How Skrillex’s Skype Password Got Leaked
#cybersecurity #podcast #skrillex #edm
Listen to the full episode π Darknet Diaries Ep. 148: Dubsnatch
How Skrillex’s Skype Password Got Leaked
#cybersecurity #podcast #skrillex #edm
Listen to the full episode π Darknet Diaries Ep. 148: Dubsnatch
This Trojan is Stealing Identities Across the Web
Listen to the full episode π Darknet Diaries Ep. 111: ZeuS
#cybersecurity #podcast #malware
Learn how to use Arkime for network analysis and packet capture, whether for a home office or a large-scale enterprise deployment. The creator, Andy Wick, joins the stream to talk about the latest features and more!
β¬οΈ OPEN FOR LINKS TO ARTICLES TO LEARN MORE β¬οΈ
@endingwithali β
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev
Want to work with Ali? [email protected]
[β] Join the Patreonβ https://patreon.com/threatwire
0:00 0 – Intro
0:10 – Salt Typhoon Is In The Network
2:53 – US to Ban Data Brokers
4:34 – Maβ Bell to Nix Landlines
5:31 – Outro
LINKS
π Story 1: Salt Typhoon Is In The Network
https://www.bleepingscomputer.com/news/security/salt-typhoon-hackers-backdoor-telcos-with-new-ghostspider-malware/
https://www.bleepingcomputer.com/news/security/white-house-salt-typhoon-hacked-telcos-in-dozens-of-countries/
https://www.cybersecuritydive.com/news/tmobile-salt-typhoon-telecom-attack-campaign/734729/
https://www.mactech.com/2024/12/03/fbi-cisa-says-iphone-android-users-shouldnt-text-each-other/
https://www.cbc.ca/news/business/us-phone-hack-text-message-safety-1.7404286
https://arstechnica.com/tech-policy/2024/12/us-recommends-encrypted-messaging-as-chinese-hackers-linger-in-telecom-networks/
https://www.securityweek.com/white-house-says-at-least-8-us-telecom-firms-dozens-of-nations-impacted-by-china-hacking-campaign/
https://www.trendmicro.com/en_us/research/24/k/earth-estries.html
https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure
π Story 2: US to Ban Data Brokers
https://www.cysecurity.news/2024/12/cfpb-us-agency-proposes-rule-to-block.html
https://www.404media.co/u-s-government-tries-to-stop-data-brokers-that-help-dox-people-through-credit-data/
https://www.politico.com/news/2024/12/06/tiktok-ban-sale-judges-ruling-00193009
π Story 3: Maβ Bell to Nix Landlines
https://www.pcmag.com/news/att-to-retire-traditional-landlines-by-2029-except-in-this-state
—–β—–β—–β—–β—–β—–β—–β—–β—–β—–β
Our Site β https://www.hak5.org
Shop β http://hakshop.myshopify.com/
Community β https://www.hak5.org/community
Subscribe β https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support β https://www.patreon.com/threatwire
Contact Us β http://www.twitter.com/hak5
____________________________________________
Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community β where all hackers belong.
Learn more about artificial intelligence β https://ibm.biz/BdGDKA
Is o1 Pro worth the cost? In Episode 33 of Mixture of Experts, host Tim Hwang is joined by Marina Danilevsky, Kate Soule and Vyoma Gajjar. First, the experts debrief the 12 Days of OpenAI. Next, we review some of the top papers in NeurIPS, how are the experts keeping up with all these research papers? Then, we are back with another benchmark, can ARC Prize make AGI more tractable? Finally, Meta announced the launch of Llama 3.3 70B with the promise of 405B performance, can we have our cake and eat it too? Find out more on todayβs Mixture of Experts!
0:00 – Intro
0:27 – 12 Days of Open AI
14:35 – NeurIPS
21:50 – Arc Prize
30:20 – Llama 3.3 70B
The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.
Subscribe for AI updates β https://ibm.biz/BdGDKu
Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bit.ly/bbg-social
Animation tools: Adobe Illustrator and After Effects.
Checkout our bestselling System Design Interview books:
Volume 1: https://amzn.to/3Ou7gkd
Volume 2: https://amzn.to/3HqGozy
The digital version of System Design Interview books: https://bit.ly/3mlDSk9
ABOUT US:
Covering topics and trends in large-scale system design, from the authors of the best-selling System Design Interview series.
Did You Fall for This Fake Bank Email Scam?
