Summary: The video discusses how Jun Le and Guang Jong, members of a South Korean vulnerability research team, successfully broke out of the guest environment in VMware and compromised the host kernel by exploiting various vulnerabilities. They present a detailed overview of their research, which wa…
Category: Youtube
The video discusses blockchain security, focusing on a specific bug found in Solana’s implementation. The speaker, Jooa, is a red teamer who delves into the intricacies of how blockchains, particularly Solana, operate. The discussion includes technical aspects of Solana’s architecture, the introduct…
Hey all! 😀 Flew all the way to Japan for this interview with @JoshMadakor, I promise it’s a funny AND educational one haha! You can find more of Josh here:
Josh’s YT: https://www.youtube.com/@JoshMadakor
Josh’s IG: https://www.instagram.com/joshmadakor
📕 Get My FREE Cybersecurity Beginner Roadmap Guide: https://www.withsandra.dev/
🖥️ Start the FREE IT Introduction Course with CourseCareers Now ($50 off Full Course) (Also taught by Josh!): https://coursecareers.com/a/WithSandracourse=it
💡 Technical Interview Prep Course: https://www.withcybersecurity.com/
📚 Google Cybersecurity Certificate: http://imp.i384100.net/k0R0rz
——————————————————
Brand/collaboration inquiries: [email protected]
Disclaimer: All opinions expressed in videos on this YouTube channel are solely my own. Some links are affiliate links, as an Amazon Influencer, I earn from qualifying purchases.
👯 Join our Discord 😀 – https://discord.gg/2YZUVbbpr9
Connect on LinkedIn: https://www.linkedin.com/in/withsandra/
Instagram: https://www.instagram.com/cyberwithsandra
Luca’s SWE Channel: https://www.youtube.com/c/TechwithLuca
❈ My Desk/Tech Stuff on Amazon ❈
https://www.amazon.com/shop/withlove.sandra
Top 5 Beginner Cybersecurity Projects: https://youtu.be/zc7LTa9q2nI
#cybersecurity #cybersecurityforbeginners #cybersecuritydayinthelife
——————————————————
Current sub count: 119,230
Tags: Is It Impossible to Get Into Cybersecurity Now as a Complete Beginner,cybersecurity interview,cybersecurity for beginners,cyber security for beginners,cyber security interview,is it too late to get into cybersecurity,how to get into cybersecurity with no experience, how to get into cybersecurity with zero experience,cybersecurity careers,beginner cybersecurity advice,beginner cybersecurity
Timestamps:
(0:00) How did Josh get into cybersecurity?
(1:54) Spilled the TEA working in cyber *-*
(2:31) Biggest difference maker for him when breaking into cyber?
(3:07) Whats the WORST Job You had in Cybersecurity?
(4:38) Do you think cybersecurity is still a good field to go into?
(5:34) Won’t AI Take Over All Cybersecurity Jobs?
(5:47) To current cyber students, what should they do to get hired?
(7:15) Sandra’s resume reviewing advice
(7:58) Do you actually like working in cybersecurity?
(9:33) What does Josh work on now? (After quitting his cyber 9-5)
(12:18) What’s it like being a Cybersecurity Youtuber?
(12:59) Final advice for the audience from Josh! 🙂
(13:57) BEST PART OF THE VIDEO, DONT SKIP
The 8th Annual Hacker-Powered Security Report just launched. How can you interpret it to make the case for your own human-powered security program, attract more security researchers to your programs, or incentivize more impactful vulnerability reports?
This webinar, featuring HackerOne customers and a leading member of our security researcher community, will answer that question.
Learn More: https://www.hackerone.com/events/report-results-hacker-powered-security-report
Get the guide to AI in customer service, learn more → https://ibm.biz/BdGFiG
Learn more about the technology → https://ibm.biz/BdGFin
Discover how AI is revolutionizing Customer Service, Customer Experience, and Customer Support. Join Amanda Downie as she explores how AI-powered solutions can enhance customer satisfaction, reduce costs, and increase productivity. From chatbots to predictive maintenance, AI is transforming the way businesses interact with customers.
AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM → https://ibm.biz/BdGFie
#ai #customerservice #customerexperience #customersupport
Protect your private keys with Dashlane! Get 50% off with code nwc50 ➡️ https://ntck.co/dashlanenwc50
I created my own cryptocurrency… but I didn’t stop there. I wanted to teach my kids how crypto works, so I had them create their own tokens using Solana. I explained everything—how the blockchain works, what makes crypto valuable, and how markets operate. Then, to take things up a notch, I created a cryptocurrency for their allowance—paying them in tokens when they do their chores. Forget cash… we’re building a family economy on the blockchain. Now it’s up to YOU to decide which coin is best—Addie’s or Chloe’s.
🪙 Vote for your favorite coin:
Addie’s Coin ➡️ https://explorer.solana.com/address/mntDkYeFWQ6GY9HM4Auiorx8PHLmzB4piGVj4CytZye
Chloe’s Coin ➡️ https://explorer.solana.com/address/mnt3QWpXmowA8e1iED7P7BvjJyj7xdMEEfurhLNDzQG
📃📃📃Guide/Documentation: https://blog.networkchuck.com/posts/create-a-solana-token/
🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy
**Sponsored by Dashlane
SUPPORT NETWORKCHUCK
—————————————————
➡️NetworkChuck membership: https://ntck.co/Premium
☕☕ COFFEE and MERCH: https://ntck.co/coffee
Check out my new channel: https://ntck.co/ncclips
🆘🆘NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck
STUDY WITH ME on Twitch: https://bit.ly/nc_twitch
READY TO LEARN??
—————————————————
-Learn Python: https://bit.ly/3rzZjzz
-Get your CCNA: https://bit.ly/nc-ccna
FOLLOW ME EVERYWHERE
—————————————————
Instagram: https://www.instagram.com/networkchuck/
Twitter: https://twitter.com/networkchuck
Facebook: https://www.facebook.com/NetworkChuck/
Join the Discord server: http://bit.ly/nc-discord
AFFILIATES & REFERRALS
—————————————————
(GEAR I USE…STUFF I RECOMMEND)
My network gear: https://geni.us/L6wyIUj
Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: https://geni.us/aBeqAL
Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!!
fast and reliable unifi in the cloud: https://hostifi.com/?via=chuck
“How to Create Your Own Cryptocurrency with Solana”
“My Kids Created Competing Cryptocurrencies… Which One Wins?”
“Paying My Kids Allowance in Crypto (Chores Just Got Serious)”
“Step-by-Step Solana Token Creation Tutorial”
“Family Crypto Showdown: You Pick the Winning Coin!”
“Build Your Own Token on Solana in Minutes”
“I Turned My Kids’ Chores into a Crypto Economy”
“DIY Guide: How to Create Your First Cryptocurrency”
“Teaching Kids Crypto with Their Own Tokens”
“How I Built a Family Economy Using Crypto Tokens”
“Solana Token Creation for Beginners”
“Paying Allowance with Crypto: A Parent’s Guide”
“Solana Tutorial: Create, Share, and Vote on Tokens”
“The Ultimate Crypto Family Challenge (Audience Votes!)”
“From Chores to Blockchain: Paying Kids in Crypto”
“Step-by-Step: Making a Solana Token for Fun and Learning”
“Who Can Build the Best Cryptocurrency? My Kids Compete!”
“Solana Tokens for Beginners: Your First Crypto Project”
“DIY Crypto Economy: How I Used Blockchain for My Family”
“My Kids Are Competing for Crypto Bragging Rights”
#Crypto #Solana #Blockchain
Check out the future of what detection and response looks like in the MITRE ATT&CK Evaluations for Enterprise Report here: https://www.paloaltonetworks.com/cortex/cortex-xdr/mitre?utm_campgn=-&utm_medium=social-organic-gtm&utm_source=influencer-global-x-port&utm_content=MITRE
LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍
📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training
💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io
💵 FREE $200 DigitalOcean Credit:
https://m.do.co/c/3236319b9d0b
🔗 LINKS:
📖 MY FAVORITE BOOKS:
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2
Hacking APIs: Breaking Web Application Programming Interfaces – https://amzn.to/45g4bOr
Black Hat GraphQL: Attacking Next Generation APIs – https://amzn.to/455F9l3
🍿 WATCH NEXT:
If I Started Bug Bounty Hunting in 2024, I’d Do this – https://youtu.be/z6O6McIDYhU
2023 How to Bug Bounty – https://youtu.be/FDeuOhE5MhU
Bug Bounty Hunting Full Time – https://youtu.be/watch?v=ukb79vAgRiY
Hacking An Online Casino – https://youtu.be/watch?v=2eIDxVrk4a8
WebApp Pentesting/Hacking Roadmap – https://youtu.be/watch?v=doFo0I_KU0o
MY OTHER SOCIALS:
🌍 My website – https://www.nahamsec.com/
👨💻 My free labs – https://app.hackinghub.io/
🐦 Twitter – https://twitter.com/NahamSec
📸 Instagram – https://instagram.com/NahamSec
👨💻 Linkedin – https://www.linkedin.com/in/nahamsec/
WHO AM I?
