Forwarded from Hacker News
Forwarded from πΏ ReZygisk (Ξ΄) π§¬
β οΈ We, once again, urge people to stop making false claims about alternative groups having the status of ReZygisk support chats.
@rezygiskchat is the only official and dedicated support formation. Everything else is only associated with the ReZygisk project in the best-case scenario.
We have already made such messages; we are tired of seeing people asking primitive questions that have already been resolved. People would have known, had they participated in the official group chat.
ReZygisk support has never been promised and has never been conducted in the Play Integrity Fix chat, Magisk Modules Group, ReVanced support chat, Telegram support chat, iOS support email, 911 emergency hotline, PornHub, Brazzers, Instagram comments, BurgerKing restaurant β SUPPORT IS ONLY PERFORMED IN @REZYGISKCHAT. A SIMPLE FRICKING CONCEPT.
We will not be responsible for issues that you do not let us recognize. You cannot find ReZygisk representatives on RacistFurry Fans chats (or whatever you look for) for them to properly file and address issues or bugs. Our job is to only help you in @rezygiskchat.
π’ Please, forward this to different groups and/or channels for it to reach wider audiences.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from The Hacker News
π¨ SharePoint zero-day (CVE-2025-53770) exploited since July 7 β now hitting gov, telecom & tech sectors.
Hackers are stealing cryptographic keys to forge access even after patches are applied.
One group is linked to China.
The threat is real. Act fast β https://thehackernews.com/2025/07/hackers-exploit-sharepoint-zero-day.html
Hackers are stealing cryptographic keys to forge access even after patches are applied.
One group is linked to China.
The threat is real. Act fast β https://thehackernews.com/2025/07/hackers-exploit-sharepoint-zero-day.html
Forwarded from The Hacker News
π¨ Shadow AI is exploding inside your orgβwhether you see it or not.
Zscaler tracked 36x more AI traffic in 2024, with 800+ apps in use. Blocking isnβt workingβemployees are going around it.
The real risk? Your IP is training public models.
Hereβs what to do instead β https://thehackernews.com/expert-insights/2025/07/empower-users-and-protect-against-genai.html
Zscaler tracked 36x more AI traffic in 2024, with 800+ apps in use. Blocking isnβt workingβemployees are going around it.
The real risk? Your IP is training public models.
Hereβs what to do instead β https://thehackernews.com/expert-insights/2025/07/empower-users-and-protect-against-genai.html
Forwarded from Android Security & Malware
Lookout Discovers Iranian APT MuddyWater Leveraging DCHSpy During Israel-Iran Conflict
https://www.lookout.com/threat-intelligence/article/lookout-discovers-iranian-dchsy-surveillanceware
https://www.lookout.com/threat-intelligence/article/lookout-discovers-iranian-dchsy-surveillanceware
Lookout
Lookout Discovers MuddyWater Leveraging DCHSpy For Israel-Iran Conflict | Threat Intel
Lookout discovered four new samples of DCHSpy one week after the start of the Israel-Iran conflict. It is likely developed and maintained by MuddyWater, part of Iran's MOIS
Forwarded from π½πΌπ½π π’ππ¦ | ππ’π¦π¦, ππΆπ³π², π π²πΊπ²π (Γmer)
Winlay
Winlay is a free and open-source app developed by A3X. It allows you to download Windows, Android, and Linux files that can be used to test emulators such as Limbo PC Emulator x86, VirtualBox, and more.
π Links:
- Download
- Screenshots
- Source code
Developer: A3X
π· Tags: #Android #Tools
Winlay is a free and open-source app developed by A3X. It allows you to download Windows, Android, and Linux files that can be used to test emulators such as Limbo PC Emulator x86, VirtualBox, and more.
π Links:
- Download
- Screenshots
- Source code
Developer: A3X
β€οΈ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
β Star the repo/app
β Buy a coffee for the developer
π Contribute code, issues, or pull-requests
π· Tags: #Android #Tools
Forwarded from The Hacker News
Media is too big
VIEW IN TELEGRAM
If you're in cybersecurity, you've probably heard of CISSP All-in-One, The IDA Pro Book, or Gray Hat Hacking.
Now imagine learning directly from someone who co-authored the 4th and 5th edition of Gray Hat Hacking and has worked in global threat teams like Symantec, Mandiant, and Palo Alto Networks.
Hack Defender Academy is built for defenders who want to go deep β reverse real malware, follow shellcode injected in another process, dissect infostealers, intercept ransomware encryption key in memory, analyze .NET threats with WinDBG SOS plug-in, automate the deobfuscation with our unique tool NeZa and sharpen your skills by solving live Capture the Flag challenges.
π»1200+ min streaming
πCTF-based labs
π οΈYour own IDA Classroom License
Led by DanuX (Dan Regalado), a veteran reverse engineer and speaker at REcon, DEFCON, and RSA.
This is not a passive course. This is real-world training β for real defenders.
Start learning what truly matters at https://thn.news/hackdef-academy
Now imagine learning directly from someone who co-authored the 4th and 5th edition of Gray Hat Hacking and has worked in global threat teams like Symantec, Mandiant, and Palo Alto Networks.
Hack Defender Academy is built for defenders who want to go deep β reverse real malware, follow shellcode injected in another process, dissect infostealers, intercept ransomware encryption key in memory, analyze .NET threats with WinDBG SOS plug-in, automate the deobfuscation with our unique tool NeZa and sharpen your skills by solving live Capture the Flag challenges.
π»1200+ min streaming
πCTF-based labs
π οΈYour own IDA Classroom License
Led by DanuX (Dan Regalado), a veteran reverse engineer and speaker at REcon, DEFCON, and RSA.
This is not a passive course. This is real-world training β for real defenders.
Start learning what truly matters at https://thn.news/hackdef-academy