Forwarded from The Hacker News
🚨 SharePoint zero-day (CVE-2025-53770) exploited since July 7 — now hitting gov, telecom & tech sectors.
Hackers are stealing cryptographic keys to forge access even after patches are applied.
One group is linked to China.
The threat is real. Act fast → https://thehackernews.com/2025/07/hackers-exploit-sharepoint-zero-day.html
Hackers are stealing cryptographic keys to forge access even after patches are applied.
One group is linked to China.
The threat is real. Act fast → https://thehackernews.com/2025/07/hackers-exploit-sharepoint-zero-day.html
Forwarded from The Hacker News
🚨 Shadow AI is exploding inside your org—whether you see it or not.
Zscaler tracked 36x more AI traffic in 2024, with 800+ apps in use. Blocking isn’t working—employees are going around it.
The real risk? Your IP is training public models.
Here’s what to do instead ↓ https://thehackernews.com/expert-insights/2025/07/empower-users-and-protect-against-genai.html
Zscaler tracked 36x more AI traffic in 2024, with 800+ apps in use. Blocking isn’t working—employees are going around it.
The real risk? Your IP is training public models.
Here’s what to do instead ↓ https://thehackernews.com/expert-insights/2025/07/empower-users-and-protect-against-genai.html
Forwarded from Android Security & Malware
Lookout Discovers Iranian APT MuddyWater Leveraging DCHSpy During Israel-Iran Conflict
https://www.lookout.com/threat-intelligence/article/lookout-discovers-iranian-dchsy-surveillanceware
https://www.lookout.com/threat-intelligence/article/lookout-discovers-iranian-dchsy-surveillanceware
Lookout
Lookout Discovers MuddyWater Leveraging DCHSpy For Israel-Iran Conflict | Threat Intel
Lookout discovered four new samples of DCHSpy one week after the start of the Israel-Iran conflict. It is likely developed and maintained by MuddyWater, part of Iran's MOIS
Forwarded from 𝗽𝗼𝗽𝗠𝗢𝗗𝗦 | 𝗙𝗢𝗦𝗦, 𝗟𝗶𝗳𝗲, 𝗠𝗲𝗺𝗲𝘀 (Ömer)
Winlay
Winlay is a free and open-source app developed by A3X. It allows you to download Windows, Android, and Linux files that can be used to test emulators such as Limbo PC Emulator x86, VirtualBox, and more.
🔗 Links:
- Download
- Screenshots
- Source code
Developer: A3X
🏷 Tags: #Android #Tools
Winlay is a free and open-source app developed by A3X. It allows you to download Windows, Android, and Linux files that can be used to test emulators such as Limbo PC Emulator x86, VirtualBox, and more.
🔗 Links:
- Download
- Screenshots
- Source code
Developer: A3X
❤️ Support the Project
If this project makes your life easier, here are a few quick ways to show some love:
⭐ Star the repo/app
☕ Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests
🏷 Tags: #Android #Tools
Forwarded from The Hacker News
Media is too big
VIEW IN TELEGRAM
If you're in cybersecurity, you've probably heard of CISSP All-in-One, The IDA Pro Book, or Gray Hat Hacking.
Now imagine learning directly from someone who co-authored the 4th and 5th edition of Gray Hat Hacking and has worked in global threat teams like Symantec, Mandiant, and Palo Alto Networks.
Hack Defender Academy is built for defenders who want to go deep — reverse real malware, follow shellcode injected in another process, dissect infostealers, intercept ransomware encryption key in memory, analyze .NET threats with WinDBG SOS plug-in, automate the deobfuscation with our unique tool NeZa and sharpen your skills by solving live Capture the Flag challenges.
💻1200+ min streaming
🏁CTF-based labs
🛠️Your own IDA Classroom License
Led by DanuX (Dan Regalado), a veteran reverse engineer and speaker at REcon, DEFCON, and RSA.
This is not a passive course. This is real-world training — for real defenders.
Start learning what truly matters at https://thn.news/hackdef-academy
Now imagine learning directly from someone who co-authored the 4th and 5th edition of Gray Hat Hacking and has worked in global threat teams like Symantec, Mandiant, and Palo Alto Networks.
Hack Defender Academy is built for defenders who want to go deep — reverse real malware, follow shellcode injected in another process, dissect infostealers, intercept ransomware encryption key in memory, analyze .NET threats with WinDBG SOS plug-in, automate the deobfuscation with our unique tool NeZa and sharpen your skills by solving live Capture the Flag challenges.
💻1200+ min streaming
🏁CTF-based labs
🛠️Your own IDA Classroom License
Led by DanuX (Dan Regalado), a veteran reverse engineer and speaker at REcon, DEFCON, and RSA.
This is not a passive course. This is real-world training — for real defenders.
Start learning what truly matters at https://thn.news/hackdef-academy
No deleted account found from
66 scanned users from this group 🚫👻CMF Watch 3 Pro launches with bigger 1.43" screen, longer battery life and higher price tag
https://ift.tt/hG8gjoU
https://ift.tt/hG8gjoU
GSMArena.com
CMF Watch 3 Pro launches with bigger 1.43" screen, longer battery life and higher price tag
The watch gains dual-band GPS, ChatGPT support and new sports modes. It's available starting today in three color options.
