Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
⚡️What Are the Problems with Cell Service?
@takebackourtech
In this clip from Above’s ‘The Future of Cell Service’ webinar I talk about how no communications with traditional SIM cards are private, issues with centralized networks, cooperation with law enforcement, and how hackers can hijack your phone with SIM swapping.
Sign up FREE to watch more webinar clips here.
Purchase Above DataSIM here to protect yourself from cellular surveillance.
—
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER | XMPP
Follow 🫶 @takebackourtech
@takebackourtech
In this clip from Above’s ‘The Future of Cell Service’ webinar I talk about how no communications with traditional SIM cards are private, issues with centralized networks, cooperation with law enforcement, and how hackers can hijack your phone with SIM swapping.
Sign up FREE to watch more webinar clips here.
Purchase Above DataSIM here to protect yourself from cellular surveillance.
—
✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER | XMPP
Follow 🫶 @takebackourtech
Forwarded from The Hacker News
🚨 Cybercriminals are exploiting CVE-2024-4577, a critical PHP flaw, to gain remote access to systems in Japan.
After entry, they use tools like JuicyPotato to escalate privileges and move laterally.
This multi-step attack leads to full system control, disrupting key business operations.
Learn more: https://thehackernews.com/2025/03/php-cgi-rce-flaw-exploited-in-attacks.html
After entry, they use tools like JuicyPotato to escalate privileges and move laterally.
This multi-step attack leads to full system control, disrupting key business operations.
Learn more: https://thehackernews.com/2025/03/php-cgi-rce-flaw-exploited-in-attacks.html
Forwarded from The Hacker News
🐱💻 North Korean hackers, TraderTraitor, pulled off a $1.5 billion 💰 crypto heist targeting Safe{Wallet} and Bybit.
They bypassed MFA, hijacked AWS tokens, and used tools like Kali Linux for stealth access.
Social engineering also tricked developers into running a malicious Docker project to fuel the breach.
Learn more: https://thehackernews.com/2025/03/safewallet-confirms-north-korean.html
They bypassed MFA, hijacked AWS tokens, and used tools like Kali Linux for stealth access.
Social engineering also tricked developers into running a malicious Docker project to fuel the breach.
Learn more: https://thehackernews.com/2025/03/safewallet-confirms-north-korean.html
Forwarded from The Hacker News
The U.S. Secret Service has seized Garantex’s domain, a major blow to illicit crypto exchanges.
Sanctioned for aiding darknet transactions and laundering ransomware funds, Garantex is now at the center of a global crackdown on crypto crime.
Explore the details: https://thehackernews.com/2025/03/us-secret-service-seizes-russian.html
Sanctioned for aiding darknet transactions and laundering ransomware funds, Garantex is now at the center of a global crackdown on crypto crime.
Explore the details: https://thehackernews.com/2025/03/us-secret-service-seizes-russian.html
Forwarded from The Hacker News
⚠️ The "set-utils" package on PyPI has been downloaded 1,077 times, stealing private keys and exposing Ethereum wallets.
Developers unknowingly installed it, putting their assets at risk.
Understand the full attack here: https://thehackernews.com/2025/03/this-malicious-pypi-package-stole.html
Developers unknowingly installed it, putting their assets at risk.
Understand the full attack here: https://thehackernews.com/2025/03/this-malicious-pypi-package-stole.html
Forwarded from The Hacker News
Cybercriminals aren’t just targeting systems—they’re exploiting people.
In 2024, a deepfake tricked an employee into losing $25M, all starting with a phishing email. Our psychological biases make us vulnerable, and hackers know it.
Understanding these weaknesses is key to protecting your company: https://thehackernews.com/expert-insights/2025/03/the-psychology-of-identity-security-why.html
In 2024, a deepfake tricked an employee into losing $25M, all starting with a phishing email. Our psychological biases make us vulnerable, and hackers know it.
Understanding these weaknesses is key to protecting your company: https://thehackernews.com/expert-insights/2025/03/the-psychology-of-identity-security-why.html
Forwarded from The Hacker News
Outdated security tools leaving your apps vulnerable? You’re not alone. Many organizations struggle with scattered data.
ASPM unifies code and runtime insights to prevent threats in real-time.
Join our exclusive webinar to see how ASPM can protect your apps: https://thehackernews.com/2025/03/webinar-learn-how-aspm-transforms.html
ASPM unifies code and runtime insights to prevent threats in real-time.
Join our exclusive webinar to see how ASPM can protect your apps: https://thehackernews.com/2025/03/webinar-learn-how-aspm-transforms.html
Forwarded from The Hacker News
🛑 Over one million devices were affected by a massive malvertising campaign that stole sensitive data through illegal streaming sites.
The attack employed multi-layered redirection to platforms such as GitHub, Discord, and Dropbox. Both consumers and enterprises are vulnerable.
Read the full analysis here: https://thehackernews.com/2025/03/microsoft-warns-of-malvertising.html
The attack employed multi-layered redirection to platforms such as GitHub, Discord, and Dropbox. Both consumers and enterprises are vulnerable.
Read the full analysis here: https://thehackernews.com/2025/03/microsoft-warns-of-malvertising.html
Forwarded from The Hacker News
⚠️ The clock is ticking—March 31, 2025, is the PCI DSS v4 compliance deadline. Could an overlooked script cost you $100K/month?
