Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
584 videos
548 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from The Hacker News
⚠️ A new wave of attacks is hitting Brazilian Windows users with the Coyote Banking Trojan.

This malware targets over 1,000 financial sites and can steal your credentials, log your keystrokes, and even capture screenshots.

👉 Learn how Coyote works: https://thehackernews.com/2025/02/coyote-malware-expands-reach-now.html
Forwarded from The Hacker News
🚨 Attack surfaces are growing faster than your security team can keep up. Attackers are always looking for new weak spots—often hidden until it’s too late.

Learn how Attack Surface Management (ASM) tools like Intruder give you visibility into your risks: https://thehackernews.com/2025/02/what-is-attack-surface-management.html
Forwarded from The Hacker News
🔒 PyPI Introduces Archiving for Projects!

PyPI now lets developers archive projects, signaling they won’t receive future updates.

This helps prevent the spread of outdated or vulnerable packages--huge win for supply chain security.

Full details: https://thehackernews.com/2025/02/pypi-introduces-archival-status-to.html
Forwarded from The Hacker News
🚨 768 vulnerabilities exploited in 2024—a shocking 20% increase from last year!

These vulnerabilities are being weaponized faster than ever, with nearly 1 in 4 exploited on the same day they were disclosed.

Read the full report: https://thehackernews.com/2025/02/768-cves-exploited-in-2024-reflecting.html
Forwarded from The Hacker News
This week’s update covers a broad range of cybersecurity news—from AI risks to law enforcement efforts against cybercrime.

It’s a must-read for everyone.

https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity.html
Forwarded from The Hacker News
Google patches 47 Android security flaws, including one actively exploited in the wild!

A critical vulnerability (CVE-2024-53104) lets attackers escalate privileges through USB Video Class driver—watch out for targeted exploitation!

This flaw, tied to the Linux kernel, can lead to memory corruption or arbitrary code execution.

Get the latest security update now: https://thehackernews.com/2025/02/google-patches-47-android-security.html
Forwarded from The Hacker News
🚨 Microsoft has issued critical patches for two major security flaws in Azure AI Face Service and Microsoft Account.

These vulnerabilities could let attackers escalate their privileges without authorization, exposing critical infrastructure.

While patched, CVE-2025-21415 had a public exploit.

Learn more: https://thehackernews.com/2025/02/microsoft-patches-critical-azure-ai.html
Forwarded from The Hacker News
🚨 A new flaw (CVE-2024-56161) in AMD SEV could allow attackers to load malicious CPU microcode on vulnerable systems.

It exploits improper signature verification, allowing attackers local admin access to tamper with microcode.

Read more: https://thehackernews.com/2025/02/amd-sev-snp-vulnerability-allows.html
Forwarded from The Hacker News
🔒 Taiwan Bans DeepSeek AI Due to National Security Risks.

Concern? Cross-border data transmission can compromise sensitive government and critical infrastructure data.

Meanwhile, in just three days, DeepSeek faced multiple waves of DDoS attacks.

Learn more: https://thehackernews.com/2025/02/taiwan-bans-deepseek-ai-over-national.html
Forwarded from The Hacker News
🚨 Cyberattacks on cloud infrastructures are evolving fast, and your current security measures may not be enough.

AI-driven workflows and massive data migrations are expanding attack surfaces. Cloud security isn’t just about detection anymore – it’s about prevention.

Read how cloud security will transform in 2025 and beyond: https://thehackernews.com/2025/02/watch-out-for-these-8-cloud-security.html
Forwarded from The Hacker News
⚠️ FERRET malware targets macOS users through job scam.

North Korean hackers pose as recruiters on LinkedIn to lure victims. A fake "software update" compromises your system, steals data, and drains your crypto wallet.

Learn more: https://thehackernews.com/2025/02/north-korean-hackers-deploy-ferret.html
Forwarded from The Hacker News
🔐 Russian cybercriminals are exploiting new 7-Zip vulnerability (CVE-2025-0411) to target Ukrainian organizations.

This flaw bypasses Windows' MotW protections, allowing remote code execution via malicious archives.

Learn more about the exploit: https://thehackernews.com/2025/02/russian-cybercrime-groups-exploiting-7.html
Forwarded from The Hacker News
Python vs. no-code for security automation - a side-by-side breakdown 🔎

Security teams sometimes debate whether to write custom Python scripts or use a no-code platform like Tines for SOAR. Both have their advantages - but how do they compare in real-world automation?

In this blog post, security researcher Conor Dunne shares:

💡 The security, maintenance, and performance trade-offs of each approach
💡 A side-by-side comparison of core automation components - HTTP requests, webhooks, scheduling, and more
💡 A real-world case study: automating a Slack news feed

Read the blog post: https://thn.news/tines-python-automation-fb
Forwarded from The Hacker News
🚨 Alert! A malicious package targeting the Go ecosystem has backdoored countless systems—giving hackers remote access.

Despite changes to the original GitHub repository, the malicious version persisted, targeting unsuspecting developers.

👉 Learn more: https://thehackernews.com/2025/02/malicious-go-package-exploits-module.html
Forwarded from The Hacker News
⚠️ A newly disclosed vulnerability in Microsoft SharePoint connector could have allowed attackers to harvest user credentials and launch attacks across Power Automate, Power Apps, and Copilot 365.

Learn more: https://thehackernews.com/2025/02/microsoft-sharepoint-connector-flaw.html
Forwarded from The Hacker News
🔴 CISA warns of critical actively exploited security flaws in popular enterprise software.

This includes high-severity vulnerabilities in Apache OFBiz, Microsoft .NET Framework, and Paessler PRTG Network Monitor.

Act before it’s too late.

Read: https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html
Forwarded from The Hacker News
⚠️ Managing Active Directory (AD) and Entra ID in hybrid environments? You might be exposing your organization to critical vulnerabilities. Here’s why:

⤷ Privilege Sprawl from mergers, mobility, and acquisitions
⤷ Standing Privileges create unmonitored opportunities for attackers to exploit
⤷ Manual systems can't keep up with the growing complexity

🔧 Automate your identity management—save time and reduce human error.

👉 Get the Full Guide: https://thehackernews.com/expert-insights/2025/02/using-roles-and-attributes-to-protect.html
Forwarded from The Hacker News
🚨 ALERT: AsyncRAT Strikes Using Dropbox & TryCloudflare

⤷ Phishing emails start the chain, leading to AsyncRAT and other malware.
⤷ Hackers are now using Dropbox URLs and TryCloudflare tunnels to hide malicious activity.
⤷ Python payloads launch a multi-stage attack, making detection nearly impossible.

Check out details: https://thehackernews.com/2025/02/asyncrat-campaign-uses-python-payloads.html
Forwarded from The Hacker News
🚨 Vulnerability Assessments Soar in 2024. 24% of organizations now conduct assessments more than 4 times a year—up from 15% in 2023!

This shift to continuous monitoring means faster responses to threats and stronger defenses.

How is your organization keeping up? 👇 Explore the full report now: https://thehackernews.com/2025/02/navigating-future-key-it-vulnerability.html
Forwarded from The Hacker News
🛑 Security Alert for Veeam Users! CVE-2025-23114 has a CVSS score of 9.0.

This new critical Man-in-the-Middle attack could allow hackers to execute arbitrary code on your servers.

Fix is Available! Check out the details here: https://thehackernews.com/2025/02/new-veeam-flaw-allows-arbitrary-code.html