Ever wanted to use GeForce NOW on Linux? There's some good news for you:
https://news.itsfoss.com/geforce-infinity-app/
https://news.itsfoss.com/geforce-infinity-app/
It's FOSS News
NVIDIA's Cloud Gaming Service GeForce NOW Has an App on Linux
Although it is an unofficial app, you can use this app to play GeForce NOW games on Linux with some ease and extra features.
🚨 Cisco ISE flaws are being exploited in the wild — no login needed, root access gained.
Hackers can remotely hijack enterprise networks through unauthenticated API and file upload bugs (CVSS 10.0).
Details & fixes → https://thehackernews.com/2025/07/cisco-confirms-active-exploits.html
Hackers can remotely hijack enterprise networks through unauthenticated API and file upload bugs (CVSS 10.0).
Details & fixes → https://thehackernews.com/2025/07/cisco-confirms-active-exploits.html
🚨 Want to become a CISO? Your SOC skills aren’t enough.
Automation is replacing ops. If you’re not building business, risk, and leadership skills now—you’ll be left behind.
Here’s how to make the leap from SOC to the boardroom ↓ https://thehackernews.com/2025/07/how-to-advance-from-soc-manager-to-ciso.html
Automation is replacing ops. If you’re not building business, risk, and leadership skills now—you’ll be left behind.
Here’s how to make the leap from SOC to the boardroom ↓ https://thehackernews.com/2025/07/how-to-advance-from-soc-manager-to-ciso.html
Forwarded from cKure
■■□□□ Microsoft's Secure Boot UEFI bootloader signing key expires in September, posing problems for Linux users.
https://www.tomshardware.com/tech-industry/cyber-security/microsoft-signing-key-required-for-secure-boot-uefi-bootloader-expires-in-september-which-could-be-problematic-for-linux-users
https://www.tomshardware.com/tech-industry/cyber-security/microsoft-signing-key-required-for-secure-boot-uefi-bootloader-expires-in-september-which-could-be-problematic-for-linux-users
Tom's Hardware
Microsoft's Secure Boot UEFI bootloader signing key expires in September, posing problems for Linux users
A new key was issued in 2023, but it might not be well-supported ahead of the original key's expiration.
Forwarded from #TBOT: Take Back Our Tech
Media is too big
VIEW IN TELEGRAM
⚡️Jack Dorsey’s Bitchat- built in a weekend?
Last month, Twitter co-founder Jack Dorsey launched a new decentralized app: Bitchat—created in a weekend using AI.
Read full article on Substack
It’s a Bluetooth mesh messaging app: no accounts, no phone numbers, no internet required.
⚠️ Beware of fake versions! Only download from bitchat.free
🔐 Bitchat uses:
• Bluetooth mesh networking (like Briar)
• The Noise Protocol (used by Signal & Wireguard)
• Ephemeral peer IDs for privacy
Useful in protests or blackouts—but with a 30m hop limit, it's only effective in dense areas. Max reach? ~300m if 10+ devices relay the message.
🤔 Built for iOS (a closed, vulnerable system) and developed by someone with ties to U.S. State Dept., it raises questions.
So is it a real privacy tool—or a showcase for Dorsey’s coding AI “Goose”? Either way, it hints at a new tech era: anyone can build powerful tools—fast.
🤖 Follow the show
👩💻 Get private phones, laptops, and tablets
🏫 Sign up for our back to school webinar
Last month, Twitter co-founder Jack Dorsey launched a new decentralized app: Bitchat—created in a weekend using AI.
Read full article on Substack
It’s a Bluetooth mesh messaging app: no accounts, no phone numbers, no internet required.
⚠️ Beware of fake versions! Only download from bitchat.free
🔐 Bitchat uses:
• Bluetooth mesh networking (like Briar)
• The Noise Protocol (used by Signal & Wireguard)
• Ephemeral peer IDs for privacy
Useful in protests or blackouts—but with a 30m hop limit, it's only effective in dense areas. Max reach? ~300m if 10+ devices relay the message.
🤔 Built for iOS (a closed, vulnerable system) and developed by someone with ties to U.S. State Dept., it raises questions.
So is it a real privacy tool—or a showcase for Dorsey’s coding AI “Goose”? Either way, it hints at a new tech era: anyone can build powerful tools—fast.
🤖 Follow the show
👩💻 Get private phones, laptops, and tablets
🏫 Sign up for our back to school webinar
Forwarded from Bones' Tech Garage
In the chat we had a discussion about why AI needs to be managed properly. Dependence will cause us to lose our ability to problem solve, use discernment and critically think. Think of the humans from the Pixar movie Wall-E. That will become us.
https://www.makeuseof.com/chatgpt-outage-crisis/
https://www.makeuseof.com/chatgpt-outage-crisis/
MUO
ChatGPT Is Down—Your Business (and Life) May Be Next
AI just crashed. Your world just got a lot harder.