Download the AI model guide to learn more β†’ https://ibm.biz/BdGE4R

The world of AI is changing and changing quickly. Martin Keen, Master Inventor is here to help set some expectations for what in AI in 2025. Will Large Language Models (LLM) get bigger? Smaller? Both? What’s in store of AI Agents? Will AI finally be able to remember everything? All of this and more speculation of what 2025 will hold in store.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/BdGE4F

Read More

Thank you to the University of Phoenix for sponsoring a portion of this video. Any other brands, links, or advice shared are of my own opinion and not that of UOPX. Check out University of Phoenix’s cybersecurity degree programs and certificates here: https://bit.ly/41K9vtx

#Ad #uopx #universityofphoenix @universityofphoenix

University of Phoenix Skills Article: https://www.phoenix.edu/blog/cybersecurity-skills-for-professionals.html

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
πŸ“• Get My FREE Cybersecurity Beginner Roadmap Guide: https://www.withsandra.dev/

Brand/collaboration inquiries: [email protected]

Disclaimer: All opinions expressed in videos on this YouTube channel are solely my own.
πŸ‘― Join our Discord πŸ˜€ – https://discord.gg/2YZUVbbpr9

Connect on LinkedIn: https://www.linkedin.com/in/withsandra/

Instagram: https://www.instagram.com/cyberwithsandra

Top 5 Beginner Cybersecurity Projects: https://youtu.be/zc7LTa9q2nI
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”
Current sub count: 119,600
Tags: what skills to have when starting your career in cybersecurity,cybersecurity for beginners,cyber security for beginners,what skills to have when starting your career in cyber security,beginner cybersecurity skills,beginner cyber security skills,cybersecurity skills,cyber security skills,beginner cybersecurity jobs,cybersecurity beginner skills,cybersecurity jobs,beginner cyber security jobs,skills to learn for cybersecurity,skills to learn for cyber security

Read More

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! πŸ‘

πŸ“š If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training
πŸ’» If you want to practice some of my free labs and challenges: https://app.hackinghub.io

πŸ’΅ FREE $200 DigitalOcean Credit:
https://m.do.co/c/3236319b9d0b

πŸ”— LINKS:
πŸ“– MY FAVORITE BOOKS:
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2
Hacking APIs: Breaking Web Application Programming Interfaces – https://amzn.to/45g4bOr
Black Hat GraphQL: Attacking Next Generation APIs – https://amzn.to/455F9l3

🍿 WATCH NEXT:
If I Started Bug Bounty Hunting in 2024, I’d Do this – https://youtu.be/z6O6McIDYhU
2023 How to Bug Bounty – https://youtu.be/FDeuOhE5MhU
Bug Bounty Hunting Full Time – https://youtu.be/watch?v=ukb79vAgRiY
Hacking An Online Casino – https://youtu.be/watch?v=2eIDxVrk4a8
WebApp Pentesting/Hacking Roadmap – https://youtu.be/watch?v=doFo0I_KU0o

MY OTHER SOCIALS:
🌍 My website – https://www.nahamsec.com/
πŸ‘¨β€πŸ’» My free labs – https://app.hackinghub.io/
🐦 Twitter – https://twitter.com/NahamSec
πŸ“Έ Instagram – https://instagram.com/NahamSec
πŸ‘¨β€πŸ’» Linkedin – https://www.linkedin.com/in/nahamsec/

WHO AM I?
If we haven’t met before, hey πŸ‘‹! I’m Ben, most people online know me online as NahamSec. I’m a hacker turned content creator. Through my videos on this channel, I share my experience as a top hacker and bug bounty hunter to help you become a better and more efficient hacker.

FYI: Some of the links I have in the description are affiliate links that I get a a percentage from.

Read More

0:00 Intro
0:25 The FBI’s Data Deletion Fail is Embarrassing
3:11 UK Shuts Down Popular Call Spoofing Platform
5:54 Dude Hacks the Gov and fakes his own Death to Avoid Child support

Sources:
https://oig.justice.gov/sites/default/files/reports/24-093.pdf

https://www.404media.co/buy-fraud-phone-russiancoms-robocalls/
https://x.com/NCA_UK/status/1819018186454356287

https://www.govinfo.gov/content/pkg/USCOURTS-kyed-6_23-cr-00060/pdf/USCOURTS-kyed-6_23-cr-00060-0.pdf https://www.justice.gov/d9/2023-11/Kipf%20Indictment.pdf
https://pulaskiky.mugshots.zone/kipf-jesse-evan-mugshot-07-13-2023/
https://www.justice.gov/usao-edky/pr/pulaski-county-man-sentenced-cyber-intrusion-and-aggravated-identity-theft
===============================================
My Website: https://www.seytonic.com/
Follow me on TWTR: https://twitter.com/seytonic
Follow me on INSTA: https://www.instagram.com/jhonti/
===============================================

Read More

How did Tavis Ormandy fuzz CPUs to discover Zenbleed? In this video we learn about the techniques to make this work!

