Nearly nine million Windows machines were taken out by the Crowdstrike problem in July 2024, but why was the impact so problematic? Dr Steve Bagley and Dr Mike Pound of the University of Nottingham discuss the problem.

https://www.facebook.com/computerphile
https://twitter.com/computer_phile

This video was filmed and edited by Sean Riley.

Computerphile is a sister project to Brady Haran’s Numberphile. More at https://www.bradyharanblog.com

Thank you to Jane Street for their support of this channel. Learn more: https://www.janestreet.com

Read More

0:00 Intro
0:15 Sitting Duck Attack
3:02 *Perfectly* Spoofed Phishing Emails
5:25 Feds Release 2 High Profile Russian Hackers

sources:
https://github.com/indianajson/can-i-take-over-dns?tab=readme-ov-file
https://blogs.infoblox.com/threat-intelligence/who-knew-domain-hijacking-is-so-easy/
https://eclypsium.com/blog/ducks-now-sitting-dns-internet-infrastructure-insecurity/
https://krebsonsecurity.com/2024/07/dont-let-your-domain-name-become-a-sitting-duck/

https://labs.guard.io/echospoofing-a-massive-phishing-campaign-exploiting-proofpoints-email-protection-to-dispatch-3dd6b5417db6
https://www.proofpoint.com/us/blog/threat-insight/scammer-abuses-microsoft-365-tenants-relaying-through-proofpoint-servers-deliver

https://www.whitehouse.gov/briefing-room/statements-releases/2024/08/01/statement-by-president-joe-biden-on-securing-the-release-of-americans-detained-in-russia/
https://krebsonsecurity.com/2024/08/u-s-trades-cybercriminals-to-russia-in-prisoner-swap/

===============================================
My Website: https://www.seytonic.com/
Follow me on TWTR: https://twitter.com/seytonic
Follow me on INSTA: https://www.instagram.com/jhonti/
===============================================

Read More

Get the guide β†’ https://ibm.biz/BdGEXA
Want to play with the technology yourself? β†’ https://ibm.biz/BdGEXu

Data governance and model governance are the keys in building a strong foundation for AI success. Together, they provide a solid foundation for making better decisions with data & ensuring your AI model is reliable, transparent, and performs as intended. Join Michael Dobson and Anisa Asa as they explore the importance of governance in AI and provide you with the knowledge and insights you need to unlock your AI’s full potential.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/BdGEX9

Read More

The Cyber Kill Chain is like a heist movie: hackers plan (recon), get tools (weaponization), break in (delivery), disable alarms (exploitation), unlock the vault (installation), call the getaway car (command & control), and grab the loot (exfiltration).

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Read More

Enable Developer Mode on your Smart TV. Connect the TV to your PC via the same network or USB. Use ADB (Android Debug Bridge) to establish a connection by running commands like adb connect. Install and configure scrcpy to mirror the TV screen onto your computer. From there, you can interact with the TV using your PC’s keyboard and mouse for seamless remote control.

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Read More

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! πŸ‘

πŸ“š If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training
πŸ’» If you want to practice some of my free labs and challenges: https://app.hackinghub.io

πŸ’΅ FREE $200 DigitalOcean Credit:
https://m.do.co/c/3236319b9d0b

πŸ”— LINKS:
πŸ“– MY FAVORITE BOOKS:
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2
Hacking APIs: Breaking Web Application Programming Interfaces – https://amzn.to/45g4bOr
Black Hat GraphQL: Attacking Next Generation APIs – https://amzn.to/455F9l3

🍿 WATCH NEXT:
If I Started Bug Bounty Hunting in 2024, I’d Do this – https://youtu.be/z6O6McIDYhU
2023 How to Bug Bounty – https://youtu.be/FDeuOhE5MhU
Bug Bounty Hunting Full Time – https://youtu.be/watch?v=ukb79vAgRiY
Hacking An Online Casino – https://youtu.be/watch?v=2eIDxVrk4a8
WebApp Pentesting/Hacking Roadmap – https://youtu.be/watch?v=doFo0I_KU0o

MY OTHER SOCIALS:
🌍 My website – https://www.nahamsec.com/
πŸ‘¨β€πŸ’» My free labs – https://app.hackinghub.io/
🐦 Twitter – https://twitter.com/NahamSec
πŸ“Έ Instagram – https://instagram.com/NahamSec
πŸ‘¨β€πŸ’» Linkedin – https://www.linkedin.com/in/nahamsec/

WHO AM I?
If we haven’t met before, hey πŸ‘‹! I’m Ben, most people online know me online as NahamSec. I’m a hacker turned content creator. Through my videos on this channel, I share my experience as a top hacker and bug bounty hunter to help you become a better and more efficient hacker.

