⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️

@endingwithali β†’
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev

Want to work with Ali? [email protected]

[❗] Join the Patreonβ†’ https://patreon.com/threatwire
00:00 0 – Intro
00:08 1 – First Bootkit for Linux Discovered
02:19 2 – Valorant 100k Bounty
03:26 3 – Pokemon GO used to Map the World
04:42 4 – Outro

LINKS
πŸ”— Story 1: First Bootkit for Linux Discovered
https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/
πŸ”— Story 2: Valorant 100k Bounty
https://hackerone.com/riot?type=team
https://www.si.com/esports/news/riot-games-offers-100k-bounty-to-hackers
https://www.pcgamer.com/games/fps/riot-is-flexing-its-anticheat-vanguard-by-placing-a-bounty-of-up-to-usd100-000-for-anyone-brilliant-enough-to-find-and-report-gaps-in-the-system/
πŸ”— Story 3: Pokemon GO used to Map the World
https://nianticlabs.com/news/largegeospatialmodel
https://www.livescience.com/technology/artificial-intelligence/gotta-catch-em-all-how-pokemon-go-covertly-captured-your-data-for-years-to-train-a-massive-ai-model
—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†
Our Site β†’ https://www.hak5.org
Shop β†’ http://hakshop.myshopify.com/
Community β†’ https://www.hak5.org/community
Subscribe β†’ https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support β†’ https://www.patreon.com/threatwire
Contact Us β†’ http://www.twitter.com/hak5
____________________________________________

Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Read More

Learn more about artificial intelligence β†’ https://ibm.biz/BdGcTP

What’s the mystery behind the name ChatGPT refuses to discuss? In Episode 32 of Mixture of Experts host Tim Hwang dives into the hottest topics shaping the AI landscape with an all-star panel: Aaron Baughman, Vagner Figueredo de Santana, and Shobhit Varshney. First, they disect the biggest announcements and takeaways from AWS re:Invent 2024, Amazon’s premier AI event. Next, they talk about overcoming architectural vulnerabilities in AI systems, and finally they uncover the curious case of a name ChatGPT won’t discussβ€”and the questions this raises about privacy and transparency in AI. Get ready for an episode packed with insights, debates, and forward-thinking perspectives!

0:00 – Intro
1:01 – AWS re:invent 2024
13:57 – LLM Flowbreaking
28:20 – David Mayer

The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.

Subscribe for AI updates β†’ https://ibm.biz/BdGcTy

Read More

In part 08, we’ll look at how Lockbit uses the Windows API ZwSetInformationThread to detach any debuggers, allowing it to continue running without interruption. We’ll also discuss how to patch the binary in memory using x64dbg.

Join this channel to get access to perks:
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA/join

Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
πŸŽ“ Courses on Pluralsight πŸ‘‰πŸ» https://www.pluralsight.com/authors/josh-stroschein
🌢️ YouTube πŸ‘‰πŸ» Like, Comment & Subscribe!
πŸ™πŸ» Support my work πŸ‘‰πŸ» https://patreon.com/JoshStroschein
🌎 Follow me πŸ‘‰πŸ» https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
βš™οΈ Tinker with me on Github πŸ‘‰πŸ» https://github.com/jstrosch
🀝 Join the Discord community and more πŸ‘‰πŸ» https://www.thecyberyeti.com

0:48 Identifying the first anti-analysis function
2:25 Using x64dbg to understand what function is being called
3:30 Jumping on trampolines
4:04 We’re not lost, just doing some research
5:40 Updating our IDB
7:05 NOPing out bytes in x64dbg

Read More

Download the AI model guide to learn moreΒ β†’Β https://ibm.biz/Bdaw7r
Learn more about the technologyΒ β†’ https://ibm.biz/Bdaw7i

Want to get more out of your language models? Follow Cedric Clyburn as he shows how to fine-tune large language models using InstructLab, an open-source tool that can help you customize and specialize them for specific tasks. By fine-tuning your language models, you’ll be able to tackle complex tasks with ease, automate repetitive work, and unlock new insights that help you solve real-world problems and achieve your goals.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/Bdaw7j
#finetuning #largelanguagemodels #ai

Read More

As quantum devices become more accessible, there’s a whole area of software engineering opening up. Mohammad Mousavi specialises in software engineering for quantum computing.

Mohammad Reza Mousavi is a professor of Software Engineering at King’s College London & one of the centre directors at King’s Quantum.

Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: https://jane-st.co/computerphile

This video was filmed and edited by Sean Riley.

Computerphile is a sister project to Brady Haran’s Numberphile. More at https://www.bradyharanblog.com

Read More

Read the X-Force Threat Intelligence IndexΒ β†’ https://ibm.biz/Bda9aw
Learn more about the technology β†’ https://ibm.biz/Bda9GB

The dark web is a mysterious and often misunderstood part of the internet, shrouded in secrecy and intrigue. Join Jeff Crume as he explores what the dark web is, how it works, and what kinds of content you can find there. From whistleblowers and journalists to marketplaces and hackers, Jeff covers it all. But be warned: the dark web is not for the faint of heart, and it’s not without its risks. So, if you’re curious about the dark side of the internet, keep watching.

