Forwarded from Gizchina.com
Xiaomi Users Will Soon Send Encrypted Messages to iPhones
https://www.gizchina.com/2025/03/27/xiaomi-users-will-soon-send-encrypted-messages-to-iphones/
https://www.gizchina.com/2025/03/27/xiaomi-users-will-soon-send-encrypted-messages-to-iphones/
Forwarded from ๐ฝ๐ผ๐ฝ๐ ๐ข๐๐ฆ | ๐๐ข๐ฆ๐ฆ, ๐๐ถ๐ณ๐ฒ, ๐ ๐ฒ๐บ๐ฒ๐ (๊ญ ๐๐๐๐๐๐๐๐๐ #sky)
Persepolis
Persepolis is a download manager written in Python. Persepolis is a sample of free and open-source software. It's developed for GNU/Linux distributions, BSDs, macOS, and Microsoft Windows.
๐ Links:
- Download
- Screenshots
- Features
- Source Code
Developer: Persepolisdm
โค๏ธ Special thanks to @SC1444 for recommending!
๐ท๏ธ Tags: #Desktop #Windows #Linux #MacOS #Tools
Persepolis is a download manager written in Python. Persepolis is a sample of free and open-source software. It's developed for GNU/Linux distributions, BSDs, macOS, and Microsoft Windows.
๐ Links:
- Download
- Screenshots
- Features
- Source Code
Developer: Persepolisdm
โค๏ธ Special thanks to @SC1444 for recommending!
๐ท๏ธ Tags: #Desktop #Windows #Linux #MacOS #Tools
Forwarded from ๐ฝ๐ผ๐ฝ๐ ๐ข๐๐ฆ | ๐๐ข๐ฆ๐ฆ, ๐๐ถ๐ณ๐ฒ, ๐ ๐ฒ๐บ๐ฒ๐ (รmer)
Did you know you can use Gemini as an OCR, translator and annotator in Cherrygram?
Get your API key from aistudio.google.com, Then go to Cherrygram Preferences > Chats > Gemini AI, and enter the API key that you got from Google AI Studio
Note: You need Cherrygram Beta build to use latest features of Gemini.
๐ท๏ธ Tags: #Android #AI #Telegram #Guides
Get your API key from aistudio.google.com, Then go to Cherrygram Preferences > Chats > Gemini AI, and enter the API key that you got from Google AI Studio
Note: You need Cherrygram Beta build to use latest features of Gemini.
๐ท๏ธ Tags: #Android #AI #Telegram #Guides
Forwarded from ๐ฝ๐ผ๐ฝ๐ ๐ข๐๐ฆ | ๐๐ข๐ฆ๐ฆ, ๐๐ถ๐ณ๐ฒ, ๐ ๐ฒ๐บ๐ฒ๐ (๏ผบ๏ผง๏ผธ๏ผ๏ผ๏ผใ)
ApkToolGUI
a tool for reverse engineering 3rd party, closed, binary Android apps. It makes possible to debug smali code step by step. Also it makes working with app easier because of project-like files structure and automation of some repetitive tasks like building apk, etc.
๐Links
- Download
- Requirements
- Features
- Screenshot
- Source code
Developer: AndnixSH
โค๏ธ Thanks to @SC1444 for app recommendation!
๐ท Tags: #Windows #Utilities
a tool for reverse engineering 3rd party, closed, binary Android apps. It makes possible to debug smali code step by step. Also it makes working with app easier because of project-like files structure and automation of some repetitive tasks like building apk, etc.
๐Links
- Download
- Requirements
- Features
- Screenshot
- Source code
Developer: AndnixSH
โค๏ธ Thanks to @SC1444 for app recommendation!
๐ท Tags: #Windows #Utilities
Forwarded from Gizchina.com
Redmi K80 Pro Transformed into a Powerful Handheld Console by Chinese Modder
https://www.gizchina.com/2025/03/27/redmi-k80-pro-transformed-into-a-powerful-handheld-console-by-chinese-modder/
https://www.gizchina.com/2025/03/27/redmi-k80-pro-transformed-into-a-powerful-handheld-console-by-chinese-modder/
Forwarded from It's FOSS
AerynOS 2025.03 is the first release following the Serpent OS rebranding.
https://news.itsfoss.com/aerynos-2025-03/
https://news.itsfoss.com/aerynos-2025-03/
It's FOSS News
Serpent OS Sheds its Skin to Evolve into AerynOS
Serpent OS has successfully rebranded into AerynOS with a new release.
Forwarded from The Hacker News
๐จ One click from insider to admin?