Listen to the full episode π Darknet Diaries Ep. 111: ZeuS
#cybersecurity #podcast #phishing #scam
Hak5 — Cyber Security Education, Inspiration, News & Community since 2005:
—–β—–β—–β—–β—–β—–β—–β—–β—–β—–β
Our Site β https://www.hak5.org
Shop β http://hakshop.myshopify.com/
Community β https://www.hak5.org/community
Subscribe β https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support β https://www.patreon.com/threatwire
Contact Us β http://www.twitter.com/hak5
—–β—–β—–β—–β—–β—–β—–β—–β—–β—–β
____________________________________________
Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community β where all hackers belong.
Get the Data-Driven Guide β https://ibm.biz/BdGxhJ
Learn more about the technology β https://ibm.biz/BdGxhA
Understanding the tools behind customer experience can feel like an alphabet soup of acronyms, but they’re essential to delivering a great experience. Amanda Downie dives into the importance of data and the tools that drive customer experience such as Customer Relationship Management (CRM) & Enterprise Resource Planning (ERP). From inventory management to digital asset management, explore each tool and how it contributes to a seamless customer experience.
#customerexperience #data #datadriven #customersuccess
Path Tracing takes into account all sorts of indirect light sources to make graphics look real. Building on the previous videos on Ray Tracing, Lewis Stuart demonstrates how Path tracing samples indirect light to create these super scenes.
#graphics #computerscience #pathtracing
Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: https://jane-st.co/computerphile
This video was filmed and edited by Sean Riley.
Computerphile is a sister project to Brady Haran’s Numberphile. More at https://www.bradyharanblog.com
Unlock the secrets of creating a powerful hacking infrastructure with redirectors! This comprehensive tutorial is perfect for ethical hackers and cybersecurity enthusiasts looking to level up their skills. In this guide, youβll learn step-by-step how to design and set up a secure, efficient redirector system to anonymize and protect your penetration testing activities.
Whether you’re a beginner in ethical hacking or an experienced pro, this video has something for everyone. Weβll cover:
What redirectors are and why theyβre essential in cybersecurity.
A detailed guide to setting up redirectors for hacking infrastructure.
Pro tips to enhance your ethical hacking workflows.
FOLLOW ME
—————————————————
Patreon: https://patreon.com/Lsecqt
Twitter: https://twitter.com/lsecqt
Twitch: https://www.twitch.tv/lsecqt
Reddit: https://www.reddit.com/user/lsecqt
Medium: https://medium.com/@lsecqt
Support my Work: https://www.buymeacoffee.com/lsecqt
Red Teaming Army Discord Server: https://discord.gg/dWCe5ZMvtQ Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/
Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/
TIMESTAMPS
—————————————————
00:00 – Intro
00:28 – Basic Redirection
01:28 – External Redirection
03:54 – Internal Redirection
05:44 – Redirector Topology
07:55 – Redirector Demo
11:33 – SharpRedirect Source Code Review
14:05 – Outro
Get the AI Academy guidebook: Put AI to work for customer serviceΒ β https://ibm.biz/Bdaw7u
Learn About The Technology β https://ibm.biz/Bdaw7L
Customer Experience, Customer Service, and Customer Support are three distinct aspects of how businesses interact with customers. In this video, Amanda Downie explores the differences between these concepts and how they impact the customer journey. From pre-purchase to post-purchase, learn how businesses can provide a positive experience, deliver exceptional service, and offer effective support to customers, all while leveraging technology like AI.
AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β https://ibm.biz/Bdaw79
#customerjourney #ai #customerservice #customerexperience #customersupport
Welcome to part 5! In this video we’ll cover how to create custom rules for malware analysis!
Join this channel to get access to perks:
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA/join
Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
π Courses on Pluralsight ππ» https://www.pluralsight.com/authors/josh-stroschein
πΆοΈ YouTube ππ» Like, Comment & Subscribe!
ππ» Support my work ππ» https://patreon.com/JoshStroschein
π Follow me ππ» https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
βοΈ Tinker with me on Github ππ» https://github.com/jstrosch
π€ Join the Discord community and more ππ» https://www.thecyberyeti.com
The Malware That Could Be Draining Your Bank
Listen to the full episode π Darknet Diaries Ep. 111 ZeuS
#cybersecurity #podcast #malware
Introducing Amazon OpenSearch Service and Amazon Security Lake integration to simplify security analytics
// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join
// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/
// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD
// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.