This content provides advice for those new to cyber security, highlighting the challenges and rewards of building a career in this field. The author shares personal experiences and encourages perseverance while emphasizing the importance of focusing on one’s o…
Category: Youtube
This content introduces a new pug puppy named Mochi to the audience, while acknowledging the recent loss of the previous pet, Moses. The speaker encourages viewers to check out the full story in a previous video. Mochi is hinted to make future appearances on t…
In conversations with external parties, it becomes evident that while the field of security is rapidly evolving with new technologies and exploits, many end users still struggle with fundamental security principles. This ongoing challenge highlights the necess…
Threat modeling research highlights the ineffectiveness of checklist approaches, which are often viewed as unhelpful and merely procedural. These checklists fail to offer actionable steps, resulting in a lack of meaningful engagement with security practices. A…
Hands-on training is essential for becoming a security analyst, penetration tester, or security engineer, allowing individuals to learn the tools hackers use to protect networks effectively. Try Hackme is highly recommended for practical experience, providing …
In this one-year anniversary episode of “Mixture of Experts,” hosts Tim Hwang, Kush Varshney, Shobhit Varshney, and Chris Hay reflect on significant advancements in AI over the past year, including Meta’s LlamaCon announcements and developments in AI governanc…
Foundation AI is a new initiative launched by Cisco aimed at developing open innovation in AI technology for security applications. This organization focuses on creating open-source models that enhance security measures and protect organizations in the AI supp…
The content is a lively pre-show discussion featuring members of Black Hills Information Security, including a presentation by Steve Borsch on innovative cybersecurity techniques, particularly focusing on using click-once applications for escalating access in …
The discussion centers on the role of the federal government in cyber security and the potential benefits of centralizing authority, specifically through the National Institute of Standards and Technology (NIST). It raises questions about the division of respo…
The RSAC Conference 2025 showcased key insights on cybersecurity challenges, with a focus on the evolving landscapes of AI and quantum technology. Multiple organizations presented innovative solutions, while the necessity for cyber resilience and proactive def…
The future of cyber security threats is expected to be dominated by increasingly sophisticated attacks from both nation-state and non-nation-state adversaries, fueled by cutting-edge technologies like AI and generative AI. The rapid advancement in these techno…
This content discusses the concept of lateral movement in cybersecurity, specifically in the context of penetration testing and exploiting vulnerabilities to move across machines. It covers various techniques, tools, and strategies to execute lateral movement …
The discussion centered around the misconceptions regarding which vulnerabilities receive Common Vulnerabilities and Exposures (CVEs) and the criteria for their inclusion. The presenter misrepresented the categorization process, notably underestimating the ran…
This content highlights the importance of auditing account management within systems, addressing issues like inactive or fraudulent accounts, and the necessity of strong password practices. It emphasizes the risks associated with poor identity management and u…
This content discusses whether someone can dox or launch a denial-of-service (DoS) attack against a web server by exposing its IP address. It explains the nature of loopback addresses and the impossibility of targeting these addresses externally. Affected: Ind…