https://zimperium.com/blog/the-rooting-of-all-evil-security-holes-that-could-compromise-your-mobile-device
https://cybersecuritynews.com/hackers-could-gain-full-control-rooted-android-devices/
Please open Telegram to view this post
VIEW IN TELEGRAM
Zimperium
The Root(ing) Of All Evil: Security Holes That Could Compromise Your Mobile Device
true
🔥1
Key Features:
🤖 300+ AI Models: Support for OpenAI, Anthropic, DeepSeek, Ollama, and more
🔧 Built-in Security Tools: Ready-to-use tools for reconnaissance, exploitation, and privilege escalation
🏆 Battle-tested: Proven in HackTheBox CTFs, bug bounties, and real-world security case studies
🎯 Agent-based Architecture: Modular design with specialized agents for different security tasks
https://github.com/aliasrobotics/cai
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - aliasrobotics/cai: Cybersecurity AI (CAI), the framework for AI Security
Cybersecurity AI (CAI), the framework for AI Security - aliasrobotics/cai
😴1
https://github.com/google/security-research/security/advisories/GHSA-mp56-7vrw-qxvf
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
OpenAI Operator - Click on arbitrary origin by TOCTOU attack
## Summary
There is a delay between OpenAI Operator’s action prediction based on the screenshot and Operator’s actual action trigger. If timed correctly, an attacker can navigate or switch tabs be...
There is a delay between OpenAI Operator’s action prediction based on the screenshot and Operator’s actual action trigger. If timed correctly, an attacker can navigate or switch tabs be...
Syrian troops (former Al-Qaeda) had found Israeli listening and spying devices there. The troops were in the process of dismantling the devices when they were killed (6 of them) by Israeli air strikes, and then Israeli forces came in 4 helicopters and stayed for 2 hours to take the equipment.
Israeli warplanes and drones prevented Syrian forces from entering the area until late on Wednesday night, after Israeli forces had left the site. A Syrian military source told Al Jazeera that dozens of Israeli troops travelled to the site in four helicopters and spent more than two hours there, though it is unclear what exactly they did.
The Israeli defence minister, Israel Katz, posted on 𝕏 that forces were “operating in all combat zones day and night for the security of Israel”, but otherwise offered no explanation.
https://www.theguardian.com/world/2025/aug/28/israeli-forces-former-air-defence-base-southern-syria-damascus
Please open Telegram to view this post
VIEW IN TELEGRAM
🤨1😨1💊1
cKure Red
Organizations like Meta / Yandex have stopped this intrusive privacy breaching activity.
localmess.github.io
Please open Telegram to view this post
VIEW IN TELEGRAM
https://hackers-arise.com/the-one-man-apt-part-i-a-picture-that-can-execute-code-on-the-target/
Please open Telegram to view this post
VIEW IN TELEGRAM
🤮1
Google 🔍 Engineer dropped a book. A comprehensive guide to building agentic AI systems.
Key points:
✅ Patterns: Design methods for multi-agent setups, tool-using agents, and autonomous workflows.
✅ Hands-on: Code samples for implementing these patterns in real-world apps.
✅ Goal: Help developers build reliable, scalable, and safe intelligent agents.
📱 https://docs.google.com/document/d/1rsaK53T3Lg5KoGwvf8ukOUvbELRtH-V0LnOIFDxBryE/mobilebasic
Key points:
Concepts: Prompt chaining, routing, memory, planning, safety, and evaluation.Think of it as a playbook for advanced AI agent design.
Please open Telegram to view this post
VIEW IN TELEGRAM
Google Docs
Agentic Design Patterns
Agentic Design Patterns 👉 🧠 ✅ I’m excited to share that my new book, "Agentic Design Patterns: A Hands-On Guide to Intelligent AI Agents," is officially out! 👉 🧠 ✅ In a field moving at lightning speed, this book focuses on the durable, fundamental patterns…
🔥5
https://osv.dev/vulnerability/ASB-A-406785684
Please open Telegram to view this post
VIEW IN TELEGRAM
osv.dev
OSV - Open Source Vulnerabilities
Comprehensive vulnerability database for your open source projects and dependencies.
🔥2 1
🔦 TOR VPN Beta - Silent release
https://play.google.com/store/apps/details?id=org.torproject.vpn
https://www.techradar.com/vpn/vpn-services/the-tor-project-quietly-launches-a-beta-android-vpn-and-looks-for-testers
https://play.google.com/store/apps/details?id=org.torproject.vpn
https://www.techradar.com/vpn/vpn-services/the-tor-project-quietly-launches-a-beta-android-vpn-and-looks-for-testers
Google Play
Tor VPN Beta - Apps on Google Play
Tor-powered VPN with per-app routing & network-level privacy
🔥1
https://cybersecuritynews.com/openssl-vulnerabilities/
Please open Telegram to view this post
VIEW IN TELEGRAM
Cyber Security News
OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely
The OpenSSL Project has released a critical security advisory, addressing three significant vulnerabilities that could allow attackers to execute remote code and potentially recover private cryptographic keys.
❤3
This combination enabled malicious actors to disseminate exploits via WhatsApp, resulting in potential data exfiltration from the user's Apple device.The attack sequence involved:
All occurring without user engagement.https://techcrunch.com/2025/08/29/whatsapp-fixes-zero-click-bug-used-to-hack-apple-users-with-spyware/
https://blog.quarkslab.com/patch-analysis-of-Apple-iOS-CVE-2025-43300.html
Please open Telegram to view this post
VIEW IN TELEGRAM
TechCrunch
WhatsApp fixes 'zero-click' bug used to hack Apple users with spyware | TechCrunch
A spyware vendor was behind a recent campaign that abused a vulnerability in WhatsApp to deliver an exploit capable of hacking into iPhones and Macs.
🔥2 2❤1⚡1
https://cybersecuritynews.com/nothing-phone-code-execution-vulnerability/
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - R0rt1z2/fenrir: Let's control MediaTek's bootchain
Let's control MediaTek's bootchain. Contribute to R0rt1z2/fenrir development by creating an account on GitHub.
👍2🔥1
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains.
https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding/
EtherHiding, a novel technique where the attackers embed malicious payloads (like JADESNOW and INVISIBLEFERRET malware) within smart contracts on public blockchains (like BNB Smart Chain and Ethereum).
https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding/
Google Cloud Blog
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains | Google Cloud Blog
North Korea threat actor UNC5342 is leveraging the EtherHiding technique in espionage and financially motivated operations.
🔥5✍1 1
Please open Telegram to view this post
VIEW IN TELEGRAM
YouTube
This Secret Tech Tracked World Leaders, a Vatican Enemy, and Maybe You
► For more, visit Mother Jones: https://www.motherjones.com/politics/2025/10/firstwap-altamides-phone-tracking-surveillance-secrets-assad-erik-prince-jared-leto-anne-wojcicki/
Operating from their base in Jakarta, where permissive export laws have allowed…
Operating from their base in Jakarta, where permissive export laws have allowed…
This media is not supported in your browser
VIEW IN TELEGRAM
■■■■□ Illegal cell tower location tracking en-masse as FARA disclosure of yet another Jew act emerges.
Credits: Ian Caroll
🤔1😱1😐1