Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ #Galaxy S21 Series Receives December 2024 Security #Update
https://undercodenews.com/galaxy-s21-series-receives-december-2024-security-update/
@Undercode_News
https://undercodenews.com/galaxy-s21-series-receives-december-2024-security-update/
@Undercode_News
UNDERCODE NEWS
Galaxy S21 Series Receives December 2024 Security Update - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ HDMI 22: A New Connectivity
https://undercodenews.com/hdmi-22-a-new-connectivity/
@Undercode_News
https://undercodenews.com/hdmi-22-a-new-connectivity/
@Undercode_News
UNDERCODE NEWS
HDMI 22: A New Connectivity - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆFree Certificated Courses:
Cisco is Offering FREE Cyber Security Courses + official Badges!
Start Your Cybersecurity Career with these in demand courses!
โญ1. Introduction to Cybersecurity
- Course Duration: 6 HOURS
- Level: BEGINNER
- Lab: 7 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eh5MTBwT
โญ2. Cyber Threat Management
- Course Duration: 16 HOURS
- Level: INTERMEDIATE
- Lab: 16 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ehwb_Hsh
โญ3. Endpoint Security
- Course Duration: 27 HOURS
- Level: Intermediate
- Labs: 31 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eV2UB7xy
โญ4. Network Defense
- Course Duration: 27 HOURS
- Level: INTERMEDIATE
- Lab: 29 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ekTpuvyn
Ref: Mohamed Ali Mohamed
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Cisco is Offering FREE Cyber Security Courses + official Badges!
Start Your Cybersecurity Career with these in demand courses!
โญ1. Introduction to Cybersecurity
- Course Duration: 6 HOURS
- Level: BEGINNER
- Lab: 7 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eh5MTBwT
โญ2. Cyber Threat Management
- Course Duration: 16 HOURS
- Level: INTERMEDIATE
- Lab: 16 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ehwb_Hsh
โญ3. Endpoint Security
- Course Duration: 27 HOURS
- Level: Intermediate
- Labs: 31 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/eV2UB7xy
โญ4. Network Defense
- Course Duration: 27 HOURS
- Level: INTERMEDIATE
- Lab: 29 LABS
- Delivery Type: SELF-PACED
Course Link: https://lnkd.in/ekTpuvyn
Ref: Mohamed Ali Mohamed
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ง #Android 15 Privacy Boost: Some Notifications Won't Mirror to #Windows
https://undercodenews.com/android-15-privacy-boost-some-notifications-wont-mirror-to-windows/
@Undercode_News
https://undercodenews.com/android-15-privacy-boost-some-notifications-wont-mirror-to-windows/
@Undercode_News
UNDERCODE NEWS
Android 15 Privacy Boost: Some Notifications Won't Mirror to Windows - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
A Controversial Call: Narayana Murthy Advocates for a 70-Hour Workweek
https://undercodenews.com/a-controversial-call-narayana-murthy-advocates-for-a-70-hour-workweek/
@Undercode_News
https://undercodenews.com/a-controversial-call-narayana-murthy-advocates-for-a-70-hour-workweek/
@Undercode_News
UNDERCODE NEWS
A Controversial Call: Narayana Murthy Advocates for a 70-Hour Workweek - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ the Power of CPUs for Agentic #AI: Benchmarking on GCP's 5th Gen Xeon
https://undercodenews.com/the-power-of-cpus-for-agentic-ai-benchmarking-on-gcps-5th-gen-xeon/
@Undercode_News
https://undercodenews.com/the-power-of-cpus-for-agentic-ai-benchmarking-on-gcps-5th-gen-xeon/
@Undercode_News
UNDERCODE NEWS
the Power of CPUs for Agentic AI: Benchmarking on GCP's 5th Gen Xeon - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆFree ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐ ๐ฎ๐ป๐ฎ๐ด๐ฒ๐บ๐ฒ๐ป๐, ๐ฆ๐ฐ๐ฎ๐ป๐ป๐ถ๐ป๐ด ๐ง๐ผ๐ผ๐น๐ ๐ฎ๐ป๐ฑ ๐ง๐ฟ๐ฎ๐ถ๐ป๐ถ๐ป๐ด๐ ๐ฎ๐ฌ๐ฎ๐ฐ ๐ต๏ธ Vulnerability management is important in cybersecurity as it helps reduce risk, maintain compliance, protect assets, enable proactive defense, manage reputation, and achieve cost savings. Here's a curated list of resources I prepared to help you delve deeper into this topic.