Watch part 2: https://www.youtube.com/watch?v=9EY_9KtxyPg

buy my font (advertisement): https://shop.liveoverflow.com/

This video is sponsored by Google: https://security.googleblog.com/2023/08/downfall-and-zenbleed-googlers-helping.html

Original Zenbleed Writeup: https://lock.cmpxchg8b.com/zenbleed.html

AMD Security Bulletin: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html
Tavis Ormandy: https://twitter.com/taviso
Sudoedit Exploit Series: https://www.youtube.com/playlist?list=PLhixgUqwRTjy0gMuT4C3bmjeZjuNQyqdx
Documented Intel Performance Counters: https://perfmon-events.intel.com/skylake_server.html
RIDL Video: https://www.youtube.com/watch?v=x_R1DeZxGc0

Chapters:
00:00 – Intro
01:22 – Zenbleed Proof of Concept
03:06 – Tavis Ormandy
04:18 – How Fuzzing Works
06:31 – CPU Performance Counters
11:06 – Detect Bugs with “Oracle Serialization”
15:09 – Fuzzing and Discovering Zenbleed
18:46 – Outro

=[ ❀️ Support ]=

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ πŸ• Social ]=

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Streaming: https://twitch.tvLiveOverflow/
β†’ TikTok: https://www.tiktok.com/@liveoverflow_
β†’ Instagram: https://instagram.com/LiveOverflow/
β†’ Blog: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

Read More

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! πŸ‘

πŸ“š If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training
πŸ’» If you want to practice some of my free labs and challenges: https://app.hackinghub.io

πŸ’΅ FREE $200 DigitalOcean Credit:
https://m.do.co/c/3236319b9d0b

πŸ”— LINKS:
πŸ“– MY FAVORITE BOOKS:
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2
Hacking APIs: Breaking Web Application Programming Interfaces – https://amzn.to/45g4bOr
Black Hat GraphQL: Attacking Next Generation APIs – https://amzn.to/455F9l3

🍿 WATCH NEXT:
If I Started Bug Bounty Hunting in 2024, I’d Do this – https://youtu.be/z6O6McIDYhU
2023 How to Bug Bounty – https://youtu.be/FDeuOhE5MhU
Bug Bounty Hunting Full Time – https://youtu.be/watch?v=ukb79vAgRiY
Hacking An Online Casino – https://youtu.be/watch?v=2eIDxVrk4a8
WebApp Pentesting/Hacking Roadmap – https://youtu.be/watch?v=doFo0I_KU0o

MY OTHER SOCIALS:
🌍 My website – https://www.nahamsec.com/
πŸ‘¨β€πŸ’» My free labs – https://app.hackinghub.io/
🐦 Twitter – https://twitter.com/NahamSec
πŸ“Έ Instagram – https://instagram.com/NahamSec
πŸ‘¨β€πŸ’» Linkedin – https://www.linkedin.com/in/nahamsec/

WHO AM I?
If we haven’t met before, hey πŸ‘‹! I’m Ben, most people online know me online as NahamSec. I’m a hacker turned content creator. Through my videos on this channel, I share my experience as a top hacker and bug bounty hunter to help you become a better and more efficient hacker.

FYI: Some of the links I have in the description are affiliate links that I get a a percentage from.

