// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Read More

Build your Hacker Dropbox with Twingate (it’s free): https://ntck.co/twingate_ztna

In this video, we’re building a Hacker Dropbox, a device that can be dropped into any network and give us remote access. This can pretty much be any device, including a Raspberry Pi…which is what I’ll be showing you. And no….it’s not using VPN, it’s ZTNA (Twingate) which is much more secure and easier to setup. Why do this? If you’re like me, you are by default the helpdesk support of every circle you’re in. I am that for my church, my parents, my grandma…and I need a very quick and easy way to remotely access these networks…even when I don’t know the subnet info. This is where the Hacker Drop box comes in handy, operating as a magic device for remote IT support. It also doubles as a penetration testing tool, giving pentesters easy access to a remote network in seconds.

RESOURCES:
📝GUIDE/WALKTHROUGH: https://ntck.co/hackerdropbox

💻 Raspberry Pi Imager: https://www.raspberrypi.com/software/

🛒 Buy a Raspberry Pi:
Raspberry Pi 4: https://geni.us/mzJF55
Raspberry Pi 5: https://geni.us/z0BVIc
📚 Exploring Twingate APIs: https://www.twingate.com/docs/exploring-the-apis
📖 Twingate Quick Start Tutorial: https://www.twingate.com/docs/quick-start

🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy

**Sponsored by Twingate

SUPPORT NETWORKCHUCK
—————————————————
➡️NetworkChuck membership: https://ntck.co/Premium
☕☕ COFFEE and MERCH: https://ntck.co/coffee

Check out my new channel: https://ntck.co/ncclips

🆘🆘NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch

READY TO LEARN??
—————————————————
-Learn Python: https://bit.ly/3rzZjzz
-Get your CCNA: https://bit.ly/nc-ccna

FOLLOW ME EVERYWHERE
—————————————————
Instagram: https://www.instagram.com/networkchuck/
Twitter: https://twitter.com/networkchuck
Facebook: https://www.facebook.com/NetworkChuck/
Join the Discord server: http://bit.ly/nc-discord

AFFILIATES & REFERRALS
—————————————————
(GEAR I USE…STUFF I RECOMMEND)
My network gear: https://geni.us/L6wyIUj
Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: https://geni.us/aBeqAL
Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!!
fast and reliable unifi in the cloud: https://hostifi.com/?via=chuck

How to Use a Raspberry Pi to Access Any Network
The Raspberry Pi Hack for Secure Network Access
Access Remote Networks with Twingate and Raspberry Pi
Set Up a Raspberry Pi for Secure Remote Access
Unlock Any Network Using Twingate and Raspberry Pi
Raspberry Pi + Twingate: The Perfect Network Hack
How to Find IP Addresses with a Raspberry Pi and Twingate
Hacking Networks Securely with Raspberry Pi and Python
Free Remote Access with Twingate and Raspberry Pi
Raspberry Pi Networking Secrets: Secure Remote Access
Create a Portable Network Access Device with Raspberry Pi
Twingate Makes Raspberry Pi Remote Access Easy
DIY Network Hacking Device with Raspberry Pi
Raspberry Pi Remote Access Hack Tutorial
Securely Access Your Network Anywhere with Raspberry Pi
Twingate and Raspberry Pi: Secure Network Entry
Build a Free Network Access Tool with Raspberry Pi
Raspberry Pi Hacks for Network Security and Access
Custom Python Script to Access Any Network Remotely
Why Twingate + Raspberry Pi Is a Game-Changer

#RaspberryPi #Twingate #NetworkAccess

Read More

Get 20% off DeleteMe US consumer plans when you go to https://joindeleteme.com/seytonic and use promo code SEYTONIC at checkout.
DeleteMe International Plans: https://international.joindeleteme.com/

0:00 Intro
0:32 Is Telegram Really a Criminal’s Paradise?
4:21 DeleteMe
5:36 Android Malware Swipes Your Credit Card’s NFC Data
8:20 Will TP-Link Be Banned?

Sources:
https://www.404media.co/how-telegrams-founder-pavel-durov-became-a-culture-war-martyr/
https://prestonbyrne.com/2024/08/24/thoughts-on-the-durov-arrest/?ref=404media.co

https://www.welivesecurity.com/en/eset-research/ngate-android-malware-relays-nfc-traffic-to-steal-cash/
https://www.policie.cz/clanek/pozor-podvodnici-vymysleli-novy-system.aspx

https://selectcommitteeontheccp.house.gov/sites/evo-subsites/selectcommitteeontheccp.house.gov/files/evo-media-document/2024-08-13%20Letter%20to%20Commerce%20re%20TP-Link%20(filed).pdf
===============================================
My Website: https://www.seytonic.com/
Follow me on TWTR: https://twitter.com/seytonic
Follow me on INSTA: https://www.instagram.com/jhonti/
===============================================

Read More

⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️

@endingwithali →
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev

Want to work with Ali? [email protected]

[❗] Join the Patreon→ https://patreon.com/threatwire
00:00 0 – Intro
00:12 1 – Take Downs of DDOS for Hire
01:39 2 – Microsoft LDAP At High Risk
02:48 3 – BADRAM fleeces AMD
05:04 4 – Outro

LINKS
🔗 Story 1: Take Downs of DDOS for Hire
https://www.europol.europa.eu/media-press/newsroom/news/law-enforcement-shuts-down-27-ddos-booters-ahead-of-annual-christmas-attacks
https://www.theregister.com/2024/12/12/operation_poweroff_ddos_takedowns/
🔗 Story 2: Microsoft LDAP At High Risk
https://www.securityweek.com/microsoft-ships-urgent-patch-for-exploited-windows-clfs-zero-day/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49112
🔗 Story 3: BADRAM fleeces AMD
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3015.html
https://badram.eu/badram.pdf
https://www.amd.com/en/developer/sev.html
https://www.securityweek.com/badram-attack-uses-10-equipment-to-break-amd-processor-protections/
—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Community → https://www.hak5.org/community
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
____________________________________________

Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Read More

Learn more about artificial intelligence → https://ibm.biz/BdGX3z

Is pre-training a thing of the past? In Episode 34 of Mixture of Experts, host Tim Hwang is joined by Abraham Daniels, Vagner Santana and Volkmar Uhlig to debrief this week in AI. First, OpenAI cofounder Ilya Sutskever said that “peak data” was achieved, does this mean there is no longer a need to model pre-training? Next, IBM released Granite 3.1 with a slew of features, we cover them all. Then, there is a new way to steal AI models, how do we protect against model exfiltration. Finally, can NVIDIA Jetson for AI developers really increase hardware accessibility? Tune-in for more!

Subscribe for AI updates → https://ibm.biz/BdGX3q

Segments:
00:01 — Intro
00:49— Is pre-training over?
10:25 — Granite 3.1
22:23 — AI model stealing
33:38—NVIDIA Jetson

The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.

Read More