Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.65K photos
579 videos
510 files
16.1K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
No deleted account found from 65 scanned users from this group 🚫👻
Media is too big
VIEW IN TELEGRAM
Finding Service After Ditching Big Carriers

One of our community members asked where to go for service after switching to an Above Phone—and I shared why we created the Above DataSIM. It’s a seamless way to stay connected without compromising on privacy, and it works great with your new setup.

📺 This clip comes from our webinar *What’s Your Privacy Score?* — watch the full webinar here.


🫶 @takebackourtech
🎥 VIDEOS| 📩 NEWSLETTER | XMPP | SUBSTACK
Tomato

Tomato is a minimalist Pomodoro timer for Android based on Material 3 Expressive.

🔗 Links:
- Download
- Screenshots
- Features
- Source code
Developer: Nishant Mishra

🫂 Special thanks to @prem12321kumar for recommending!

❤️ Support the Project

If this project makes your life easier, here are a few quick ways to show some love:

Star the repo/app
Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests


🏷️ Tags: #Android #Productivity
Media is too big
VIEW IN TELEGRAM
⚡️How at-risk are you for a SIM swap?

Here’s a quick test:
Search your texts for 6-digit codes. Every login code you find is a service tied to your phone number. That’s your risk score.

Most people have 8+ accounts relying on text-based 2FA—making them easy targets.

Your info might already be out there. But you can lower your risk and lock things down.

Watch the webinar now: SIM Swap Survival Guide

Want real protection? Learn more and shop privacy-first tech.


🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
Forwarded from The Hacker News
🛑 Google’s AI just stopped a cyberattack before it even began.

An LLM agent named Big Sleep discovered a critical SQLite flaw (CVE-2025-6965) that threat actors were likely about to exploit—making it the first known case of an AI foiling a live exploit attempt.

Details on how it worked → https://thehackernews.com/2025/07/google-ai-big-sleep-stops-exploitation.html
Forwarded from The Hacker News
⚠️ WARNING - Google Chrome Zero-Day Alert!

A new exploit is hitting users right now — CVE-2025-6558 lets attackers break out of the browser sandbox.

Update Chrome ASAP → https://thehackernews.com/2025/07/urgent-google-releases-critical-chrome.html

(Edge, Brave, Opera users: you're not safe either.)
Forwarded from The Hacker News
🚨 Two Android threats just collided — and it’s getting wild.

Hackers are using evil twin apps with the same package name as legit Play Store apps to deliver Konfety malware — now upgraded with fake encryption, APK crashes, dynamic payloads, and hidden installs.

At the same time, TapTrap lets apps hijack your screen taps to grant malware dangerous permissions — no user awareness needed.

This isn’t theoretical. Android 16 is still vulnerable.

Details here → https://thehackernews.com/2025/07/new-konfety-malware-variant-evades.html
Forwarded from The Hacker News
🚨 M&A chaos isn't just financial—it’s identity chaos too.

Mergers can spawn 25+ siloed systems, untracked privileged accounts, and dangerous role creep. One wrong move? Audit failures or full-blown breaches.

Here’s how to restore order before risk takes over ↓ https://thehackernews.com/expert-insights/2025/07/identity-challenges-in-mergers-and.html
Forwarded from The Hacker News
Deepfake CEOs. Fake job offers. Cloned websites.

AI-powered scams are fooling even trained teams—because they look real. These aren’t phishing emails. They’re full-scale impersonation attacks.

See how to stop them in real time.

Watch the webinar → https://thehackernews.com/2025/07/deepfakes-fake-recruiters-cloned-cfos.html
Forwarded from The Hacker News
🚨 One flaw. Total takeover.

A critical bug in Windows Server 2025 lets attackers generate any dMSA/gMSA password—across the forest.

It bypasses Credential Guard and can persist for years.

Details here → https://thehackernews.com/2025/07/critical-golden-dmsa-attack-in-windows.html
Forwarded from The Hacker News
🚨 Your AI agent isn’t just helping—it has full access to code, payroll, email, and more.

If one device gets hacked, it can leak everything—fast.

The real risk? It’s not the AI. It’s who (or what) can talk to it.

Learn how to lock it down → https://thehackernews.com/2025/07/ai-agents-act-like-employees-with-root.html