Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
580 videos
538 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from The Hacker News
🔒 Progress Software has patched high-severity vulnerabilities in its LoadMaster software. These flaws could let hackers execute commands or download sensitive files.

Act now: Update to version 7.2.61.0 or higher to fix these critical flaws.

Learn more: https://thehackernews.com/2025/02/progress-software-patches-high-severity.html
Forwarded from The Hacker News
🚨 MFA is more critical than ever—but it's NOT without its challenges.

The price of implementing MFA goes beyond just subscriptions. Training, support, and help desk calls add up.

Learn how to make MFA work for your business without the sticker shock: https://thehackernews.com/2025/02/4-ways-to-keep-mfa-from-becoming-too.html
Forwarded from The Hacker News
🔬 Industry-first report examines the relationship between remediation delays and incidents, based on insights from over 150 security decision makers in large U.S. enterprises.

Some key findings:
Over 62% of incidents are directly related to backlogged risks that the security team was already fully aware of.
It takes organizations 10X longer to remediate vulnerabilities than it takes for attackers to exploit them.

Get ZEST Security's full report here: https://thn.news/cloud-risk-impact-2025
Forwarded from The Hacker News
Google confirms the new Android SafetyCore DOES NOT perform client-side scanning of your content

» Uses machine learning to flag scams, spam, and malware on your device—not in the cloud
» You control which apps can access the system
» No secret scanning of your private data

👉 Read more: https://thehackernews.com/2025/02/google-confirms-android-safetycore.html
Forwarded from The Hacker News
🚨 Critical security flaws discovered in Ivanti products could allow attackers to execute arbitrary code remotely.

The vulnerabilities (CVE-2024-38657, CVE-2025-22467, CVE-2024-10644, and CVE-2024-47908) impact Ivanti Connect Secure, Policy Secure, and Cloud Services Application.

Read the full details: https://thehackernews.com/2025/02/ivanti-patches-critical-flaws-in.html
Forwarded from The Hacker News
🚨 Microsoft has released patches for 63 flaws, including 2 actively exploited vulnerabilities.

CVE-2025-21391 allows attackers to delete crucial files, while CVE-2025-21418 enables SYSTEM privilege escalation on Windows.

🔧 Apply the latest update now. Read more: https://thehackernews.com/2025/02/microsofts-patch-tuesday-fixes-63-flaws.html
Forwarded from The Hacker News
🔒 Are your Okta passwords strong enough to stop cybercriminals? Secure Okta with robust password policies, phishing-resistant 2FA, and behavior detection rules.

Don’t wait until it’s too late—explore the essential security settings to safeguard your organization today.

🔧 Read More: https://thehackernews.com/2025/02/dont-overlook-these-6-critical-okta.html
Forwarded from The Hacker News
⚠️ Kimsuky, the North Korea-linked hacker group, is adopting a new tactic: deceiving victims into running malicious PowerShell commands.

This method tricks targets into executing harmful code that allows remote access and data theft.

Learn more: https://thehackernews.com/2025/02/north-korean-hackers-exploit-powershell.html
Forwarded from The Hacker News
Learn from the infosec lead at a bank who cut threat response time in half and saved millions of dollars in prevented incidents on a budget.

Must-read for all CISOs out there: https://thn.news/bank-security-sandbox-tg
Forwarded from The Hacker News
CISOs are becoming AI leaders – and there’s a framework to guide them.

The CLEAR framework is your roadmap!
➤ Create AI asset inventories
➤ Learn user behaviors
➤ Enforce AI policies
➤ Apply security-focused AI use cases
➤ Reuse existing frameworks (NIST, ISO)

🔗 Read more: https://thehackernews.com/2025/02/how-to-steer-ai-adoption-ciso-guide.html
Forwarded from The Hacker News
🚨 Alert - A new vulnerability (CVE-2025-23359) in NVIDIA's Container Toolkit could break container isolation and give attackers full access to your system.

If exploited, attackers could bypass isolation protections, accessing your files and even running malicious code.

🔗 Get all the details: https://thehackernews.com/2025/02/researchers-find-new-exploit-bypassing.html
Forwarded from The Hacker News
⚠️ Russian-backed hacking group Sandworm has launched BadPilot—a massive global operation targeting high-value sectors worldwide.

➥ 8 known vulnerabilities exploited
➥ Energy, telecommunications, shipping, and government entities compromised

Read the full report: https://thehackernews.com/2025/02/microsoft-uncovers-sandworm-subgroups.html
Forwarded from The Hacker News
🚨 Alert: Hackers used Windows Remote Management (WinRM) to infiltrate networks and deploy FINALDRAFT malware on a South American ministry.

FINALDRAFT targets both Windows and Linux systems, using Microsoft Graph API to hide its command-and-control in Outlook drafts.

Learn more: https://thehackernews.com/2025/02/finaldraft-malware-exploits-microsoft.html
Forwarded from The Hacker News
🔴 Palo Alto Networks has rolled out fixes for PAN-OS vulnerabilities, including a severe authentication bypass (CVE-2025-0108) flaw.

🔧 Learn more about the patches: https://thehackernews.com/2025/02/palo-alto-networks-patches.html
Forwarded from The Hacker News
⚠️ China-linked espionage group used PlugX malware and a Toshiba binary in a ransomware attack on a South Asian software company.

The attack exploited the CVE-2024-0012 vulnerability in Palo Alto Networks software.

👉 Read the full story to learn more: https://thehackernews.com/2025/02/hackers-exploited-pan-os-flaw-to-deploy.html
Forwarded from The Hacker News
🔒 Are last-minute security fixes slowing your releases? Is your team caught in a tug-of-war between speed and safety?

Our next cybersecurity webinar shows you how to:
• Bridge the gap between development and security
• Secure your code from the start
• Get actionable tips from Palo Alto Networks

Ready to learn? Register now: https://thehackernews.com/2025/02/fast-deployments-secure-code-watch-this.html
Forwarded from The Hacker News
🔥 Simplify Security & Boost Efficiency with Extensible CIAM!

An extensible CIAM solution strengthens security, improves user experience, and accelerates growth.

🔒 Reduce identity-based threats
Speed up time-to-market with seamless integrations
Ensure compliance without added complexity

Discover how CIAM transforms security and efficiency: https://thehackernews.com/expert-insights/2025/02/solving-identity-challenges-with.html
Forwarded from The Hacker News
🛑 North Korea-linked hackers are actively targeting South Korea’s government, business, and cryptocurrency sectors—using Dropbox for payload distribution and data exfiltration.

• Short-lived, dynamic cloud infrastructure to evade tracking
• OAuth token authentication to seamlessly move data
• Multi-stage PowerShell execution to remain stealthy

🔗 Read the full analysis: https://thehackernews.com/2025/02/north-korean-apt43-uses-powershell-and.html
Forwarded from The Hacker News
🚨 Enter your card details once? It “fails.” Try again? Still “fails.” Third time? You’re sent to an error page—but the attackers now have everything they need.

Cybercriminals are using bogus PDFs on Webflow CDN to steal credit card details from unsuspecting users.

🔗 Don’t fall for it—know the warning signs: https://thehackernews.com/2025/02/hackers-use-captcha-trick-on-webflow.html
Forwarded from The Hacker News
🛑 AI is everywhere—and hackers are also using AI to run large-scale social engineering, create deepfakes, and exploit app vulnerabilities faster than ever.


How can we build AI securely while leveraging it for defense?

Find out in this latest analysis: https://thehackernews.com/2025/02/ai-and-security-new-puzzle-to-figure-out.html