Read More

Get 20% off DeleteMe US consumer plans when you go to https://joindeleteme.com/seytonic and use promo code SEYTONIC at checkout.
DeleteMe International Plans: https://international.joindeleteme.com/

0:00 Trump’s Government Will (probably) Ban TP-Link Routers
3:12 DeleteMe (ad)
4:18 Cellular Infrastructure (still) sucks
6:44 Ledger Phishing Campaign

Sources:
https://selectcommitteeontheccp.house.gov/sites/evo-subsites/selectcommitteeontheccp.house.gov/files/evo-media-document/2024-08-13%20Letter%20to%20Commerce%20re%20TP-Link%20(filed).pdf
https://www.microsoft.com/en-us/security/blog/2024/10/31/chinese-threat-actor-storm-0940-uses-credentials-from-password-spray-attacks-from-a-covert-network/
https://www.wsj.com/politics/national-security/us-ban-china-router-tp-link-systems-7d7507e6

https://www.404media.co/dhs-says-china-russia-iran-and-israel-are-spying-on-people-in-us-with-ss7/
https://www.wyden.senate.gov/imo/media/doc/wyden-schmitt_dod_letter.pdf
https://www.404media.co/cyber-official-speaks-out-reveals-mobile-network-attacks-in-u-s/
https://www.youtube.com/watch?v=wVyu7NB7W6Y

https://x.com/0xRacist/status/1868612786080882724
https://www.bleepingcomputer.com/news/security/new-fake-ledger-data-breach-emails-try-to-steal-crypto-wallets/

===============================================
My Website: https://www.seytonic.com/
Follow me on TWTR: https://twitter.com/seytonic
Follow me on INSTA: https://www.instagram.com/jhonti/
===============================================

Read More

Don’t leave your organization’s security to chance. The HackerOne Platform combines the power of ethical hackers with cutting-edge automation to protect your digital assets. Our comprehensive suite of preemptive solutions covers every aspect of your security strategy.

Learn more here: https://www.hackerone.com/product/overview

Read More

Join Hak5 host Darren Kitchen and Ali Diamond as we celebrate and reward the most creative payload contributions from our community in 2023 and 2024!
____________________________________________
Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Read More

Citizenlab discovered BLASTPASS, a 0day being actively exploited in the image format WebP. Known as CVE-2023-4863 and CVE-2023-41064, an issue in webp’s build huffman table function can lead to a heap buffer overflow. This vulnerability is very interesting and I’m excited to share with you what I learned.

Want to learn hacking? Signup to https://hextree.io (ad)
Buy my shitty font: https://shop.liveoverflow.com/ (ad)

WebP Fix Commit: https://chromium.googlesource.com/webm/libwebp/+/902bc9190331343b2017211debcec8d2ab87e17a
Citizenlab: https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/
Ben Hawkes: https://blog.isosceles.com/the-webp-0day/

Software Updates
Apple https://support.apple.com/en-gb/106361
Chrome https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html
Firefox https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/
Android https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/
Whose CVE is it Anyway? https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/

References:
2014 bug introduction https://github.com/webmproject/libwebp/commit/f75dfbf23d1df1be52350b1a6fc5cfa6c2194499
https://www.youtube.com/watch?v=JsTptu56GM8
https://www.youtube.com/watch?v=B3y0RsVCyrw
https://www.youtube.com/watch?v=EFUYNoFRHQI
https://www.youtube.com/watch?v=iEm1NRyEe5c
https://stackoverflow.com/questions/13804629/huffman-code-with-lookup-table
https://web.archive.org/web/20230204211844/https://commandlinefanatic.com/cgi-bin/showarticle.cgi?article=art007
enough.c https://github.com/madler/zlib/blob/develop/examples/enough.c

Thanks to:
https://twitter.com/mistymntncop
https://twitter.com/benhawkes

Chapters:
00:00 – Intro to CVE-2023-4863
01:32 – Most Valuable Vulnerability?
03:02 – Heap Overflow Related to Huffman Trees
03:58 – Learning about Huffman Codes
06:24 – What are Huffman Tables?
10:24 – Hardcoded Table Sizes (enough.c)
12:21 – Code Walkthrough – BuildHuffmanTable()
13:04 – The code_lengths[] and count[] Arrays
15:14 – Difference Between Compression and Decompression!
17:04 – Outro

=[ ❀️ Support ]=

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ πŸ• Social ]=

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Streaming: https://twitch.tvLiveOverflow/
β†’ TikTok: https://www.tiktok.com/@liveoverflow_
β†’ Instagram: https://instagram.com/LiveOverflow/
β†’ Blog: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

Read More

The XZ Exploit was an incredible near miss. Dr Richard G Clegg of Queen Mary University London explains how a seemingly helpful contributor hid some code in part of a ubiquitous piece of software.

Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: https://jane-st.co/computerphile

This video was filmed and edited by Sean Riley.

Computerphile is a sister project to Brady Haran’s Numberphile. More at https://www.bradyharanblog.com

Read More