A critical flaw in NetApp SnapCenter (CVE-2025-26512, CVSS 9.9) lets authenticated users escalate privileges to full adminโon remote systems.
SnapCenter powers enterprise backupsโthis isnโt niche, itโs everywhere.
๐Read: https://thehackernews.com/2025/03/netapp-snapcenter-flaw-could-let-users.html
A critical flaw in NetApp SnapCenter (CVE-2025-26512, CVSS 9.9) lets authenticated users escalate privileges to full adminโon remote systems.
SnapCenter powers enterprise backupsโthis isnโt niche, itโs everywhere.
๐Read: https://thehackernews.com/2025/03/netapp-snapcenter-flaw-could-let-users.html
Forwarded from The Hacker News
๐ 6-year-old bugs are backโand being weaponized.
CISA just flagged two 2019 Sitecore RCE flaws (CVE-2019-9874 & 9875) as actively exploited.
But it doesnโt stop there:
โก๏ธ Next.js auth bypass (CVE-2025-29927) is under live attack
โก๏ธ DrayTek routers face fresh waves targeting old RCE/LFI bugs.
๐ Details: https://thehackernews.com/2025/03/cisa-flags-two-six-year-old-sitecore.html
Old CVEs. New exploits. Patch now.
CISA just flagged two 2019 Sitecore RCE flaws (CVE-2019-9874 & 9875) as actively exploited.
But it doesnโt stop there:
โก๏ธ Next.js auth bypass (CVE-2025-29927) is under live attack
โก๏ธ DrayTek routers face fresh waves targeting old RCE/LFI bugs.
๐ Details: https://thehackernews.com/2025/03/cisa-flags-two-six-year-old-sitecore.html
Old CVEs. New exploits. Patch now.
Forwarded from The Hacker News
๐จ 150,000+ websites hijacked. Millions redirected.
Hackers are injecting malicious JavaScript into legit sites to push Chinese-language gambling adsโusing fake Bet365 branding, fullscreen overlays, and iframe tricks.
๐ Full story: https://thehackernews.com/2025/03/150000-sites-compromised-by-javascript.html
Hackers are injecting malicious JavaScript into legit sites to push Chinese-language gambling adsโusing fake Bet365 branding, fullscreen overlays, and iframe tricks.
๐ Full story: https://thehackernews.com/2025/03/150000-sites-compromised-by-javascript.html
Forwarded from The Hacker News
๐ฅ Still opening Office docs without checking? In 2025, thatโs a major risk.
Hackers still use Word and Excel to deliver malwareโno macros, no clicks.
Top threats: Phishing docs, fake logins, QR traps.
๐ก๏ธ Scan before you open. Learn more: https://thehackernews.com/2025/03/top-3-ms-office-exploits-hackers-use-in.html
Hackers still use Word and Excel to deliver malwareโno macros, no clicks.
Top threats: Phishing docs, fake logins, QR traps.
๐ก๏ธ Scan before you open. Learn more: https://thehackernews.com/2025/03/top-3-ms-office-exploits-hackers-use-in.html
Forwarded from The Hacker News
๐จ Fake India Post site used to hack Windows & Android users!
APT36 (aka Transparent Tribe), linked to Pakistan, is behind a phishing siteโpostindia[.]siteโtargeting Indian citizens ๐ฎ๐ณ
๐ Details that matter โ https://thehackernews.com/2025/03/apt36-spoofs-india-post-website-to.html
๐ก Stay sharp, donโt click blind.
APT36 (aka Transparent Tribe), linked to Pakistan, is behind a phishing siteโpostindia[.]siteโtargeting Indian citizens ๐ฎ๐ณ
๐ Details that matter โ https://thehackernews.com/2025/03/apt36-spoofs-india-post-website-to.html
๐ก Stay sharp, donโt click blind.
Forwarded from The Hacker News
๐ Shadow SaaS is your biggest blind spotโand CASB canโt save you.
New report reveals why traditional CASB tools fail to detect or stop unsanctioned apps, identity leaks, and data exfiltration.
๐ 80% of SaaS use is shadow IT
โ ๏ธ API scanners canโt block live attacks
๐ง The fix? Security at the browser level
๐ Read the report: https://thehackernews.com/2025/03/new-report-explains-why-casb-solutions.html
New report reveals why traditional CASB tools fail to detect or stop unsanctioned apps, identity leaks, and data exfiltration.
๐ 80% of SaaS use is shadow IT
โ ๏ธ API scanners canโt block live attacks
๐ง The fix? Security at the browser level
๐ Read the report: https://thehackernews.com/2025/03/new-report-explains-why-casb-solutions.html