Kali Linux
Kanalga Telegramโda oโtish
unofficial Channel is for sale; send us a DM if interested
Ko'proq ko'rsatish2025 yil raqamlarda

17 594
Obunachilar
-524 soatlar
+287 kunlar
+23130 kunlar
Postlar arxiv
Researchers at the Citizen Lab and Princeton evaluated the network security of Android apps & found that a large portion of popular Chinese apps use broken proprietary network protocols instead of TLS.
Read the paper here
https://www.computer.org/csdl/proceedings-article/sp/2025/223600d916/26hiVQjbZqE
@kalilinux
๐ 7โค 1๐ฅ 1๐ค 1
Repost from TgId: 1409382078
PSA: Older Tor Browsers (13.5.11) Breaking, Update Now!
The expiration, happening on March 14 2025, of a root certificate used by Mozilla for add-ons verification on Firefox 115.12 and below, can suddenly disable extensions, including the built-in NoScript, and cause functionality such as the Security Slider to break on Tor Browser versions older than 13.5.11 legacy.
We hope the vast majority of Tor Browser users are already up-to-date with the latest available version for their OS, currently 14.0.7 stable or 13.5.13 legacy, which also provide the newest security fixes.
The few who are not yet, should update immediately from the Tor Browser download page in order to prevent the aforementioned functionality breakage and other security risks.
https://telegra.ph/Older-Tor-Browsers-Breaking-Update-Now-03-13
๐ 7โค 3๐ฅ 3
Hammasini ko'rsatish...
Hammasini ko'rsatish...
๐ฅ 5๐ฑ 3๐คฃ 2
EvilLoader - Yesterday was published PoC for unpatched vulnerability affecting Telegram for Android. It works as the previous similar vulnerability, EvilVideo; in which a file with an ".htm" extension is disguised as a video and sent via the Telegram API, and while the user expects a video, the JavaScript code inside the HTML is actually executed.
https://www.mobile-hacker.com/2025/03/05/evilloader-unpatched-telegram-for-android-vulnerability-disclosed/
@kalilinux
๐ฑ 8โค 3๐ 3๐คก 2๐ 1โก 1
More than three million Google Chrome users have been issued a warning about 16 browser extensions that have been compromised by hackers.
Cybersecurity experts urged users to delete them now after finding criminals injected malicious codes into the software.
This allows hackers to steal user data and commit 'search engine fraud' - the scam of driving clicks to hacker-controlled websites for ad revenue.
The list includes Blipshot, Emojis, Color Changer for YouTube, Video Effects for YouTube and Audio Enhancer, Themes for Chrome and YouTube Picture in Picture and Mike Adblock fรผr Chrome, Super Dark Mode and Emoji Keyboard Emojis for Chrome.
Source
@kalilinux
๐ 4๐คฃ 3โค 1
Hammasini ko'rsatish...
๐ฉ 1
Privacy is a battle-ground and there needs to be people willing to fight in order to win the fight. It's a constant fight until you win.
We don't have to find the fully military-grade secured search engine of all time, just try a slightly more secure one. Let them know that you value your privacy, but don't let perfect be the enemy of the good. Beware the all-or-nothing mindset.
https://www.privacyguides.org/articles/2025/02/17/privacy-is-not-dead/
@kalilinux
๐ฏ 6โค 5๐ 3
Hammasini ko'rsatish...
๐ 9๐ฅ 3
Meta Confirms Zero-Click WhatsApp Spyware Attack Targeting 90 Journalists, Activists.
Source
@kalilinux
๐ฑ 13๐ 3
Once fully integrated, USDt will operate seamlessly on Bitcoinโs base layer and its layer 2 Lightning Network. This will enable high-speed, low-cost transactions while combining Bitcoinโs robust security and scalability. With USDtโ the worldโs largest stablecoin, serving over 350 million usersโdevelopers and users will enjoy Bitcoinโs unparalleled reliability alongside the efficiency and versatility of Lightning-enabled payments.
Source
@kalilinux
๐ฅ 9๐ฉ 4โค 1
ChatGPT crawler can be triggered to DDoS a victim website via HTTP request to unrelated ChatGPT API. This defect in OpenAI software will spawn a DDoS attack on unsuspecting victim website, utilizing multiple Microsoft Azure IP address ranges on which ChatGPT crawler is running.
@kalilinux
Source
๐ 4๐ฑ 4๐ 1
Photo unavailableShow in Telegram
In case you're looking for a reliable, certified, and straightforward course on Ai agents
Enroll Here
@kalilinux
๐ 4
if you visit a website or use an app, that app probably knows your #IP address. But a bug in Cloudflare (and just by the nature of how services like #Cloudflare work) could allow an attacker to get the broad location of #Discord, #Signal , or #Twitter/X users by sending them an image. In some cases this doesn't require any interaction by the target. It shows the importance of thinking not just about your message security, but your network #security too.
TL;DR :
To do the attack, the attacker would send the target an image through the messaging apps. He would then use Burp suite to grab the URL of the uploaded image. Then, he would use a tool he made called "Cloudflare Teleport" to send a request to every Cloudflare data center to see which data center cached the request. These queries would return the results โHITโ or โMISSโ. With a hit, he now knows which data center the target was likely closest too, revealing their potential location. @kalilinux Source
๐ฑ 8๐ 1
garak checks if an LLM can be made to fail in a way we don't want. garak probes for hallucination, data leakage, prompt injection, misinformation, toxicity generation, jailbreaks, and many other weaknesses. If you know nmap or msf / Metasploit Framework, garak does somewhat similar things to them, but for LLMs
source01
source02
@kalilinux
๐ 7โค 2๐ฉ 1
A fully-remote (0-click) bug on the Samsung S24
The write-up warns. โIf Google Messages is configured for RCS (the default configuration on this device), as the transcription service decodes incoming audio before a user interacts with the message for transcription purposesโ the device can be attacked.
but if you have installed Decemberโs security release, then your device is secure against this threat.
Source
@Kalilinux
๐ 6
