⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️

@endingwithali β†’
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev

Want to work with Ali? [email protected]

[❗] Join the Patreonβ†’ https://patreon.com/threatwire
0:00 0 – Intro
0:10 – Salt Typhoon Is In The Network
2:53 – US to Ban Data Brokers
4:34 – Ma’ Bell to Nix Landlines
5:31 – Outro

LINKS
πŸ”— Story 1: Salt Typhoon Is In The Network
https://www.bleepingscomputer.com/news/security/salt-typhoon-hackers-backdoor-telcos-with-new-ghostspider-malware/
https://www.bleepingcomputer.com/news/security/white-house-salt-typhoon-hacked-telcos-in-dozens-of-countries/
https://www.cybersecuritydive.com/news/tmobile-salt-typhoon-telecom-attack-campaign/734729/
https://www.mactech.com/2024/12/03/fbi-cisa-says-iphone-android-users-shouldnt-text-each-other/
https://www.cbc.ca/news/business/us-phone-hack-text-message-safety-1.7404286
https://arstechnica.com/tech-policy/2024/12/us-recommends-encrypted-messaging-as-chinese-hackers-linger-in-telecom-networks/
https://www.securityweek.com/white-house-says-at-least-8-us-telecom-firms-dozens-of-nations-impacted-by-china-hacking-campaign/
https://www.trendmicro.com/en_us/research/24/k/earth-estries.html
https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure
πŸ”— Story 2: US to Ban Data Brokers
https://www.cysecurity.news/2024/12/cfpb-us-agency-proposes-rule-to-block.html
https://www.404media.co/u-s-government-tries-to-stop-data-brokers-that-help-dox-people-through-credit-data/
https://www.politico.com/news/2024/12/06/tiktok-ban-sale-judges-ruling-00193009
πŸ”— Story 3: Ma’ Bell to Nix Landlines
https://www.pcmag.com/news/att-to-retire-traditional-landlines-by-2029-except-in-this-state
—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†
Our Site β†’ https://www.hak5.org
Shop β†’ http://hakshop.myshopify.com/
Community β†’ https://www.hak5.org/community
Subscribe β†’ https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support β†’ https://www.patreon.com/threatwire
Contact Us β†’ http://www.twitter.com/hak5
____________________________________________

Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Read More

Learn more about artificial intelligence β†’ https://ibm.biz/BdGDKA

Is o1 Pro worth the cost? In Episode 33 of Mixture of Experts, host Tim Hwang is joined by Marina Danilevsky, Kate Soule and Vyoma Gajjar. First, the experts debrief the 12 Days of OpenAI. Next, we review some of the top papers in NeurIPS, how are the experts keeping up with all these research papers? Then, we are back with another benchmark, can ARC Prize make AGI more tractable? Finally, Meta announced the launch of Llama 3.3 70B with the promise of 405B performance, can we have our cake and eat it too? Find out more on today’s Mixture of Experts!

0:00 – Intro
0:27 – 12 Days of Open AI
14:35 – NeurIPS
21:50 – Arc Prize
30:20 – Llama 3.3 70B

The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.

Subscribe for AI updates β†’ https://ibm.biz/BdGDKu

Read More

Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bit.ly/bbg-social

Animation tools: Adobe Illustrator and After Effects.

Checkout our bestselling System Design Interview books:
Volume 1: https://amzn.to/3Ou7gkd
Volume 2: https://amzn.to/3HqGozy

The digital version of System Design Interview books: https://bit.ly/3mlDSk9

ABOUT US:
Covering topics and trends in large-scale system design, from the authors of the best-selling System Design Interview series.