โ ๐ญ. Vulnerability management: https://lnkd.in/e_GaRhWZ
Checklist:
ใ https:://DailyCVE.com (AI powered Checker & Analysis)โ
https://lnkd.in/eyM7VJEs โญ VM 101 by CrowdStrike: https://lnkd.in/e_HY3Z_J
Vulnerability Assessment 101: https://lnkd.in/eRkz-hMe
Vulnerability Scanning Tools: https://lnkd.in/gbKnkgdt
OWASP Vulnerability Management Guide: https: //lnkd.in/ebEB4HHa
SANS VM Resources: https://lnkd.in/ePGveFcd
โ ๐ฎ. ๐๐ฟ๐ฒ๐ฒ๐ป๐ฏ๐ผ๐ป๐ฒ ๐ข๐ฝ๐ฒ๐ป๐ฉ๐๐ฆ Download Link: https://www.openvas.org/
Installation Guide: https://lnkd.in/eFB78JTQ
โ ๐ฏ. ๐ง๐ฒ๐ป๐ฎ๐ฏ๐น๐ฒ ๐ก๐ฒ๐๐๐๐ ๐๐๐๐ฒ๐ป๐๐ถ๐ฎ๐น๐ Download Link: https://lnkd.in/gzNsE_kW
Tenable University: https://lnkd.in/dt9t4iVs
Training: https://lnkd.in/gQEUxFeu
โ ๐ฐ. ๐ค๐๐ฎ๐น๐๐ Link: https://lnkd.in/ezytw_UB
Training: https://lnkd.in/gvNKJnni
VM for Dummies eBook : https://lnkd.in/e2ed9XxS
โ ๐ฑ. ๐ฅ๐ฎ๐ฝ๐ถ๐ฑ ๐ณ ๐๐ป๐๐ถ๐ด๐ต๐๐ฉ๐ Vulnerability Management Process : https://lnkd.in/eCe5RHtR โญ Nexpose Link: https://lnkd.in/gdARCttE
InsightVM Link: https://lnkd.in/gCtiQgyA
Training: https://lnkd.in/g3Q5i6fT
โ ๐ฒ. ๐๐ด๐ฒ๐ป๐๐น๐ฒ๐๐ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐ฆ๐ฐ๐ฎ๐ป๐ป๐ฒ๐ฟ ๐ณ๐ผ๐ฟ ๐๐ถ๐ป๐๐ /๐๐ฟ๐ฒ๐ฒ๐๐ฆ๐: https://vuls.io/
โ ๐ณ. ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐๐ฎ๐๐ฎ๐ฏ๐ฎ๐๐ฒ / ๐๐ฎ๐๐ฎ ๐๐ผ๐๐ฟ๐ฐ๐ฒ National Vulnerability Database: https://nvd.nist.gov/
Full Listing: https://lnkd.in/gSNNgY9W
Top-50-vendors: https://lnkd.in/eTqY7bxG
CVE Details: https://lnkd.in/gXm_2Z5h
CVE Report: https://cve.report/
Miter CVE: https://cve.mitre.org/
Miter CWE: https://cwe.mitre.org/
Exploit Prediction Scoring System (EPSS): https://lnkd.in/e3EndP-3
Vulnerability search: https://vulners.com/
Vulnerability database: https://vuldb.com/
Known Exploited Vulnerabilities:https://lnkd.in/gHAFJEtS
Cyberscan : https://lnkd.in/eRS6W_w3
โ ๐ด. ๐๐ฉ๐ฆ๐ฆ ๐๐ฎ๐น๐ฐ๐๐น๐ฎ๐๐ผ๐ฟ V3 Link: https://lnkd.in/gNqYyqKx
V4 Link: https://lnkd.in/eRd_ggVT
โ ๐ต. ๐๐๐ด ๐๐ผ๐๐ป๐๐ ๐ฃ๐ฟ๐ผ๐ด๐ฟ๐ฎ๐บ๐: find vulnerability and get paid - https://lnkd.in/esUdfjD9
Mozilla Observatory: https://lnkd.in/e7AbJDEh
The Mozilla Observatory has helped over 240,000 websites by teaching developers, system administrators, and security professionals how to configure their sites safely and securely. Source: https://lnkd.in/emMQ- Zhm
Ref: Mohamad Hamadi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ ๐ญ. Vulnerability management: https://lnkd.in/e_GaRhWZ
Checklist:
ใ https:://DailyCVE.com (AI powered Checker & Analysis)โ
https://lnkd.in/eyM7VJEs โญ VM 101 by CrowdStrike: https://lnkd.in/e_HY3Z_J
Vulnerability Assessment 101: https://lnkd.in/eRkz-hMe
Vulnerability Scanning Tools: https://lnkd.in/gbKnkgdt
OWASP Vulnerability Management Guide: https: //lnkd.in/ebEB4HHa
SANS VM Resources: https://lnkd.in/ePGveFcd
