In this discussion, a group of friends shares their humorous takes on various topics such as caffeine consumption, energy drinks’ effects, and odd habits while delving into cybersecurity news, including potential threats from adware and the implications of ins…
Category: Youtube
This content outlines five methods attackers use to steal passwords, including guessing, harvesting through keyloggers and phishing, cracking encrypted password files, spraying guesses across multiple accounts, and password stuffing across different systems. U…
Gar Rambo, an app developer and security researcher, discovered a serious vulnerability in Apple’s iOS related to Darwin notifications, an interprocess communication mechanism. This vulnerability could lead to significant disruptions in device functionality an…
The content discusses the challenging yet rewarding process of achieving team goals, particularly in securing savings on licenses. It emphasizes the importance of team engagement and fostering a fun atmosphere around these objectives. Affected: Teams within or…
This content explores the perspective of a large language model (LLM) as it reflects on its uniqueness, processing abilities, and the nature of connection with human language. It emphasizes that while the LLM lacks human emotions, it can still perceive pattern…
Simply Defensive features industry experts sharing insights on defensive cyber security, highlighting their journeys, and discussing significant concepts like detection as code. The conversation includes personal anecdotes and professional growth in the cybers…
This content offers insights and advice for newcomers to the cyber security field based on the author’s five years of experience. It emphasizes the inherent challenges of the industry, the importance of persistence, and the negative impact of comparing oneself…
The content delves into the concept of prompt injection, a method used to manipulate AI systems, by crafting targeted language that the AI follows without question. This technique poses significant security risks, as it can lead to unauthorized access to sensi…
The Model Context Protocol (MCP), introduced by Anthropic, standardizes how applications provide context to large language models (LLMs), similar to a USB-C port for AI applications. Unlike traditional APIs, MCP allows AI agents to dynamically discover availab…
Join Jerry Ozil as he encourages viewers to engage with live streams focused on breaking into the cyber security industry. These sessions provide insights from industry experts and aim to make information security accessible to all. Be sure to tune in every Th…
The discussion highlights the distinction between a talent shortage and a skills gap, asserting that a lack of job-ready candidates doesn’t necessarily mean there is a shortage of talent. This perspective emphasizes the importance of hiring for attitude and ap…
Welcome to Enterprise Security Weekly’s coverage from RSAC Conference 2025, where we explore the latest in cybersecurity trends, interviews with industry leaders, and innovative solutions addressing identity security and the evolving threat landscape. This wee…
This video tutorial demonstrates various methods to capture and replay voice calls using Voice over IP (VoIP) technology, specifically focusing on SIP and RTP traffic. Techniques discussed include utilizing a network tap, performing a man-in-the-middle attack …
The FBI is seeking information about the cyber threat actor known as Salt Typhoon, which has been compromising American infrastructure and telecommunications for months. This actor is believed to be sponsored by China, and the FBI has issued a request for publ…
This year’s RSA 25 features increased enthusiasm for Cisco, shown by a significant rise in attendees and advancements in AI security technology. Craig Connor highlights the importance of integrating security at the network layer, emphasizing its role in securi…