/06/new-pathwiper-data-wiper-malware.html
Forwarded from The Hacker News
🚨 Enterprise security is under siege!
30% of attacks target web assets, 21% hit APIs & IoT devices.
⚠️ Too many alerts
⚠️ Scattered tests
⚠️ Limited visibility = High risk
🔍 AI-powered full-path attack simulation + centralized control = real defense.
Learn what it means → https://thehackernews.com/expert-insights/2025/06/solving-enterprise-security-challenge.html
30% of attacks target web assets, 21% hit APIs & IoT devices.
⚠️ Too many alerts
⚠️ Scattered tests
⚠️ Limited visibility = High risk
🔍 AI-powered full-path attack simulation + centralized control = real defense.
Learn what it means → https://thehackernews.com/expert-insights/2025/06/solving-enterprise-security-challenge.html
Forwarded from The Hacker News
🚨Alert: Positive Technologies has confirmed the deadly CVE-2025-49113 exploit—authenticated users can run arbitrary commands through PHP object deserialization.
Read: https://thehackernews.com/2025/06/critical-10-year-old-roundcube-webmail.html
Action: Update Roundcube immediately to the latest version.
Read: https://thehackernews.com/2025/06/critical-10-year-old-roundcube-webmail.html
Action: Update Roundcube immediately to the latest version.
Forwarded from The Hacker News
Think like an attacker to defend better.
AEV continuously simulates cyber-attacks to show how hackers exploit your system.
It helps teams prioritize fixes—credentials, misconfigs, etc.—beyond patching.
Stay ahead by understanding attackers, not just checking boxes: https://thehackernews.com/2025/06/inside-mind-of-adversary-why-more.html
AEV continuously simulates cyber-attacks to show how hackers exploit your system.
It helps teams prioritize fixes—credentials, misconfigs, etc.—beyond patching.
Stay ahead by understanding attackers, not just checking boxes: https://thehackernews.com/2025/06/inside-mind-of-adversary-why-more.html
Forwarded from The Hacker News
🚨 Tech support scam busted: 4 arrested in India, 2 fake call centers taken down targeting Japanese victims via AI-powered tricks.
66,000+ malicious domains removed since 2024 through global CBI-Microsoft-Japan effort.
Cybercrime is evolving—global teamwork is the key.
Learn more: https://thehackernews.com/2025/06/microsoft-helps-cbi-dismantle-indian.html
66,000+ malicious domains removed since 2024 through global CBI-Microsoft-Japan effort.
Cybercrime is evolving—global teamwork is the key.
Learn more: https://thehackernews.com/2025/06/microsoft-helps-cbi-dismantle-indian.html
Forwarded from Winaero
Why we still use QWERTY: the history of the most inefficient keyboard layout
Despite being designed for 19th-century typewriters, QWERTY remains the dominant keyboard layout—even though more efficient alternatives like Dvorak and Colemak exist. Here’s why change is so hard:
QWERTY was created to prevent mechanical typewriter jams, not for speed or ergonomics. But it became standard due to early adoption—retraining billions of users is costly. These days, it remains deeply integrated in education, software, and hardware (BIOS, shortcuts, cloud services).
The Failed Alternatives: Dvorak & Colemak
* Dvorak (1936): Reduces finger movement by ~90%, but adoption stalled due to QWERTY’s dominance.
* Colemak (2006): A gentler upgrade, keeping common shortcuts—yet still niche.
Switching to any of them takes months of training, and QWERTY muscle memory fades, making shared computers a hassle.
While voice input and brain-computer interfaces show promise, they remain impractical for daily use due to noise sensitivity, privacy concerns, and technical limitations. Programmers, writers, and professionals still rely on keyboards because voice and neural tech can’t match typing precision. Even "smart" keyboards with LCD keys remain niche due to cost and compatibility issues. For now, QWERTY persists—not because it’s ideal, but because the alternatives aren’t ready to replace it.
So, QWERTY persists not because it’s best, but because the cost of change—time, training, and compatibility—is too high for most. For now, evolution, not revolution, is the likely path forward.
Despite being designed for 19th-century typewriters, QWERTY remains the dominant keyboard layout—even though more efficient alternatives like Dvorak and Colemak exist. Here’s why change is so hard:
QWERTY was created to prevent mechanical typewriter jams, not for speed or ergonomics. But it became standard due to early adoption—retraining billions of users is costly. These days, it remains deeply integrated in education, software, and hardware (BIOS, shortcuts, cloud services).
The Failed Alternatives: Dvorak & Colemak
* Dvorak (1936): Reduces finger movement by ~90%, but adoption stalled due to QWERTY’s dominance.
* Colemak (2006): A gentler upgrade, keeping common shortcuts—yet still niche.
Switching to any of them takes months of training, and QWERTY muscle memory fades, making shared computers a hassle.
While voice input and brain-computer interfaces show promise, they remain impractical for daily use due to noise sensitivity, privacy concerns, and technical limitations. Programmers, writers, and professionals still rely on keyboards because voice and neural tech can’t match typing precision. Even "smart" keyboards with LCD keys remain niche due to cost and compatibility issues. For now, QWERTY persists—not because it’s ideal, but because the alternatives aren’t ready to replace it.
So, QWERTY persists not because it’s best, but because the cost of change—time, training, and compatibility—is too high for most. For now, evolution, not revolution, is the likely path forward.
Winaero
Why We Still Use QWERTY: The History of the Most Inefficient Keyboard Layout
Why do we still type on QWERTY in the 21st century, even though this layout was born in the era of mechanical typewriters and is not considered the most
Forwarded from cKure Red
CVE-2025-4664 proves that even trusted browsers are not immune to catastrophic zero-day vulnerabilities.