โ ๐ฎ. ๐๐ฟ๐ฒ๐ฒ๐ป๐ฏ๐ผ๐ป๐ฒ ๐ข๐ฝ๐ฒ๐ป๐ฉ๐๐ฆ Download Link: https://www.openvas.org/
Installation Guide: https://lnkd.in/eFB78JTQ
โ ๐ฏ. ๐ง๐ฒ๐ป๐ฎ๐ฏ๐น๐ฒ ๐ก๐ฒ๐๐๐๐ ๐๐๐๐ฒ๐ป๐๐ถ๐ฎ๐น๐ Download Link: https://lnkd.in/gzNsE_kW
Tenable University: https://lnkd.in/dt9t4iVs
Training: https://lnkd.in/gQEUxFeu
โ ๐ฐ. ๐ค๐๐ฎ๐น๐๐ Link: https://lnkd.in/ezytw_UB
Training: https://lnkd.in/gvNKJnni
VM for Dummies eBook : https://lnkd.in/e2ed9XxS
โ ๐ฑ. ๐ฅ๐ฎ๐ฝ๐ถ๐ฑ ๐ณ ๐๐ป๐๐ถ๐ด๐ต๐๐ฉ๐ Vulnerability Management Process : https://lnkd.in/eCe5RHtR โญ Nexpose Link: https://lnkd.in/gdARCttE
InsightVM Link: https://lnkd.in/gCtiQgyA
Training: https://lnkd.in/g3Q5i6fT
โ ๐ฒ. ๐๐ด๐ฒ๐ป๐๐น๐ฒ๐๐ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐ฆ๐ฐ๐ฎ๐ป๐ป๐ฒ๐ฟ ๐ณ๐ผ๐ฟ ๐๐ถ๐ป๐๐ /๐๐ฟ๐ฒ๐ฒ๐๐ฆ๐: https://vuls.io/
โ ๐ณ. ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐๐ฎ๐๐ฎ๐ฏ๐ฎ๐๐ฒ / ๐๐ฎ๐๐ฎ ๐๐ผ๐๐ฟ๐ฐ๐ฒ National Vulnerability Database: https://nvd.nist.gov/
Full Listing: https://lnkd.in/gSNNgY9W
Top-50-vendors: https://lnkd.in/eTqY7bxG
CVE Details: https://lnkd.in/gXm_2Z5h
CVE Report: https://cve.report/
Miter CVE: https://cve.mitre.org/
Miter CWE: https://cwe.mitre.org/
Exploit Prediction Scoring System (EPSS): https://lnkd.in/e3EndP-3
Vulnerability search: https://vulners.com/
Vulnerability database: https://vuldb.com/
Known Exploited Vulnerabilities:https://lnkd.in/gHAFJEtS
Cyberscan : https://lnkd.in/eRS6W_w3
โ ๐ด. ๐๐ฉ๐ฆ๐ฆ ๐๐ฎ๐น๐ฐ๐๐น๐ฎ๐๐ผ๐ฟ V3 Link: https://lnkd.in/gNqYyqKx
V4 Link: https://lnkd.in/eRd_ggVT
โ ๐ต. ๐๐๐ด ๐๐ผ๐๐ป๐๐ ๐ฃ๐ฟ๐ผ๐ด๐ฟ๐ฎ๐บ๐: find vulnerability and get paid - https://lnkd.in/esUdfjD9
Mozilla Observatory: https://lnkd.in/e7AbJDEh
The Mozilla Observatory has helped over 240,000 websites by teaching developers, system administrators, and security professionals how to configure their sites safely and securely. Source: https://lnkd.in/emMQ- Zhm
Ref: Mohamad Hamadi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Free Spins and Coins for Coin Master: Your Daily Dose
https://undercodenews.com/free-spins-and-coins-for-coin-master-your-daily-dose/
@Undercode_News
https://undercodenews.com/free-spins-and-coins-for-coin-master-your-daily-dose/
@Undercode_News
UNDERCODE NEWS
Free Spins and Coins for Coin Master: Your Daily Dose - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
Media is too big
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆWindows Defender Bypass 2024 with AES-Encrypted Malicious DLL.
Hello everyone,
Since a lot of you guys enjoyed the last video, I decided to create another bypass techniqueโthis time using AES encryption for the shellcode. To make it more interesting, I incorporated the shellcode into a malicious DLL and executed it using another process.
Hereโs how it works:
