Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
584 videos
549 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
🚨 Cisco ISE flaws are being exploited in the wild — no login needed, root access gained.

Hackers can remotely hijack enterprise networks through unauthenticated API and file upload bugs (CVSS 10.0).

Details & fixes → https://thehackernews.com/2025/07/cisco-confirms-active-exploits.html
🚨 Want to become a CISO? Your SOC skills aren’t enough.

Automation is replacing ops. If you’re not building business, risk, and leadership skills now—you’ll be left behind.

Here’s how to make the leap from SOC to the boardroom ↓ https://thehackernews.com/2025/07/how-to-advance-from-soc-manager-to-ciso.html
Media is too big
VIEW IN TELEGRAM
⚡️Jack Dorsey’s Bitchat- built in a weekend?

Last month, Twitter co-founder Jack Dorsey launched a new decentralized app: Bitchat—created in a weekend using AI.

Read full article on Substack

It’s a Bluetooth mesh messaging app: no accounts, no phone numbers, no internet required.

⚠️ Beware of fake versions! Only download from bitchat.free

🔐 Bitchat uses:
• Bluetooth mesh networking (like Briar)
• The Noise Protocol (used by Signal & Wireguard)
• Ephemeral peer IDs for privacy

Useful in protests or blackouts—but with a 30m hop limit, it's only effective in dense areas. Max reach? ~300m if 10+ devices relay the message.

🤔 Built for iOS (a closed, vulnerable system) and developed by someone with ties to U.S. State Dept., it raises questions.

So is it a real privacy tool—or a showcase for Dorsey’s coding AI “Goose”? Either way, it hints at a new tech era: anyone can build powerful tools—fast.

🤖 Follow the show
👩‍💻
Get private phones, laptops, and tablets
🏫
Sign up for our back to school webinar
Forwarded from Bones' Tech Garage
In the chat we had a discussion about why AI needs to be managed properly. Dependence will cause us to lose our ability to problem solve, use discernment and critically think. Think of the humans from the Pixar movie Wall-E. That will become us.

https://www.makeuseof.com/chatgpt-outage-crisis/
Forwarded from The Hacker News
🚨 A hacked MSI installer is stealing banking logins across Mexico.

Greedy Sponge hackers are pushing a weaponized Chrome proxy zip that drops AllaKore RAT—now upgraded to exfiltrate credentials and act as a SOCKS5 proxy.

💰 Financial fraud is the goal. And it’s working.

Full report → https://thehackernews.com/2025/07/credential-theft-and-remote-access.html
Forwarded from The Hacker News
{NEW} Chinese hackers are exploiting new SharePoint flaws—Microsoft links attacks to APT27, APT31 & Storm-2603.

They’re bypassing patches to steal MachineKeys via remote code execution.

The exploit chain is already in the wild.

Patch now ↓ https://thehackernews.com/2025/07/microsoft-links-ongoing-sharepoint.html
Check out my latest article for TLAV:

Mexico Moves Closer to Biometric ID – Will The People Comply?

Privacy advocates warn that a package of new laws recently passed in Mexico are a dangerous step towards requiring digital ID for all interactions.

https://www.thelastamericanvagabond.com/mexico-biometric-curp/
FlipperDroid

FlipperDroid transforms a modern Android phone into a flexible and portable alternative to Flipper Zero. It enables security professionals, researchers, and enthusiasts to interact with and analyze a wide range of communication protocols and interfaces, directly from a mobile device. The application includes modules for scanning, analyzing, and emulating NFC, Bluetooth, RFID, and more, as well as tools for network diagnostics and USB-based attacks, making it a comprehensive mobile toolkit.

🔗 Links:
- Download
- Screenshots
- Features
- Source code
Developer: Jeremiznoo

Disclaimer:
This application is intended strictly for educational, research, and legal penetration testing purposes.Misuse of this software for unauthorized access, emulation, or attacks on third-party devices or systems is strictly prohibited. The developer is not responsible for any consequences resulting from illegal use


❤️ Support the Project

If this project makes your life easier, here are a few quick ways to show some love:

Star the repo/app
Buy a coffee for the developer
🛠 Contribute code, issues, or pull-requests


🏷 Tags: #Android #Tools