Forwarded from Gizchina.com
How to use generative AI to get the best possible results https://www.gizchina.com/editorial/how-to-use-generative-ai-to-get-the-best-possible-results
Gizchina
How to use generative AI to get the best possible results
Generative AI has come to make our lives much easier by swiftly producing texts, code, or research information that would otherwise take longer to obtain.
Forwarded from It's FOSS
Proton's latest launch targets the dark web. 🕵️👩💻
https://news.itsfoss.com/proton-data-breach-observatory/
https://news.itsfoss.com/proton-data-breach-observatory/
It's FOSS
Proton Launches Data Breach Observatory to Track Dark Web Activity in Real-Time
A constantly updated dark web monitoring tool.
Forwarded from It's FOSS
Is the internet we knew already gone? Dive into how bots, AI, and algorithms are reshaping the web. 🤖🖥
https://news.itsfoss.com/internet-is-dying/
https://news.itsfoss.com/internet-is-dying/
It's FOSS
The Internet is Dying. We Can Still Stop It
Almost 50% of all internet traffic are non-human already. Unchecked, it could lead to a zombie internet.
Forwarded from The Hacker News
CISA added a new VMware zero-day to its KEV list.
CVE-2025-41244 (CVSS 7.8) lets local users on VMs with VMware Tools + Aria Operations gain root access.
Exploited since Oct 2024 by China-linked UNC5174.
Patch released last month ↓ https://thehackernews.com/2025/10/cisa-flags-vmware-zero-day-exploited-by.html
CVE-2025-41244 (CVSS 7.8) lets local users on VMs with VMware Tools + Aria Operations gain root access.
Exploited since Oct 2024 by China-linked UNC5174.
Patch released last month ↓ https://thehackernews.com/2025/10/cisa-flags-vmware-zero-day-exploited-by.html
Forwarded from The Hacker News
Developers accidentally leaked VS Code tokens — letting attackers publish fake extensions.
Eclipse has revoked the tokens and added new safeguards after a campaign dubbed “GlassWorm.”
Read → https://thehackernews.com/2025/10/eclipse-foundation-revokes-leaked-open.html
Eclipse has revoked the tokens and added new safeguards after a campaign dubbed “GlassWorm.”
Read → https://thehackernews.com/2025/10/eclipse-foundation-revokes-leaked-open.html
Forwarded from The Hacker News
A Mac app just bypassed macOS permission checks — silently turning on the mic and camera.
ThreatLocker’s new Device Access Control (DAC) for macOS, now in Beta, flags hidden risks like unencrypted drives, SMBv1, and weak sharing settings — before attackers can exploit them.
Learn more ↓ https://thehackernews.com/2025/10/a-new-security-layer-for-macos-takes.html
ThreatLocker’s new Device Access Control (DAC) for macOS, now in Beta, flags hidden risks like unencrypted drives, SMBv1, and weak sharing settings — before attackers can exploit them.
Learn more ↓ https://thehackernews.com/2025/10/a-new-security-layer-for-macos-takes.html
Forwarded from The Hacker News
CISA and NSA just issued a warning:
Exchange servers are still getting hacked. Now a new WSUS flaw (CVE-2025-59287) lets attackers run code remotely.
Even patched systems aren’t fully safe.
If you manage Exchange or WSUS, read this ↓ https://thehackernews.com/2025/10/cisa-and-nsa-issue-urgent-guidance-to.html
Exchange servers are still getting hacked. Now a new WSUS flaw (CVE-2025-59287) lets attackers run code remotely.
Even patched systems aren’t fully safe.
If you manage Exchange or WSUS, read this ↓ https://thehackernews.com/2025/10/cisa-and-nsa-issue-urgent-guidance-to.html
Forwarded from Nagram X CI
NagramX-v12.1.1-4fc66e8(1221)-arm64-v8a.apk
47 MB
Test version.
Commit Message:
See commit details 4fc66e8
Commit Message:
feat: block and hide messages from channel users
See commit details 4fc66e8
Changes since last build:
✨ Features
• block and hide messages from channel users
🐛 Fixes
• skip invalid chat filters
• hide message when reply to peer is blocked
• in-app notification service on android 15+
• show save deleted and message filters menus for bots
♻️ Refactors
• refine filter handling
Full changes
Generated by openai/gpt-4.1
Forwarded from TerX Official
🌏 Atmosphere Battery UI🔋
Released: 10/31/2025
Version: 4.0-Official-Final
Author: TerX Official
Support: Magisk / Ksun / Apatch
Official Telegram > Here
Creator > Here
Download > Here
Released: 10/31/2025
Version: 4.0-Official-Final
Author: TerX Official
Support: Magisk / Ksun / Apatch
⚠️Note:
• Depends on Adapter & Charging Cable the Charge Speed but this module push your charging voltages and watts to limits
🔥New Main Feature
• Added Cooling System [ C++ ]
• Added Fast Charging System [ Java & C++ ]
• Added Battery Light Weight
• Added Webroot [ C++ & Java ]
• Added Ultra Fast Charging System [ JS ] [ C++ & Java ]
• Added Safe Write in OEM HAL AND OEM KERNEL & HARDWARE
• Added Live Monitoring your Battery [ Java ]
Official Telegram > Here
Creator > Here
Download > Here
Forwarded from Android Security & Malware
The Rise of NFC Relay Malware on Mobile Devices
Cybercriminals are spreading NFC relay malware that tricks you into placing your card against your phone’s NFC chip. Once you do, the malware silently captures and relays your card data to fraudsters, who can use it for unauthorized payments or ATM withdrawals.