I created a simple file, test.exe (the process I mentioned), which loads the malicious DLL containing the encrypted shellcode. This is achieved using the LoadLibraryA() function and the GetProcAddress() function which is essential for loading any DLL and their exported functions into a process's memory. Once loaded, the DLL decrypts and executes the shellcode.
This time malicious DLL contained raw encrypted shellcode stored on disk. The encryption prevents detection by Windows Defender. In my previous approach, the shellcode was hosted on a server, making it a staged payload. While experimenting, I also tried XOR to obfuscate the shellcode like last time. However, it was consistently detected for some reason I still donโt understand.XORing the shellcode and AES encrypting it share a similar concept though.I might be wrong on this one, forgive me if I am.
This method can be implemented in various ways. One approach is to inject the DLL into another process using its PID or using this AES method to just execute the malicious exe to run the shellcode in memory without loading the dll. This technique has been used by APTs as a means of achieving persistence on compromised systems they target.
I used multiple resources from the internet. All the code used do not belong to me. I added custom logic(like calling the exported function) and tweaked it a little bit to make it work like the way I wanted it to. I give credit to the internet.Hope you guys find this useful!
Ref: Dhanush Arvind
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Hello everyone,
Since a lot of you guys enjoyed the last video, I decided to create another bypass techniqueโthis time using AES encryption for the shellcode. To make it more interesting, I incorporated the shellcode into a malicious DLL and executed it using another process.
Hereโs how it works:
I created a simple file, test.exe (the process I mentioned), which loads the malicious DLL containing the encrypted shellcode. This is achieved using the LoadLibraryA() function and the GetProcAddress() function which is essential for loading any DLL and their exported functions into a process's memory. Once loaded, the DLL decrypts and executes the shellcode.
This time malicious DLL contained raw encrypted shellcode stored on disk. The encryption prevents detection by Windows Defender. In my previous approach, the shellcode was hosted on a server, making it a staged payload. While experimenting, I also tried XOR to obfuscate the shellcode like last time. However, it was consistently detected for some reason I still donโt understand.XORing the shellcode and AES encrypting it share a similar concept though.I might be wrong on this one, forgive me if I am.
