cKure Red
2.35K subscribers
70 photos
32 videos
21 files
447 links
The director's cut on critical feeds from InfoSec world ๐ŸŒŽ

Main Channel: @cKure

โ˜•๏ธ or queries email us
๐Ÿ“จ i@ckure.org
Download Telegram
๐Ÿ–ผThe One-Man APT, Part I: A Picture That Can Execute Code on the Target.

https://hackers-arise.com/the-one-man-apt-part-i-a-picture-that-can-execute-code-on-the-target/
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿคฎ1
cKure Red pinned ยซ๐Ÿ–ผThe One-Man APT, Part I: A Picture That Can Execute Code on the Target. https://hackers-arise.com/the-one-man-apt-part-i-a-picture-that-can-execute-code-on-the-target/ยป
Google ๐Ÿ” Engineer dropped a book. A comprehensive guide to building agentic AI systems.

Key points:


Concepts: Prompt chaining, routing, memory, planning, safety, and evaluation.

โœ…Patterns: Design methods for multi-agent setups, tool-using agents, and autonomous workflows.

โœ…Hands-on: Code samples for implementing these patterns in real-world apps.

โœ…Goal: Help developers build reliable, scalable, and safe intelligent agents.

Think of it as a playbook for advanced AI agent design.


๐Ÿ“ฑhttps://docs.google.com/document/d/1rsaK53T3Lg5KoGwvf8ukOUvbELRtH-V0LnOIFDxBryE/mobilebasic
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ5
๐Ÿค– CVE-2025-48539: Android bluetooth stack access over adjacent WiFi with no user interaction. With chains privilege escalation, the attacker can do full device access remotely.

https://osv.dev/vulnerability/ASB-A-406785684
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ21
๐Ÿ“ฑ Critical zero-click vulnerability (CVE-2025-55177) within WhatsApp has been leveraged in targeted spyware operations, in conjunction with an Apple Imagel0 flaw (CVE-2025-43300).

This combination enabled malicious actors to disseminate exploits via WhatsApp, resulting in potential data exfiltration from the user's Apple device.
The attack sequence involved:
๐ŸšซAttacker-controlled delivery
๐ŸšซMalicious DNG/remote image (Imagel0) parsing vulnerability (OOB write)
โžฟ Remote code execution
All occurring without user engagement.

https://techcrunch.com/2025/08/29/whatsapp-fixes-zero-click-bug-used-to-hack-apple-users-with-spyware/

https://blog.quarkslab.com/patch-analysis-of-Apple-iOS-CVE-2025-43300.html
Please open Telegram to view this post
VIEW IN TELEGRAM
โค2๐Ÿ”ฅ22โšก1
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains.

EtherHiding, a novel technique where the attackers embed malicious payloads (like JADESNOW and INVISIBLEFERRET malware) within smart contracts on public blockchains (like BNB Smart Chain and Ethereum).

https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding/
๐Ÿ”ฅ5โœ11
This media is not supported in your browser
VIEW IN TELEGRAM
โ– โ– โ– โ– โ–ก Illegal cell tower location tracking en-masse as FARA disclosure of yet another Jew act emerges.

Credits: Ian Caroll
๐Ÿค”1๐Ÿ˜ฑ1๐Ÿ˜1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ”ดCybercrime-as-a-Service Takedown

Major coordinated operation leads to the arrest of 7 suspects behind a large-scale SMS spoofing and SIM-boxing network.

Operation highlights:

๐Ÿ” 26 searches conducted

๐Ÿ‘ฅ 5 main operators apprehended

๐Ÿ“ฆ 1,200 SIM-boxes running 40,000 SIM cards seized

๐Ÿ’ณ Hundreds of thousands of additional SIM cards confiscated

๐ŸŒ 5 servers hosting the illegal service dismantled

๐Ÿ’ป 2 domains โ€” gogetsms.com & apisim.com โ€” seized and replaced with law enforcement splash pages

๐Ÿ’ถ โ‚ฌ431,000 frozen in bank accounts

๐Ÿ’ฐ $333,000 in crypto seized

๐Ÿš— 4 luxury cars confiscated


๐Ÿ’ก Credits: @smspoolnet (๐•)
๐Ÿ”— More: https://x.com/DarkWebInformer/status/1978603403354792430

#CyberSecurity #Takedown #OSINT #CyberCrime #LEA
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘2โค1๐Ÿ”ฅ1๐Ÿคฃ1
Media is too big
VIEW IN TELEGRAM
๐ŸŽž Surveillance company expo gets video taped by journalists.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ2๐Ÿ˜ฑ1