If we haven’t met before, hey 👋! I’m Ben, most people online know me online as NahamSec. I’m a hacker turned content creator. Through my videos on this channel, I share my experience as a top hacker and bug bounty hunter to help you become a better and more efficient hacker.
FYI: Some of the links I have in the description are affiliate links that I get a a percentage from.
This video series will walk you through how to create Windows shellcode! We’ll use nasm for our assembler and sclauncher for testing. We’ll discuss how to use the PEB (process environment block) to perform runtime-linking, how to create checksum values of module and API names to avoid strings, and the basics of using strings – both regular ASCII and stack strings. The series will end by discussing how to create a simple XOR based obfuscator and loader.
You’ll find all of the resources at:
https://www.thecyberyeti.com/training#windows-shellcode
Join this channel to get access to perks:
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA/join
This video will also cover prerequisite knowledge to help you get started!
Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
🎓 Courses on Pluralsight 👉🏻 https://www.pluralsight.com/authors/josh-stroschein
🌶️ YouTube 👉🏻 Like, Comment & Subscribe!
🙏🏻 Support my work 👉🏻 https://patreon.com/JoshStroschein
🌎 Follow me 👉🏻 https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
⚙️ Tinker with me on Github 👉🏻 https://github.com/jstrosch
🤝 Join the Discord community and more 👉🏻 https://www.thecyberyeti.com
Jarett Dunn, AKA StaccOverflow, stole millions of dollars from a website called Pump Fun, and he wanted to do it in the most dramatic and theatrical way he could. His big heist is known as the “Stacc Attack”.
https://x.com/STACCoverflow
He has a merch store now freestacc.io.
Visit https://darknetdiaries.com/episode/152/ for a list of sources, full transcripts, and to listen to all episodes.
Learn more about what IBM’s doing to make a positive impact in society → https://ibm.biz/BdGFs3
Explore the podcast → https://ibm.biz/BdGFsT
What if instead of focusing on productivity, we used AI technology to solve our most pressing, human problems like where to find medicine or how to avoid the collapse of the banking system in Ukraine? Listen to James Hodson, Co-Founder and CEO of AI for Good, talk about how AI technology can positively transform communities, but only if we provide the necessary infrastructure and education to get people on board.
Get weekly AI, cloud, security and sustainability industry news, events and insights → https://ibm.biz/BdGFsw
Hashtags: #AIinfrastrucure #AIskills #AIliteracy #AIproductivity #scalability #generativeAI #artificialintelligence #AIforGood #trustworthyAI #largelanguagemodel
Learn in-demand Machine Learning skills now → https://ibm.biz/IBM-ML-Coursera
Explore IBM watsonx → https://ibm.biz/BdGBb6
In this video, Chris provides a detailed and technical exploration of applying organizational domain data to the Large Language Model (LLM) lifecycle. We begin by explaining the stages involved in developing and deploying LLMs, including data collection, model training, evaluation, and deployment.
AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM → https://ibm.biz/BdGBb5
0:00 Some Guy Crashed 69% of Public Dogecoin Nodes
1:59 Operation PowerOFF
4:21 Hacking Thousands of Firewalls
6:59 Hacked with Russian Android Spyware
===============================================
My Website: https://www.seytonic.com/
Follow me on TWTR: https://twitter.com/seytonic
Follow me on INSTA: https://www.instagram.com/jhonti/
===============================================
The Stock Market Scam Fooling People With Fake Predictions
Listen to the full episode 🎙 Darknet Diaries Ep. 144: Rachel
#cybersecurity #podcast #stockmarket #crypto
Identifying files by file type is often the first step in performing triage analysis. Hashing can also provide a way to not only uniquely identify files, but also other portions of a file such as by section or imports. In this Malware Mondays, we’ll explore common file identification utilities such as file and magika, along with cryptographic hashing algorithms. We’ll also explore the use of Yara for generating and creating detections based on hashes.
You can find stream artifacts and other resources at:
https://www.thecyberyeti.com/malware-mondays