cKure Red
Organizations like Meta / Yandex have stopped this intrusive privacy breaching activity.
localmess.github.io
Please open Telegram to view this post
VIEW IN TELEGRAM
https://hackers-arise.com/the-one-man-apt-part-i-a-picture-that-can-execute-code-on-the-target/
Please open Telegram to view this post
VIEW IN TELEGRAM
🤮1
Google 🔍 Engineer dropped a book. A comprehensive guide to building agentic AI systems.
Key points:
✅ Patterns: Design methods for multi-agent setups, tool-using agents, and autonomous workflows.
✅ Hands-on: Code samples for implementing these patterns in real-world apps.
✅ Goal: Help developers build reliable, scalable, and safe intelligent agents.
📱 https://docs.google.com/document/d/1rsaK53T3Lg5KoGwvf8ukOUvbELRtH-V0LnOIFDxBryE/mobilebasic
Key points:
Concepts: Prompt chaining, routing, memory, planning, safety, and evaluation.Think of it as a playbook for advanced AI agent design.
Please open Telegram to view this post
VIEW IN TELEGRAM
Google Docs
Agentic Design Patterns
Agentic Design Patterns 👉 🧠 ✅ I’m excited to share that my new book, "Agentic Design Patterns: A Hands-On Guide to Intelligent AI Agents," is officially out! 👉 🧠 ✅ In a field moving at lightning speed, this book focuses on the durable, fundamental patterns…
🔥5
https://osv.dev/vulnerability/ASB-A-406785684
Please open Telegram to view this post
VIEW IN TELEGRAM
osv.dev
OSV - Open Source Vulnerabilities
Comprehensive vulnerability database for your open source projects and dependencies.
🔥2 1
🔦 TOR VPN Beta - Silent release
https://play.google.com/store/apps/details?id=org.torproject.vpn
https://www.techradar.com/vpn/vpn-services/the-tor-project-quietly-launches-a-beta-android-vpn-and-looks-for-testers
https://play.google.com/store/apps/details?id=org.torproject.vpn
https://www.techradar.com/vpn/vpn-services/the-tor-project-quietly-launches-a-beta-android-vpn-and-looks-for-testers
Google Play
Tor VPN Beta - Apps on Google Play
Tor-powered VPN with per-app routing & network-level privacy
🔥1
https://cybersecuritynews.com/openssl-vulnerabilities/
Please open Telegram to view this post
VIEW IN TELEGRAM
Cyber Security News
OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely
The OpenSSL Project has released a critical security advisory, addressing three significant vulnerabilities that could allow attackers to execute remote code and potentially recover private cryptographic keys.
❤3
This combination enabled malicious actors to disseminate exploits via WhatsApp, resulting in potential data exfiltration from the user's Apple device.The attack sequence involved:
All occurring without user engagement.https://techcrunch.com/2025/08/29/whatsapp-fixes-zero-click-bug-used-to-hack-apple-users-with-spyware/
https://blog.quarkslab.com/patch-analysis-of-Apple-iOS-CVE-2025-43300.html
Please open Telegram to view this post
VIEW IN TELEGRAM
TechCrunch
WhatsApp fixes 'zero-click' bug used to hack Apple users with spyware | TechCrunch
A spyware vendor was behind a recent campaign that abused a vulnerability in WhatsApp to deliver an exploit capable of hacking into iPhones and Macs.
🔥2 2❤1⚡1
https://cybersecuritynews.com/nothing-phone-code-execution-vulnerability/
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - R0rt1z2/fenrir: Let's control MediaTek's bootchain
Let's control MediaTek's bootchain. Contribute to R0rt1z2/fenrir development by creating an account on GitHub.
👍2🔥1
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains.
https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding/
EtherHiding, a novel technique where the attackers embed malicious payloads (like JADESNOW and INVISIBLEFERRET malware) within smart contracts on public blockchains (like BNB Smart Chain and Ethereum).
https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding/
Google Cloud Blog
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains | Google Cloud Blog
North Korea threat actor UNC5342 is leveraging the EtherHiding technique in espionage and financially motivated operations.