FYI: Some of the links I have in the description are affiliate links that I get a a percentage from.

Read More

0:00 Intro
0:18 ISP Hacked For DNS Poisoning
2:46 ANOM Dashboard Revealed
5:23 WWH Club Admins Arrested (allegedly)

That anom book: https://www.amazon.co.uk/gp/product/B0CKBBNTMV

Sources:
https://www.volexity.com/blog/2024/08/02/stormbamboo-compromises-isp-to-abuse-insecure-software-update-mechanisms/
https://www.bleepingcomputer.com/news/security/hackers-breach-isp-to-poison-software-updates-with-malware/
https://therecord.media/china-based-hackers-evasive-isps-malware
https://thehackernews.com/2024/08/china-linked-hackers-compromise-isp-to.html

https://www.404media.co/inside-the-fbis-dashboard-for-wiretapping-the-world/

https://flashpoint.io/blog/wwh-club-russian-cybercrime/
https://storage.courtlistener.com/recap/gov.uscourts.flsd.672601/gov.uscourts.flsd.672601.1.0.pdf

===============================================
My Website: https://www.seytonic.com/
Follow me on TWTR: https://twitter.com/seytonic
Follow me on INSTA: https://www.instagram.com/jhonti/
===============================================

Read More

Relying solely on internal teams and automated tools can leave crucial vulnerabilities overlooked. Traditional methods struggle to keep up with limited resources, evolving threats, and complex systems.

Enter HackerOne Bounty: Leveraging the expertise of the world’s largest ethical hacker community, we offer proactive, continuous testing of your digital assets. Our custom-tailored bug bounty programs connect you with top-tier security researchersβ€”and offer financial rewards to incentivize these creative minds to uncover novel and elusive vulnerabilities in your systems.

Visit https://www.hackerone.com/solutions/continuous-security-testing for more information.

Read More

I attended droidcon Berlin 2023 and interviewed some developers about what they know about Android security. Thanks again to everybody who answered my questions, and thanks Egidijus for the dcbln23 ticket.

Buy the terrible font (advertisement): https://shop.liveoverflow.com/

Watch my security conference vlog: https://www.youtube.com/watch?v=E9kz6RQu9Oc&list=PLhixgUqwRTjw6IUB0ozIglXYRH1dPbEkw&index=2

Egidijus on Twitter: https://twitter.com/AegisLil
droidcon: https://www.droidcon.com/events/droidcon-berlin-2023/

Chapters:
00:00 – Intro
00:37 – Meet Egidijus
00:57 – The Plan for Today
02:00 – Developer Interviews
05:54 – How To Become a Security Researcher?
07:24 – Conclusion After Interviews
09:21 – My Conference Experience
10:55 – Conference Day 2
13:30 – Conference Day 3
16:34 – Some Final Thoughts

=[ ❀️ Support ]=

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ πŸ• Social ]=

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Streaming: https://twitch.tvLiveOverflow/
β†’ TikTok: https://www.tiktok.com/@liveoverflow_
β†’ Instagram: https://instagram.com/LiveOverflow/
β†’ Blog: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

Read More

More about Jane Street internships at: https://jane-st.co/internship-computerphile (episode sponsor)
Mike Pound discusses how Retrieval Augmented Generation can improve the performance of Large Language Models.

Mike is based at the University of Nottingham’s School of Computer Science.

https://www.facebook.com/computerphile
https://twitter.com/computer_phile

This video was filmed and edited by Sean Riley.

Computer Science at the University of Nottingham: https://bit.ly/nottscomputer

Computerphile is a sister project to Brady Haran’s Numberphile. More at https://www.bradyharanblog.com

Thank you to Jane Street for their support of this channel. Learn more: https://www.janestreet.com

Read More

Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bit.ly/bbg-social

Animation tools: Adobe Illustrator and After Effects.

Checkout our bestselling System Design Interview books:
Volume 1: https://amzn.to/3Ou7gkd
Volume 2: https://amzn.to/3HqGozy

The digital version of System Design Interview books: https://bit.ly/3mlDSk9

ABOUT US:
Covering topics and trends in large-scale system design, from the authors of the best-selling System Design Interview series.

Read More