Read More

Hak5 — Cyber Security Education, Inspiration, News & Community since 2005:

—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†
Our Site β†’ https://www.hak5.org
Shop β†’ http://hakshop.myshopify.com/
Community β†’ https://www.hak5.org/community
Subscribe β†’ https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support β†’ https://www.patreon.com/threatwire
Contact Us β†’ http://www.twitter.com/hak5
—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†

____________________________________________
Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Read More

Get the Data-Driven Guide β†’ https://ibm.biz/BdGxhJ
Learn more about the technology β†’ https://ibm.biz/BdGxhA

Understanding the tools behind customer experience can feel like an alphabet soup of acronyms, but they’re essential to delivering a great experience. Amanda Downie dives into the importance of data and the tools that drive customer experience such as Customer Relationship Management (CRM) & Enterprise Resource Planning (ERP). From inventory management to digital asset management, explore each tool and how it contributes to a seamless customer experience.

#customerexperience #data #datadriven #customersuccess

Read More

Path Tracing takes into account all sorts of indirect light sources to make graphics look real. Building on the previous videos on Ray Tracing, Lewis Stuart demonstrates how Path tracing samples indirect light to create these super scenes.
#graphics #computerscience #pathtracing

Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: https://jane-st.co/computerphile

This video was filmed and edited by Sean Riley.

Computerphile is a sister project to Brady Haran’s Numberphile. More at https://www.bradyharanblog.com

Read More

Unlock the secrets of creating a powerful hacking infrastructure with redirectors! This comprehensive tutorial is perfect for ethical hackers and cybersecurity enthusiasts looking to level up their skills. In this guide, you’ll learn step-by-step how to design and set up a secure, efficient redirector system to anonymize and protect your penetration testing activities.

Whether you’re a beginner in ethical hacking or an experienced pro, this video has something for everyone. We’ll cover:

What redirectors are and why they’re essential in cybersecurity.
A detailed guide to setting up redirectors for hacking infrastructure.
Pro tips to enhance your ethical hacking workflows.

FOLLOW ME
—————————————————
Patreon: https://patreon.com/Lsecqt
Twitter: https://twitter.com/lsecqt
Twitch: https://www.twitch.tv/lsecqt
Reddit: https://www.reddit.com/user/lsecqt
Medium: https://medium.com/@lsecqt
Support my Work: https://www.buymeacoffee.com/lsecqt
Red Teaming Army Discord Server: https://discord.gg/dWCe5ZMvtQ Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/
Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/

TIMESTAMPS
—————————————————
00:00 – Intro
00:28 – Basic Redirection
01:28 – External Redirection
03:54 – Internal Redirection
05:44 – Redirector Topology
07:55 – Redirector Demo
11:33 – SharpRedirect Source Code Review
14:05 – Outro

Read More

Get the AI Academy guidebook: Put AI to work for customer serviceΒ β†’ https://ibm.biz/Bdaw7u
Learn About The Technology β†’ https://ibm.biz/Bdaw7L

Customer Experience, Customer Service, and Customer Support are three distinct aspects of how businesses interact with customers. In this video, Amanda Downie explores the differences between these concepts and how they impact the customer journey. From pre-purchase to post-purchase, learn how businesses can provide a positive experience, deliver exceptional service, and offer effective support to customers, all while leveraging technology like AI.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/Bdaw79
#customerjourney #ai #customerservice #customerexperience #customersupport

Read More

Welcome to part 5! In this video we’ll cover how to create custom rules for malware analysis!

Join this channel to get access to perks:
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA/join

Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
πŸŽ“ Courses on Pluralsight πŸ‘‰πŸ» https://www.pluralsight.com/authors/josh-stroschein
🌢️ YouTube πŸ‘‰πŸ» Like, Comment & Subscribe!
πŸ™πŸ» Support my work πŸ‘‰πŸ» https://patreon.com/JoshStroschein
🌎 Follow me πŸ‘‰πŸ» https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
βš™οΈ Tinker with me on Github πŸ‘‰πŸ» https://github.com/jstrosch
🀝 Join the Discord community and more πŸ‘‰πŸ» https://www.thecyberyeti.com

Read More

Introducing Amazon OpenSearch Service and Amazon Security Lake integration to simplify security analytics

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Read More