🔥5✍1 1
Please open Telegram to view this post
VIEW IN TELEGRAM
YouTube
This Secret Tech Tracked World Leaders, a Vatican Enemy, and Maybe You
► For more, visit Mother Jones: https://www.motherjones.com/politics/2025/10/firstwap-altamides-phone-tracking-surveillance-secrets-assad-erik-prince-jared-leto-anne-wojcicki/
Operating from their base in Jakarta, where permissive export laws have allowed…
Operating from their base in Jakarta, where permissive export laws have allowed…
This media is not supported in your browser
VIEW IN TELEGRAM
■■■■□ Illegal cell tower location tracking en-masse as FARA disclosure of yet another Jew act emerges.
Credits: Ian Caroll
🤔1😱1😐1
This media is not supported in your browser
VIEW IN TELEGRAM
Major coordinated operation leads to the arrest of 7 suspects behind a large-scale SMS spoofing and SIM-boxing network.
Operation highlights:
🔍 26 searches conducted
👥 5 main operators apprehended
📦 1,200 SIM-boxes running 40,000 SIM cards seized
💳 Hundreds of thousands of additional SIM cards confiscated
🌐 5 servers hosting the illegal service dismantled
💻 2 domains — gogetsms.com & apisim.com — seized and replaced with law enforcement splash pages
💶 €431,000 frozen in bank accounts
💰 $333,000 in crypto seized
🚗 4 luxury cars confiscated
💡 Credits:@smspoolnet(𝕏)
🔗 More: https://x.com/DarkWebInformer/status/1978603403354792430
#CyberSecurity #Takedown #OSINT #CyberCrime #LEA
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2❤1🔥1🤣1
https://eclypsium.com/blog/bombshell-the-signed-backdoor-hiding-in-plain-sight-on-framework-devices/
Please open Telegram to view this post
VIEW IN TELEGRAM
Eclypsium | Supply Chain Security for the Modern Enterprise
BombShell: The Signed Backdoor Hiding in Plain Sight on Framework Devices
Eclypsium researchers have discovered UEFI shells, authorized via Secure Boot, on Framework laptops. The UEFI shells contain capabilities that allow attackers to bypass Secure Boot on roughly 200,000 affected Framework laptops and desktops.
🔥2
Pwn²Own Day 2: Hackers exploit 56 zero-days for $790,000.
https://www.bleepingcomputer.com/news/security/samsung-galaxy-s25-hacked-on-day-two-of-pwn2own-ireland-2025/
https://www.bleepingcomputer.com/news/security/samsung-galaxy-s25-hacked-on-day-two-of-pwn2own-ireland-2025/
BleepingComputer
Pwn2Own Day 2: Hackers exploit 22 zero-days for $267,500
Security researchers collected $267,500 in cash after exploiting 22 unique zero-day vulnerabilities during the second day of the Pwn2Own Ireland 2025 hacking competition.
🔥1
https://securelist.com/forumtroll-apt-hacking-team-dante-spyware/117851/
Please open Telegram to view this post
VIEW IN TELEGRAM
Securelist
Mem3nt0 mori – The Hacking Team is back!
Kaspersky researchers discovered previously unidentified commercial Dante spyware developed by Memento Labs (formerly Hacking Team) and linked it to the ForumTroll APT attacks.
🔥1
Media is too big
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2😱1
https://openai.com/index/introducing-aardvark/
Please open Telegram to view this post
VIEW IN TELEGRAM
Openai
Introducing Aardvark: OpenAI’s agentic security researcher
Now in private beta: an AI agent that thinks like a security researcher and scales to meet the demands of modern software.
❤1🤔1
Juan Sacco
https://www.exploitpack.com/blogs/news/0-day-msr-kernel-exploit-for-windows-11-25h2
Please open Telegram to view this post
VIEW IN TELEGRAM
Exploit Pack
0-Day MSR Kernel Exploit for Windows 11 25H2
New 0-day Windows Kernel Exploit, working in Windows 11 25h2 fully patched.It took me 2 weeks of endless coffee cups! MSRs control where the CPU jumps for privileged transitions, they are a sensitive part of system state. Operating systems carefully them…
👍1🔥1👏1