Reports show these scams are growing fast across the globe, with hundreds of malicious apps already detected.
https://zimperium.com/blog/tap-and-steal-the-rise-of-nfc-relay-malware-on-mobile-devices
Cybercriminals are spreading NFC relay malware that tricks you into placing your card against your phone’s NFC chip. Once you do, the malware silently captures and relays your card data to fraudsters, who can use it for unauthorized payments or ATM withdrawals.
Reports show these scams are growing fast across the globe, with hundreds of malicious apps already detected.
https://zimperium.com/blog/tap-and-steal-the-rise-of-nfc-relay-malware-on-mobile-devices
Forwarded from The Hacker News
Most MSPs are walking straight into a trap.
Clients now expect enterprise-level cybersecurity — but many providers are still selling basic IT support.
The result? Lost clients, slower growth, and higher risk exposure.
Is your MSP ready to lead with security? ↓ https://thehackernews.com/2025/10/the-msp-cybersecurity-readiness-guide.html
Clients now expect enterprise-level cybersecurity — but many providers are still selling basic IT support.
The result? Lost clients, slower growth, and higher risk exposure.
Is your MSP ready to lead with security? ↓ https://thehackernews.com/2025/10/the-msp-cybersecurity-readiness-guide.html
Forwarded from The Hacker News
⚠️ Chinese hackers are exploiting a critical 9.3 CVE (CVE-2025-61932) in Motex Lanscope Endpoint Manager.
It lets them run SYSTEM-level commands and plant a Gokcpdoor backdoor with new multiplexed C2 channels.
Active attacks confirmed ↓ https://thehackernews.com/2025/10/china-linked-tick-group-exploits.html
It lets them run SYSTEM-level commands and plant a Gokcpdoor backdoor with new multiplexed C2 channels.
Active attacks confirmed ↓ https://thehackernews.com/2025/10/china-linked-tick-group-exploits.html
Forwarded from The Hacker News
🚨 China-backed hackers exploited an unpatched Windows shortcut bug to breach European diplomats.
UNC6384 used fake “EU Commission” and NATO meeting invites to plant PlugX malware (CVE-2025-9491) — still unpatched by Microsoft.
Full story ↓ https://thehackernews.com/2025/10/china-linked-hackers-exploit-windows.html
UNC6384 used fake “EU Commission” and NATO meeting invites to plant PlugX malware (CVE-2025-9491) — still unpatched by Microsoft.
Full story ↓ https://thehackernews.com/2025/10/china-linked-hackers-exploit-windows.html
Forwarded from Bones' Tech Garage
It's not AI, I mind so much but the slop and gas-lighting that come from it's use. Seeing a picture or a video these days the first question that comes to mind... Is it real or AI generated?
https://www.makeuseof.com/ai-features-being-rammed-down-our-throats/
https://www.makeuseof.com/ai-features-being-rammed-down-our-throats/
MUO
I’m drowning in AI features I never asked for and I absolutely hate it
The AI bubble is real.
Forwarded from #TBOT: Take Back Our Tech
⚡️Exposing the Digital Control Grid on The Survival Podcast
I had the chance to join Jack Spirko on The Survival Podcast to uncover how Digital ID systems and school surveillance tech are quietly being woven into our daily lives.
We talk about what this means for privacy, the next phase of digital control, and how we can reclaim our freedom through open-source, privacy-first tools.
🎧 Watch the full interview here
📝 Download our Digital ID Report
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
I had the chance to join Jack Spirko on The Survival Podcast to uncover how Digital ID systems and school surveillance tech are quietly being woven into our daily lives.
We talk about what this means for privacy, the next phase of digital control, and how we can reclaim our freedom through open-source, privacy-first tools.
🎧 Watch the full interview here
📝 Download our Digital ID Report
—
🫶 @takebackourtech
📩 WEBSITE & NEWSLETTER | 🎥 VIDEOS| XMPP | SUBSTACK
The Survival Podcast | Helping you live a better life, if times get tough or even if they don't
Global Digital ID & School Surveillance - Epi-3751
Hakeem Anwar from Above Agency joins us to discuss the rising threat of global digital ID & the disturbing roll out of school surveillance of our children.
Forwarded from The Hacker News
Nation-state hackers built Airstalk, a new malware abusing VMware Workspace ONE’s MDM API as a covert C2 channel.
Signed with a stolen cert, it’s exfiltrating browser data from BPO networks.
Full analysis ↓ https://thehackernews.com/2025/10/nation-state-hackers-deploy-new.html
Signed with a stolen cert, it’s exfiltrating browser data from BPO networks.
Full analysis ↓ https://thehackernews.com/2025/10/nation-state-hackers-deploy-new.html
Forwarded from The Hacker News
🔥 OpenAI just launched an AI #cybersecurity researcher.
It finds bugs, proves they’re real, and patches them — all by itself.
Powered by GPT-5, it’s already discovered 10 vulnerabilities.
The age of autonomous bug hunters starts now → https://thehackernews.com/2025/10/openai-unveils-aardvark-gpt-5-agent.html
It finds bugs, proves they’re real, and patches them — all by itself.
Powered by GPT-5, it’s already discovered 10 vulnerabilities.
The age of autonomous bug hunters starts now → https://thehackernews.com/2025/10/openai-unveils-aardvark-gpt-5-agent.html