Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
584 videos
549 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Winlay

Winlay is a free and open-source app developed by A3X. It allows you to download Windows, Android, and Linux files that can be used to test emulators such as Limbo PC Emulator x86, VirtualBox, and more.

🔗 Links:
- Download
- Screenshots
- Source code
Developer: A3X

❤️ Support the Project

If this project makes your life easier, here are a few quick ways to show some love:

Star the repo/app
Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests


🏷 Tags: #Android #Tools
Forwarded from Hacker News
MIPS – The hyperactive history and legacy of the pioneering RISC architecture
Article, Comments
Forwarded from The Hacker News
Media is too big
VIEW IN TELEGRAM
If you're in cybersecurity, you've probably heard of CISSP All-in-One, The IDA Pro Book, or Gray Hat Hacking.

Now imagine learning directly from someone who co-authored the 4th and 5th edition of Gray Hat Hacking and has worked in global threat teams like Symantec, Mandiant, and Palo Alto Networks.

Hack Defender Academy is built for defenders who want to go deep — reverse real malware, follow shellcode injected in another process, dissect infostealers, intercept ransomware encryption key in memory, analyze .NET threats with WinDBG SOS plug-in, automate the deobfuscation with our unique tool NeZa and sharpen your skills by solving live Capture the Flag challenges.

💻1200+ min streaming
🏁CTF-based labs
🛠️Your own IDA Classroom License

Led by DanuX (Dan Regalado), a veteran reverse engineer and speaker at REcon, DEFCON, and RSA.

This is not a passive course. This is real-world training — for real defenders.

Start learning what truly matters at https://thn.news/hackdef-academy
No deleted account found from 66 scanned users from this group 🚫👻
🚨 Cisco ISE flaws are being exploited in the wild — no login needed, root access gained.

Hackers can remotely hijack enterprise networks through unauthenticated API and file upload bugs (CVSS 10.0).

Details & fixes → https://thehackernews.com/2025/07/cisco-confirms-active-exploits.html
🚨 Want to become a CISO? Your SOC skills aren’t enough.

Automation is replacing ops. If you’re not building business, risk, and leadership skills now—you’ll be left behind.

Here’s how to make the leap from SOC to the boardroom ↓ https://thehackernews.com/2025/07/how-to-advance-from-soc-manager-to-ciso.html
Media is too big
VIEW IN TELEGRAM
⚡️Jack Dorsey’s Bitchat- built in a weekend?

Last month, Twitter co-founder Jack Dorsey launched a new decentralized app: Bitchat—created in a weekend using AI.

Read full article on Substack

It’s a Bluetooth mesh messaging app: no accounts, no phone numbers, no internet required.

⚠️ Beware of fake versions! Only download from bitchat.free

🔐 Bitchat uses:
• Bluetooth mesh networking (like Briar)
• The Noise Protocol (used by Signal & Wireguard)
• Ephemeral peer IDs for privacy

Useful in protests or blackouts—but with a 30m hop limit, it's only effective in dense areas. Max reach? ~300m if 10+ devices relay the message.

🤔 Built for iOS (a closed, vulnerable system) and developed by someone with ties to U.S. State Dept., it raises questions.

So is it a real privacy tool—or a showcase for Dorsey’s coding AI “Goose”? Either way, it hints at a new tech era: anyone can build powerful tools—fast.

🤖 Follow the show
👩‍💻
Get private phones, laptops, and tablets
🏫
Sign up for our back to school webinar
Forwarded from Bones' Tech Garage
In the chat we had a discussion about why AI needs to be managed properly. Dependence will cause us to lose our ability to problem solve, use discernment and critically think. Think of the humans from the Pixar movie Wall-E. That will become us.

https://www.makeuseof.com/chatgpt-outage-crisis/
Forwarded from The Hacker News
🚨 A hacked MSI installer is stealing banking logins across Mexico.

Greedy Sponge hackers are pushing a weaponized Chrome proxy zip that drops AllaKore RAT—now upgraded to exfiltrate credentials and act as a SOCKS5 proxy.

💰 Financial fraud is the goal. And it’s working.

Full report → https://thehackernews.com/2025/07/credential-theft-and-remote-access.html