Cross-origin data is up for grabs if you haven't updated Chrome or Chromium.
https://wazuh.com/blog/detecting-chrome-cve-2025-4664-vulnerability-with-wazuh/
https://www.techradar.com/pro/security/billions-of-chrome-users-at-risk-from-new-data-stealing-browser-vulnerability-how-to-stay-safe
Please open Telegram to view this post
VIEW IN TELEGRAM
Wazuh
Detecting Chrome CVE-2025-4664 vulnerability with Wazuh | Wazuh
Detect the Chrome CVE-2025-4664 vulnerability on Windows and Linux using Wazuh. Learn how to scan and secure your endpoints now.
Forwarded from cKure Red
The covert method Meta uses to track mobile browsing without consent — even in incognito mode or with a VPN on all androis devices.
Patch immediately: Reset the phone and make sure not to install any app by Meta.
https://english.elpais.com/technology/2025-06-03/the-covert-method-meta-uses-to-track-mobile-browsing-without-consent-even-in-incognito-mode-or-with-a-vpn.html
Please open Telegram to view this post
VIEW IN TELEGRAM
EL PAĂŤS English
The covert method Meta uses to track mobile browsing without consent — even in incognito mode or with a VPN
A group of researchers has uncovered a system that Instagram and Facebook have been using since September 2024 to collect users’ web browsing history on Android devices
Forwarded from NoGoolag
#OpenAI Is Ordered to Save Every #ChatGPT Chat — Even the Ones You Delete
https://ift.tt/p67fw2J - FOLLOW: @reclaimthenet
https://ift.tt/p67fw2J - FOLLOW: @reclaimthenet
Reclaim The Net
OpenAI Is Ordered to Save Every ChatGPT Chat — Even the Ones You Delete
Private prompts once thought ephemeral could now live forever, thanks for demands from the New York Times.
Forwarded from Mishaal's Android News Feed
📱Android 16's best multitasking upgrade — its 90:10 split ratio — is very similar to OPPO's Boundless View/OnePlus' Open Canvas system
However, OPPO told us Google developed this feature independently.
More details👇
đź”— https://www.androidauthority.com/oppo-android-16-best-feature-3564899/
However, OPPO told us Google developed this feature independently.
More details👇
đź”— https://www.androidauthority.com/oppo-android-16-best-feature-3564899/
Android Authority
Is OPPO behind Android 16's best multitasking feature? We asked and found out.
Android 16 has a great 90:10 split-screen multitasking feature, but did Google borrow this from OPPO and OnePlus? Here's what we found out.
Forwarded from Mishaal's Android News Feed
⌚️🚿Wear OS 6 could finally add a Water Lock mode on the Pixel Watch
Hopefully Google pairs this with a water ejection feature like on the Apple Watch and Galaxy Watch.
More details👇
đź”— https://www.androidauthority.com/wear-os-6-water-lock-shortcut-leak-3565051/
Hopefully Google pairs this with a water ejection feature like on the Apple Watch and Galaxy Watch.
More details👇
đź”— https://www.androidauthority.com/wear-os-6-water-lock-shortcut-leak-3565051/
Android Authority
Wear OS 6 could finally add a Water Lock mode on the Pixel Watch
Google is working on a Water Lock mode for Wear OS 6, and it could arrive on the Pixel Watch in an upcoming update. Here's what it could do.
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
🤖The TBOT Show Episode #2
AI is creeping into everything—our phones, social feeds, and now even our government. But does organic intelligence stand a chance?
⏱️ In just 20ish mins:
– Google’s new AI filmmaking tool
– Apple’s creepy photo scan feature
– Palantir’s billion-dollar gov contracts
– Amazon’s humanoid delivery robots
– A self-hosted AI you can run privately
Each story comes with real solutions + a tech solution to try.
Spread the word and share with your crew!
đź”— Watch full episode now: https://above.sh/35Ea4z
Follow the show:
Takebackourtech.org
Tbot.substack.com
AI is creeping into everything—our phones, social feeds, and now even our government. But does organic intelligence stand a chance?
⏱️ In just 20ish mins:
– Google’s new AI filmmaking tool
– Apple’s creepy photo scan feature
– Palantir’s billion-dollar gov contracts
– Amazon’s humanoid delivery robots
– A self-hosted AI you can run privately
Each story comes with real solutions + a tech solution to try.
Spread the word and share with your crew!
đź”— Watch full episode now: https://above.sh/35Ea4z
Follow the show:
Takebackourtech.org
Tbot.substack.com
The Next Gen Xiaomi Xring O2 won't be fabricated based on TSMC 2nm in 2026.
It is due to the fact that US bans the Supply of EDA tools for designing GAAFET Structural Architecture needed to be fabricated on TSMC's 2nm Node Process.
Hence, Xring O2 will still be a TSMC N3E SoC.
As it is banned, Future Xiaomi Xring SoCs should be stuck at TSMC 2nd Gen 3nm (N3E) for a long time. As it is expected, Xring SoCs won't go on par with Qualcomm, Apple & MediaTek anymore it's just there first & last time being on par with them with the Xring O1.
It is due to the fact that US bans the Supply of EDA tools for designing GAAFET Structural Architecture needed to be fabricated on TSMC's 2nm Node Process.
Hence, Xring O2 will still be a TSMC N3E SoC.
As it is banned, Future Xiaomi Xring SoCs should be stuck at TSMC 2nd Gen 3nm (N3E) for a long time. As it is expected, Xring SoCs won't go on par with Qualcomm, Apple & MediaTek anymore it's just there first & last time being on par with them with the Xring O1.