This method can be implemented in various ways. One approach is to inject the DLL into another process using its PID or using this AES method to just execute the malicious exe to run the shellcode in memory without loading the dll. This technique has been used by APTs as a means of achieving persistence on compromised systems they target.
I used multiple resources from the internet. All the code used do not belong to me. I added custom logic(like calling the exported function) and tweaked it a little bit to make it work like the way I wanted it to. I give credit to the internet.Hope you guys find this useful!
Ref: Dhanush Arvind
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
The #Samsung Music Frame: A Stylish Smart Speaker with a Bargain
https://undercodenews.com/the-samsung-music-frame-a-stylish-smart-speaker-with-a-bargain/
@Undercode_News
https://undercodenews.com/the-samsung-music-frame-a-stylish-smart-speaker-with-a-bargain/
@Undercode_News
UNDERCODE NEWS
The Samsung Music Frame: A Stylish Smart Speaker with a Bargain - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Play #Ransomware Targets South Plains Implement
https://undercodenews.com/play-ransomware-targets-south-plains-implement/
@Undercode_News
https://undercodenews.com/play-ransomware-targets-south-plains-implement/
@Undercode_News
UNDERCODE NEWS
Play Ransomware Targets South Plains Implement - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ #Ransomware Attack Hits Joshua Grading & Excavating
https://undercodenews.com/ransomware-attack-hits-joshua-grading-excavating/
@Undercode_News
https://undercodenews.com/ransomware-attack-hits-joshua-grading-excavating/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Everest and Play #Ransomware Groups Target Healthcare and Consulting Firms
https://undercodenews.com/everest-and-play-ransomware-groups-target-healthcare-and-consulting-firms/
@Undercode_News
https://undercodenews.com/everest-and-play-ransomware-groups-target-healthcare-and-consulting-firms/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Ransomware Groups Target Dental Practices and Consulting Firms
https://undercodenews.com/ransomware-groups-target-dental-practices-and-consulting-firms/
@Undercode_News
https://undercodenews.com/ransomware-groups-target-dental-practices-and-consulting-firms/
@Undercode_News
UNDERCODE NEWS
Ransomware Groups Target Dental Practices and Consulting Firms - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Informative Israeli Tech IPOs: A Promising 2025
https://undercodenews.com/informative-israeli-tech-ipos-a-promising-2025/
@Undercode_News
https://undercodenews.com/informative-israeli-tech-ipos-a-promising-2025/
@Undercode_News
UNDERCODE NEWS
Informative Israeli Tech IPOs: A Promising 2025 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ 2nd One UI 7 Beta: A Closer Look at the Latest Features and Improvements
https://undercodenews.com/2nd-one-ui-7-beta-a-closer-look-at-the-latest-features-and-improvements/
@Undercode_News
https://undercodenews.com/2nd-one-ui-7-beta-a-closer-look-at-the-latest-features-and-improvements/
@Undercode_News
UNDERCODE NEWS
2nd One UI 7 Beta: A Closer Look at the Latest Features and Improvements - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Ransomware Group Hunters Targets Ecritel
https://undercodenews.com/ransomware-group-hunters-targets-ecritel/
@Undercode_News
https://undercodenews.com/ransomware-group-hunters-targets-ecritel/
@Undercode_News
UNDERCODE NEWS
Ransomware Group Hunters Targets Ecritel - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ต๏ธ Gamaredon Leverages #Android #Spyware to Target Former Soviet States
https://undercodenews.com/gamaredon-leverages-android-spyware-to-target-former-soviet-states/
@Undercode_News
https://undercodenews.com/gamaredon-leverages-android-spyware-to-target-former-soviet-states/
@Undercode_News
UNDERCODE NEWS
Gamaredon Leverages Android Spyware to Target Former Soviet States - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