Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
579 videos
530 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from The Hacker News
🔥 2025’s biggest cyber threat? The accounts you forgot existed.

Machine IDs now outnumber humans 45:1 — and they’re 7.5x more dangerous.

Leaked secrets, orphaned privileges, siloed teams.
Attackers see the full map. Do you?

👉 How to close identity gaps before it’s too late: https://thehackernews.com/expert-insights/2025/06/identity-first-security-multilayered.html
Forwarded from The Hacker News
Iran-linked hackers are spying on Kurdish & Iraqi officials using custom malware.

The group BladedFeline breached:
• KRG diplomats
• Iraq gov networks
• Uzbekistan telecom

Backdoors used: Whisper, Spearal, Shahmaran, Slippery Snakelet.

🕵️‍♂️ Full story → https://thehackernews.com/2025/06/iran-linked-bladedfeline-hits-iraqi-and.html
Forwarded from The Hacker News
🚨“Bitter” hacking group targets governments and diplomats worldwide using advanced malware and spear-phishing.

Recent attacks spread from South Asia to Turkey. Active during business hours.

Learn more → https://thehackernews.com/2025/06/bitter-hacker-group-expands-cyber.html
Forwarded from The Hacker News
⚠️ Ukraine hit by PathWiper malware wiping critical data via hacked admin tools. Linked to Russia-based APT groups.

🚨 Meanwhile, Silent Werewolf launches stealth attacks on Russian & Moldovan sectors using advanced loaders.

Stay informed—learn here: https://thehackernews.com/2025/06/new-pathwiper-data-wiper-malware.html
Forwarded from The Hacker News
🚨 Enterprise security is under siege!

30% of attacks target web assets, 21% hit APIs & IoT devices.

⚠️ Too many alerts
⚠️ Scattered tests
⚠️ Limited visibility = High risk

🔍 AI-powered full-path attack simulation + centralized control = real defense.

Learn what it means → https://thehackernews.com/expert-insights/2025/06/solving-enterprise-security-challenge.html
Forwarded from The Hacker News
🚨Alert: Positive Technologies has confirmed the deadly CVE-2025-49113 exploit—authenticated users can run arbitrary commands through PHP object deserialization.

Read: https://thehackernews.com/2025/06/critical-10-year-old-roundcube-webmail.html

Action: Update Roundcube immediately to the latest version.
Forwarded from The Hacker News
Think like an attacker to defend better.

AEV continuously simulates cyber-attacks to show how hackers exploit your system.

It helps teams prioritize fixes—credentials, misconfigs, etc.—beyond patching.

Stay ahead by understanding attackers, not just checking boxes: https://thehackernews.com/2025/06/inside-mind-of-adversary-why-more.html
Forwarded from The Hacker News
🚨 Tech support scam busted: 4 arrested in India, 2 fake call centers taken down targeting Japanese victims via AI-powered tricks.

66,000+ malicious domains removed since 2024 through global CBI-Microsoft-Japan effort.

Cybercrime is evolving—global teamwork is the key.

Learn more: https://thehackernews.com/2025/06/microsoft-helps-cbi-dismantle-indian.html
Forwarded from Winaero
Why we still use QWERTY: the history of the most inefficient keyboard layout

Despite being designed for 19th-century typewriters, QWERTY remains the dominant keyboard layout—even though more efficient alternatives like Dvorak and Colemak exist. Here’s why change is so hard:

QWERTY was created to prevent mechanical typewriter jams, not for speed or ergonomics. But it became standard due to early adoption—retraining billions of users is costly. These days, it remains deeply integrated in education, software, and hardware (BIOS, shortcuts, cloud services).

The Failed Alternatives: Dvorak & Colemak

* Dvorak (1936): Reduces finger movement by ~90%, but adoption stalled due to QWERTY’s dominance.
* Colemak (2006): A gentler upgrade, keeping common shortcuts—yet still niche.

Switching to any of them takes months of training, and QWERTY muscle memory fades, making shared computers a hassle.

While voice input and brain-computer interfaces show promise, they remain impractical for daily use due to noise sensitivity, privacy concerns, and technical limitations. Programmers, writers, and professionals still rely on keyboards because voice and neural tech can’t match typing precision. Even "smart" keyboards with LCD keys remain niche due to cost and compatibility issues. For now, QWERTY persists—not because it’s ideal, but because the alternatives aren’t ready to replace it.

So, QWERTY persists not because it’s best, but because the cost of change—time, training, and compatibility—is too high for most. For now, evolution, not revolution, is the likely path forward.
Forwarded from cKure Red
🤩Google Chrome’s unique handling of referrer-policy creates a major loophole for silent data siphoning.

CVE-2025-4664 proves that even trusted browsers are not immune to catastrophic zero-day vulnerabilities.

Cross-origin data is up for grabs if you haven't updated Chrome or Chromium.


https://wazuh.com/blog/detecting-chrome-cve-2025-4664-vulnerability-with-wazuh/

https://www.techradar.com/pro/security/billions-of-chrome-users-at-risk-from-new-data-stealing-browser-vulnerability-how-to-stay-safe
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from cKure Red
🟥 Facebook app and other Meta apps are malware that bypass security audits to leak user data to meta servers.

The covert method Meta uses to track mobile browsing without consent — even in incognito mode or with a VPN on all androis devices.

Patch immediately: Reset the phone and make sure not to install any app by Meta.


https://english.elpais.com/technology/2025-06-03/the-covert-method-meta-uses-to-track-mobile-browsing-without-consent-even-in-incognito-mode-or-with-a-vpn.html
Please open Telegram to view this post
VIEW IN TELEGRAM
📱Android 16's best multitasking upgrade — its 90:10 split ratio — is very similar to OPPO's Boundless View/OnePlus' Open Canvas system

However, OPPO told us Google developed this feature independently.

More details👇

đź”— https://www.androidauthority.com/oppo-android-16-best-feature-3564899/
Media is too big
VIEW IN TELEGRAM
🤖The TBOT Show Episode #2

AI is creeping into everything—our phones, social feeds, and now even our government. But does organic intelligence stand a chance?

⏱️ In just 20ish mins:
– Google’s new AI filmmaking tool
– Apple’s creepy photo scan feature
– Palantir’s billion-dollar gov contracts
– Amazon’s humanoid delivery robots
– A self-hosted AI you can run privately

Each story comes with real solutions + a tech solution to try.

Spread the word and share with your crew!

đź”— Watch full episode now: https://above.sh/35Ea4z

Follow the show:

Takebackourtech.org
Tbot.substack.com
The Next Gen Xiaomi Xring O2 won't be fabricated based on TSMC 2nm in 2026.

It is due to the fact that US bans the Supply of EDA tools for designing GAAFET Structural Architecture needed to be fabricated on TSMC's 2nm Node Process.

Hence, Xring O2 will still be a TSMC N3E SoC.



As it is banned, Future Xiaomi Xring SoCs should be stuck at TSMC 2nd Gen 3nm (N3E) for a long time. As it is expected, Xring SoCs won't go on par with Qualcomm, Apple & MediaTek anymore it's just there first & last time being on par with them with the Xring O1.