cKure Red
2.35K subscribers
70 photos
32 videos
21 files
447 links
The director's cut on critical feeds from InfoSec world ๐ŸŒŽ

Main Channel: @cKure

โ˜•๏ธ or queries email us
๐Ÿ“จ i@ckure.org
Download Telegram
๐Ÿ˜•๐Ÿซฃ๐Ÿ˜ฎ๐Ÿฅณ๐Ÿ™‹๐ŸฅณIsraeli equipment for hacking, signal intelligence found near Al-Kiswah (10km from Damascus).

Syrian troops (former Al-Qaeda) had found Israeli listening and spying devices there. The troops were in the process of dismantling the devices when they were killed (6 of them) by Israeli air strikes, and then Israeli forces came in 4 helicopters and stayed for 2 hours to take the equipment.

Israeli warplanes and drones prevented Syrian forces from entering the area until late on Wednesday night, after Israeli forces had left the site. A Syrian military source told Al Jazeera that dozens of Israeli troops travelled to the site in four helicopters and spent more than two hours there, though it is unclear what exactly they did.

The Israeli defence minister, Israel Katz, posted on ๐• that forces were โ€œoperating in all combat zones day and night for the security of Israelโ€, but otherwise offered no explanation.


https://www.theguardian.com/world/2025/aug/28/israeli-forces-former-air-defence-base-southern-syria-damascus
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿคจ1๐Ÿ˜จ1๐Ÿ’Š1
cKure Red
๐ŸŸฅ Facebook app and other Meta apps are malware that bypass security audits to leak user data to meta servers. The covert method Meta uses to track mobile browsing without consent โ€” even in incognito mode or with a VPN on all androis devices. Patch immediately:โ€ฆ
๐Ÿ™‹๐Ÿ˜ด๐Ÿ˜ด๐Ÿ˜ŠDisclosure: Covert Web-to-App Tracking via Localhost on Android.

Organizations like Meta / Yandex have stopped this intrusive privacy breaching activity.


localmess.github.io
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ–ผThe One-Man APT, Part I: A Picture That Can Execute Code on the Target.

https://hackers-arise.com/the-one-man-apt-part-i-a-picture-that-can-execute-code-on-the-target/
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿคฎ1
cKure Red pinned ยซ๐Ÿ–ผThe One-Man APT, Part I: A Picture That Can Execute Code on the Target. https://hackers-arise.com/the-one-man-apt-part-i-a-picture-that-can-execute-code-on-the-target/ยป
Google ๐Ÿ” Engineer dropped a book. A comprehensive guide to building agentic AI systems.

Key points:


Concepts: Prompt chaining, routing, memory, planning, safety, and evaluation.

โœ…Patterns: Design methods for multi-agent setups, tool-using agents, and autonomous workflows.

โœ…Hands-on: Code samples for implementing these patterns in real-world apps.

โœ…Goal: Help developers build reliable, scalable, and safe intelligent agents.

Think of it as a playbook for advanced AI agent design.


๐Ÿ“ฑhttps://docs.google.com/document/d/1rsaK53T3Lg5KoGwvf8ukOUvbELRtH-V0LnOIFDxBryE/mobilebasic
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ5
๐Ÿค– CVE-2025-48539: Android bluetooth stack access over adjacent WiFi with no user interaction. With chains privilege escalation, the attacker can do full device access remotely.

https://osv.dev/vulnerability/ASB-A-406785684
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ21
๐Ÿ“ฑ Critical zero-click vulnerability (CVE-2025-55177) within WhatsApp has been leveraged in targeted spyware operations, in conjunction with an Apple Imagel0 flaw (CVE-2025-43300).

This combination enabled malicious actors to disseminate exploits via WhatsApp, resulting in potential data exfiltration from the user's Apple device.
The attack sequence involved:
๐ŸšซAttacker-controlled delivery
๐ŸšซMalicious DNG/remote image (Imagel0) parsing vulnerability (OOB write)
โžฟ Remote code execution
All occurring without user engagement.

https://techcrunch.com/2025/08/29/whatsapp-fixes-zero-click-bug-used-to-hack-apple-users-with-spyware/

https://blog.quarkslab.com/patch-analysis-of-Apple-iOS-CVE-2025-43300.html
Please open Telegram to view this post
VIEW IN TELEGRAM
โค2๐Ÿ”ฅ22โšก1
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains.

EtherHiding, a novel technique where the attackers embed malicious payloads (like JADESNOW and INVISIBLEFERRET malware) within smart contracts on public blockchains (like BNB Smart Chain and Ethereum).

https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding/
๐Ÿ”ฅ5โœ11
This media is not supported in your browser
VIEW IN TELEGRAM
โ– โ– โ– โ– โ–ก Illegal cell tower location tracking en-masse as FARA disclosure of yet another Jew act emerges.

Credits: Ian Caroll
๐Ÿค”1๐Ÿ˜ฑ1๐Ÿ˜1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ”ดCybercrime-as-a-Service Takedown

Major coordinated operation leads to the arrest of 7 suspects behind a large-scale SMS spoofing and SIM-boxing network.

Operation highlights:

๐Ÿ” 26 searches conducted

๐Ÿ‘ฅ 5 main operators apprehended

๐Ÿ“ฆ 1,200 SIM-boxes running 40,000 SIM cards seized

๐Ÿ’ณ Hundreds of thousands of additional SIM cards confiscated

๐ŸŒ 5 servers hosting the illegal service dismantled

๐Ÿ’ป 2 domains โ€” gogetsms.com & apisim.com โ€” seized and replaced with law enforcement splash pages

๐Ÿ’ถ โ‚ฌ431,000 frozen in bank accounts

๐Ÿ’ฐ $333,000 in crypto seized

๐Ÿš— 4 luxury cars confiscated


๐Ÿ’ก Credits: @smspoolnet (๐•)
๐Ÿ”— More: https://x.com/DarkWebInformer/status/1978603403354792430

#CyberSecurity #Takedown #OSINT #CyberCrime #LEA
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘2โค1๐Ÿ”ฅ1๐Ÿคฃ1
Media is too big
VIEW IN TELEGRAM
๐ŸŽž Surveillance company expo gets video taped by journalists.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ2๐Ÿ˜ฑ1