Privacy + Secure Tech Corner Channel 🛡️
90 subscribers
6.66K photos
581 videos
543 files
16.2K links
Here you can find all about GSI's, ROM's, GKI Kernel's, Tech NEWS, Updates, Root methods, Magisk Module, Overlay's, Hacker things, FLOSS, FOSS, Privacy + Secure Stuff and many more!
Download Telegram
Forwarded from The Hacker News
🔥 CTEM is the new must-have for cybersecurity leaders.

Forget yearly audits. This is about always-on risk testing — and it’s working.

CTEM uses attack simulations, real-time testing & exposure tracking to stay ahead.

Why are top CISOs making the switch?

👉 Learn how it works: https://thehackernews.com/2025/05/why-ctem-is-winning-bet-for-cisos-in.html
Forwarded from The Hacker News
🛑 WARNING: Popular VMware tool RVTools was hacked to spread Bumblebee malware via its official site.

The site is now offline — but ⚠️ do not download from unofficial sources either.

Meanwhile, Procolored printer software was found carrying a Delphi backdoor and a $974K crypto clipper named SnipVex, which infects .exe files to hijack Bitcoin transactions.

🔎 Full details here: https://thehackernews.com/2025/05/rvtools-official-site-hacked-to-deliver.html
The OnePlus Pad 3 is launching in the U.S. and Canada on June 5!

This is a new flagship Android tablet that'll be powered by the Qualcomm Snapdragon 8 Elite. It'll come with an updated version of OxygenOS for tablets with an improved Open Canvas system for multitasking, a new app to remotely control Macs, and an easier drag-and-drop file sharing feature.

OnePlus says it will bundle two free accessories for early purchases in the U.S. Pick from the Smart Keyboard, Stylo 2, & Folio Case. It'll be sold in a Storm Blue color.
🔥The next Snapdragon Summit has been confirmed!

September 23-25 is when we'll see Qualcomm announce its latest chipsets. This is a bit earlier than usual, but it means we'll get the first Snapdragon 8 Elite 2 phones a bit earlier, too!

🔗 https://www.androidauthority.com/snapdragon-8-elite-gen-2-summit-launch-3558938/
Media is too big
VIEW IN TELEGRAM
⚡️Above DataSIM Demo
@takebackourtech

I showcase how easy it is to setup the Above DataSIM in real time and how to make calls using Cheogram.

Purchase Above DataSIM here: https://abovephone.com/datasim

Sign up FREE to watch more webinar clips here.


✌️ MORE POSTS | 🗯 CHAT GROUP | 📩 NEWSLETTER | XMPP
Follow 🫶 @takebackourtech
🙏 The Pains Of Self Hosting

One of my favorite self-hosted project management tools (Vikunja) just shifted from a self-hosted Git repository to Github (ew Microsoft!!! 🤮). They detail a lot of the issues they were facing, mainly a horde of internet zombie bots from AI companies and cybercriminals.

https://vikunja.io/changelog/moving-to-github/

We run dozens of internal self-hosted tool at Above (literally no third parties unless we can't run something ourselves) and ironically there's been a bit of struggle with Vikunja for our internal project management.

No, we're not overrun or brigaded by bots (thankfully none of our systems are public) but that sometimes sticking to your principles can make your progress slow. Its like playing on hard mode difficulty.

The developer of Vikunja (Kolante) does a really good job discussing the nuance of why you'd want to use a third party service instead of self-hosting everything.

I'm going to do everything in my power to stick to our principles and only host software on our own servers. This requires a ton of maintenance and upkeep - but its worth it. What do you think?


🫶 @takebackourtech
🎥 VIDEOS| 📩 NEWSLETTER | XMPP | SUBSTACK
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from cKure
■■■■■ Japan 🇯🇵 passes law to hack-back. This comes amid cyber attacks by state sponsored and other attacks non state actors.

Some other countries with similar laws:

USA: Computer Fraud and Abuse Act (18 U.S. Code § 1030) – prohibits unauthorized access and retaliation.

Switzerland: Swiss Criminal Code Article 143bis – criminalizes unauthorized data access.

Israel: Computer Law 1995, Section 5 – bans hacking unless explicitly authorized (e.g., military, Mossad).

China: Cybersecurity Law of the PRC (Article 27) – restricts individuals from harming network systems.

Russia: Criminal Code Article 273 – forbids creation and use of malware unless by sanctioned state entities.

Iran: Computer Crimes Law 2009, Article 1 – prohibits unauthorized access and network intrusion.

Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations.

https://english.kyodonews.net/news/2025/05/c92993cc70e6-new-japan-law-allows-preemptive-defense-of-infrastructure-cyberattack.html

https://therecord.media/japan-enacts-new-law-allowing-offensive-cyber-operations

Earlier in 2022; they had intended to do so: https://therecord.media/japan-to-amend-laws-to-allow-for-offensive-cyber-operations-against-foreign-hackers
Please open Telegram to view this post
VIEW IN TELEGRAM
How to use

Go to https://tldw.tube or run locally (recommended)
Enter video URL
Go

Running locally is recommended because hosted version have strict rate limit, as it rely on residential proxy and OpenAI API which costs me money.