cKure Red – Telegram
cKure Red
2.29K subscribers
69 photos
31 videos
21 files
444 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
cKure Red
🟥 Facebook app and other Meta apps are malware that bypass security audits to leak user data to meta servers. The covert method Meta uses to track mobile browsing without consent — even in incognito mode or with a VPN on all androis devices. Patch immediately:…
🙋😴😴😊Disclosure: Covert Web-to-App Tracking via Localhost on Android.

Organizations like Meta / Yandex have stopped this intrusive privacy breaching activity.


localmess.github.io
Please open Telegram to view this post
VIEW IN TELEGRAM
🖼The One-Man APT, Part I: A Picture That Can Execute Code on the Target.

https://hackers-arise.com/the-one-man-apt-part-i-a-picture-that-can-execute-code-on-the-target/
Please open Telegram to view this post
VIEW IN TELEGRAM
🤮1
cKure Red pinned «🖼The One-Man APT, Part I: A Picture That Can Execute Code on the Target. https://hackers-arise.com/the-one-man-apt-part-i-a-picture-that-can-execute-code-on-the-target/»
Google 🔍 Engineer dropped a book. A comprehensive guide to building agentic AI systems.

Key points:


Concepts: Prompt chaining, routing, memory, planning, safety, and evaluation.

Patterns: Design methods for multi-agent setups, tool-using agents, and autonomous workflows.

Hands-on: Code samples for implementing these patterns in real-world apps.

Goal: Help developers build reliable, scalable, and safe intelligent agents.

Think of it as a playbook for advanced AI agent design.


📱https://docs.google.com/document/d/1rsaK53T3Lg5KoGwvf8ukOUvbELRtH-V0LnOIFDxBryE/mobilebasic
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5
🤖 CVE-2025-48539: Android bluetooth stack access over adjacent WiFi with no user interaction. With chains privilege escalation, the attacker can do full device access remotely.

https://osv.dev/vulnerability/ASB-A-406785684
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥21
📱 Critical zero-click vulnerability (CVE-2025-55177) within WhatsApp has been leveraged in targeted spyware operations, in conjunction with an Apple Imagel0 flaw (CVE-2025-43300).

This combination enabled malicious actors to disseminate exploits via WhatsApp, resulting in potential data exfiltration from the user's Apple device.
The attack sequence involved:
🚫Attacker-controlled delivery
🚫Malicious DNG/remote image (Imagel0) parsing vulnerability (OOB write)
Remote code execution
All occurring without user engagement.

https://techcrunch.com/2025/08/29/whatsapp-fixes-zero-click-bug-used-to-hack-apple-users-with-spyware/

https://blog.quarkslab.com/patch-analysis-of-Apple-iOS-CVE-2025-43300.html
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2211
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains.

EtherHiding, a novel technique where the attackers embed malicious payloads (like JADESNOW and INVISIBLEFERRET malware) within smart contracts on public blockchains (like BNB Smart Chain and Ethereum).

https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding/
🔥511
This media is not supported in your browser
VIEW IN TELEGRAM
■■■■□ Illegal cell tower location tracking en-masse as FARA disclosure of yet another Jew act emerges.

Credits: Ian Caroll
🤔1😱1😐1
This media is not supported in your browser
VIEW IN TELEGRAM
🔴Cybercrime-as-a-Service Takedown

Major coordinated operation leads to the arrest of 7 suspects behind a large-scale SMS spoofing and SIM-boxing network.

Operation highlights:

🔍 26 searches conducted

👥 5 main operators apprehended

📦 1,200 SIM-boxes running 40,000 SIM cards seized

💳 Hundreds of thousands of additional SIM cards confiscated

🌐 5 servers hosting the illegal service dismantled

💻 2 domains — gogetsms.com & apisim.com — seized and replaced with law enforcement splash pages

💶 €431,000 frozen in bank accounts

💰 $333,000 in crypto seized

🚗 4 luxury cars confiscated


💡 Credits: @smspoolnet (𝕏)
🔗 More: https://x.com/DarkWebInformer/status/1978603403354792430

#CyberSecurity #Takedown #OSINT #CyberCrime #LEA
Please open Telegram to view this post
VIEW IN TELEGRAM
👍21🔥1🤣1
Media is too big
VIEW IN TELEGRAM
🎞 Surveillance company expo gets video taped by journalists.
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2😱1