Read the Cost of a Data Breach report β†’ https://ibm.biz/Bda9GF
#darkweb #cybersecurity #security

Read More

Welcome to part 2! In this video, we’ll walk through how to manually update Suricata’s rule set using Emerging Threats Open. While Suricata typically ships with a rule manager, it is missing in the Windows distribution. These rules can serve as a foundation for detecting malicious and anomalous patterns in network traffic and are typically a great place to start.

Join this channel to get access to perks:
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA/join

Part 03 will introduce a batch script to process PCAPs and grep out alert data.

Part 04 will cover generating PCAPs from network emulation using FAKENET-NG.

Part 05 Will introduce the basics of how you can create custom rules.

Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
πŸŽ“ Courses on Pluralsight πŸ‘‰πŸ» https://www.pluralsight.com/authors/josh-stroschein
🌢️ YouTube πŸ‘‰πŸ» Like, Comment & Subscribe!
πŸ™πŸ» Support my work πŸ‘‰πŸ» https://patreon.com/JoshStroschein
🌎 Follow me πŸ‘‰πŸ» https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
βš™οΈ Tinker with me on Github πŸ‘‰πŸ» https://github.com/jstrosch
🀝 Join the Discord community and more πŸ‘‰πŸ» https://www.thecyberyeti.com

Read More

Download the guide to learn moreΒ β†’ https://ibm.biz/BdawDw

Learn more about AI solutionsΒ β†’ https://ibm.biz/BdawDk

Ever wondered how AI can make business intelligence (BI) more precise and consistent? In this video, Hosam will show how combining a semantic layer with large language models (LLMs) enables automated SQL generation, enriched data insights, and clear summarization of results. Perfect for developers looking to streamline BI workflows and deliver scalable, accurate answers.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/BdawDt

#dataanalytics #ai #businessstrategy #datascience #artificialintelligence

Read More

Get the Buyer’s Guide to Generative AI Assistants β†’ https://ibm.biz/Bda7aw
Explore the podcast β†’ https://ibm.biz/Bda7ak

Can AI agents can make you better at your job? This autonomous form of AI can do a lot more for you than chatbots, AI assistants and Large Language Models can. In this episode, Ethan Mollick, Co-Director of Generative AI Lab at Wharton, talks about AI agents and their potential impacts on how (and how well) we work — urging organizations to start thinking about their implications now.

The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.

Get weekly AI, cloud, security and sustainability industry news, events and insights β†’ https://ibm.biz/Bda7a6

Read More

Explore Simplilearn’s CyberSecurity Programs: https://bit.ly/Sandra-CS-CyberSecurity

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”

🎯 My Beginner Cybersecurity Course: https://your-cybersecurity-journey.teachable.com/p/your-first-cyber-security-job
πŸ’‘ Technical Interview Prep Course: https://www.withcybersecurity.com/
πŸ’» My Cyber Security Career Resources: https://withsandra.square.site/

Start the FREE IT Introduction Course with CourseCareers Now: https://coursecareers.com/a/WithSandracourse=it

Cybersecurity for Beginners: https://links.zerotomastery.io/cybersecurityforbeginners_WithSandra
How to Get Started with Bug Bounties: https://links.zerotomastery.io/bugbounty_WithSandra
Cybersecurity Career Path: https://links.zerotomastery.io/cybersecuritycareerpath_WithSandra
AI in Cybersecurity: https://links.zerotomastery.io/AICybersecurity_WithSandra
Career Path Quiz:Β https://links.zerotomastery.io/careerpathquiz_WithSandra

πŸ“š Google Cybersecurity Certificate: http://imp.i384100.net/k0R0rz

🧭 Springboard Cybersecurity Bootcamp (Get a Job or Your Money Back Guaranteed – $1000 off Code WITHSANDRA): https://www.springboard.com/landing/influencer/withsandra

πŸ“• Get My FREE Cybersecurity Beginner Roadmap Guide: https://www.withsandra.dev/

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”

Brand/collaboration inquiries: [email protected]

Disclaimer: All opinions expressed in videos on this YouTube channel are solely my own. Some links are affiliate links, as an Amazon Influencer, I earn from qualifying purchases.

πŸ‘― Join our Discord πŸ˜€ – https://discord.gg/2YZUVbbpr9

Connect on LinkedIn: https://www.linkedin.com/in/withsandra/
Instagram: https://www.instagram.com/cyberwithsandra
Luca’s SWE Channel: https://www.youtube.com/c/TechwithLuca

❈ My Desk/Tech Stuff on Amazon ❈
https://www.amazon.com/shop/withlove.sandra

Top 5 Beginner Cybersecurity Projects: https://youtu.be/zc7LTa9q2nI

#cybersecurity #cybersecurityforbeginners #cybersecuritydayinthelife
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”

Current sub count: 117,700

Tags: Top 5 Cybersecurity Trends 2025,What Cyber Security Trends to Follow in 2025,top cybersecurity skills 2025,top cybersecurity trends 2025,top cybersecurity trends,top cybersecurity trends to follow,cybersecurity trends,cyber security trends,top cyber security trends,top cyber security trends to follow in 2025,cyber trends 2025,tech trends 2025,cybersecurity for beginners,cyber security for beginners,what to learn for cybersecurity,how to get into cybersecurity 2025

Read More