Best way to Tap a Network? (Tier List)

This video discusses various methods for capturing network traffic, highlighting the advantages and disadvantages of each approach, from hubs to high-performance taps. The experts emphasize that while simple solutions like hubs can work in specific scenarios, professional-grade taps provide the most accurate and reliable data for network analysis. #PacketCaptures #NetworkMonitoring #Taps #SwitchSpanning

Read More
Coinbase said lol, lmao even #cryptocurrency #technews #cybersecurity #ransomware @endingwithali

Coinbase disclosed a data breach on May 11th, 2025, where threat actors accessed limited user information by paying contractors outside the U.S. They responded by tightening security, warning affected customers, and offering a $20 million reward for information leading to the arrest of the attackers. The company emphasized that private keys and login credentials remained secure and stressed transparency about the incident. #Coinbase #DataBreach

Read More
Sliver C2 Tutorial – Exploring The Hacker’s Armory

This transcript is a detailed walkthrough of using the Sliver C2 framework for red teaming, focusing on network setup, payload creation, and command execution. The speaker demonstrates setting up a complex virtual environment, generating various payloads with profiles, and executing assemblies and lateral movement techniques. #SliverFramework #CallbackSessions #MTLS #PowerShellEvasion #C2Profiles

Read More
CISA attempts to stop providing advisories #technews #cybersecurity #ransomware @endingwithali

In May 2025, CISA initially announced a shift to social media-first dissemination for cybersecurity alerts, aiming to highlight urgent threats but faced community pushback due to trust and security concerns. Following the backlash, CISA reverted to more traditional communication methods, emphasizing the importance of verified official channels over social media. #CISA #CyberThreats

Read More
Learn Quantum Computing!

This live stream features an in-depth discussion on quantum computing, cryptography, and their implications for cybersecurity, with a focus on practical demos and educational challenges. Ellie, a software engineer with expertise in cryptography and quantum technology, showcases quantum programming using IBM’s tools and discusses the future of quantum-resistant cryptography and AI integration. #QuantumComputing #PostQuantumCryptography

Read More
Keyboards, 3am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland… – SWN #479

This episode of Security Weekly covers recent advances in cyber threats, including sophisticated targeted attacks at 3:00 a.m., the evolution of ransomware tactics, and the rise of AI-driven exploits like prompt injection vulnerabilities in GitLab. It also discusses takedown efforts against Lumac C2 malware infrastructure, nation-state activities targeting city systems, and the risks posed by unprotected industrial control systems and AI tools. #Lumac #FancyBear

Read More