Non-compliance risks web skimming and third-party attacks. For online merchants, securing payment page scripts and continuous monitoring are vital to prevent costly breaches.
Read more: https://thehackernews.com/2025/03/what-pci-dss-v4-really-means-lessons.html
Non-compliance risks web skimming and third-party attacks. For online merchants, securing payment page scripts and continuous monitoring are vital to prevent costly breaches.
Read more: https://thehackernews.com/2025/03/what-pci-dss-v4-really-means-lessons.html
Forwarded from The Hacker News
🚨 New research reveals Ragnar Loader, a powerful malware used by cybercrime groups like FIN7 and Ragnar Locker.
With advanced encryption, PowerShell payloads, and stealth injection, it hides deep within networks for long-term access.
Learn how it remains undetected: https://thehackernews.com/2025/03/fin7-fin8-and-others-use-ragnar-loader.html
With advanced encryption, PowerShell payloads, and stealth injection, it hides deep within networks for long-term access.
Learn how it remains undetected: https://thehackernews.com/2025/03/fin7-fin8-and-others-use-ragnar-loader.html
Forwarded from The Hacker News
🚨 Over 2,000 users have been hit by SilentCryptoMiner, disguised as a tool to bypass internet blocks.
Spread through YouTube and Telegram, cybercriminals are masking malware as helpful software, tricking users into downloading miners and other malicious tools.
Read the full analysis here: https://thehackernews.com/2025/03/silentcryptominer-infects-2000-russian.html
Spread through YouTube and Telegram, cybercriminals are masking malware as helpful software, tricking users into downloading miners and other malicious tools.
Read the full analysis here: https://thehackernews.com/2025/03/silentcryptominer-infects-2000-russian.html
Forwarded from The Hacker News
Join a half-day event at the House of Lords, London, where industry experts from Cloudflare, Proton, Gcore, and Red Button will discuss the latest DDoS attack trends and share practical strategies for enhancing DDoS protection.
👉Register here: https://thn.news/ddos-day-2025
👉Register here: https://thn.news/ddos-day-2025
Forwarded from The Hacker News
A new cyber campaign in the Middle East and North Africa is using modified AsyncRAT malware to target over 900 victims, including in oil, IT, and agriculture.
The attack spreads through social media ads and file-sharing platforms.
Learn how to protect your systems: https://thehackernews.com/2025/03/desert-dexter-targets-900-victims-using.html
The attack spreads through social media ads and file-sharing platforms.
Learn how to protect your systems: https://thehackernews.com/2025/03/desert-dexter-targets-900-victims-using.html
Forwarded from The Hacker News
⚠️🚨 A new browser extension attack is mimicking legit add-ons to steal sensitive data.
By manipulating icons, popups, and disabling real extensions, attackers target all Chromium-based browsers, risking personal and financial info.
Get the full details here: https://thehackernews.com/2025/03/researchers-expose-new-polymorphic.html
By manipulating icons, popups, and disabling real extensions, attackers target all Chromium-based browsers, risking personal and financial info.
Get the full details here: https://thehackernews.com/2025/03/researchers-expose-new-polymorphic.html
Forwarded from The Hacker News
🔴 Google Workspace is a top collaboration tool, but its security risks are rising. Cybercriminals are outpacing patchwork defenses, exploiting vulnerabilities.
To secure Google Workspace, businesses need a unified solution that simplifies security and closes critical gaps.
Learn more here: https://thehackernews.com/2025/03/why-modern-google-workspace-needs.html
To secure Google Workspace, businesses need a unified solution that simplifies security and closes critical gaps.
Learn more here: https://thehackernews.com/2025/03/why-modern-google-workspace-needs.html
Forwarded from MARK37.COM (Seek Truth)
I've been working on this article for months and happy to release it to you all today!
https://mark37.com/apple-privacy-illusion/
https://mark37.com/apple-privacy-illusion/
MARK37.com
The Apple Privacy Illusion: Marketing vs. Reality - MARK37.com
If you've watched any Apple marketing over the past decade, you've undoubtedly seen their carefully crafted image as the tech company that actually cares about your privacy. But this entire narrative is built on marketing sleight of hand rather than technical…
Forwarded from Bones' Tech Garage
We have a place we love to go to listen to good music and relax after a hard day or listen while you garden!
FOSS ran and operated. Powered by Linux.
www.hawkwynd.com
Using VLC, or another player capable of streaming on your computer or phone.
http://hawkwynd.com:8000/listen.pls?sid=1
To make a request join the Telegram group or at www.hawkwynd.com
https://t.me/hawkwyndRadio
FOSS ran and operated. Powered by Linux.
www.hawkwynd.com
Using VLC, or another player capable of streaming on your computer or phone.
http://hawkwynd.com:8000/listen.pls?sid=1
To make a request join the Telegram group or at www.hawkwynd.com
https://t.me/hawkwyndRadio
Forwarded from Hacker News
Krebs on Security
Feds Link $150M Cyberheist to 2022 LastPass Hacks
In September 2023, KrebsOnSecurity published findings from security researchers who concluded that a series of six-figure cyberheists across dozens of victims resulted from thieves cracking master passwords stolen from the password manager service LastPass…