How They Steal Company Secrets in Minutes
#cybersecurity #hacking #podcast #scam
Listen to the full episode π Darknet Diaries Ep. 144: Rachel
How They Steal Company Secrets in Minutes
#cybersecurity #hacking #podcast #scam
Listen to the full episode π Darknet Diaries Ep. 144: Rachel
β¬οΈ OPEN FOR LINKS TO ARTICLES TO LEARN MORE β¬οΈ
@endingwithali β
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev
Want to work with Ali? [email protected]
[β] Join the Patreonβ https://patreon.com/threatwire
00:00 0 – Intro
00:08 1 – First Bootkit for Linux Discovered
02:19 2 – Valorant 100k Bounty
03:26 3 – Pokemon GO used to Map the World
04:42 4 – Outro
LINKS
π Story 1: First Bootkit for Linux Discovered
https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/
π Story 2: Valorant 100k Bounty
https://hackerone.com/riot?type=team
https://www.si.com/esports/news/riot-games-offers-100k-bounty-to-hackers
https://www.pcgamer.com/games/fps/riot-is-flexing-its-anticheat-vanguard-by-placing-a-bounty-of-up-to-usd100-000-for-anyone-brilliant-enough-to-find-and-report-gaps-in-the-system/
π Story 3: Pokemon GO used to Map the World
https://nianticlabs.com/news/largegeospatialmodel
https://www.livescience.com/technology/artificial-intelligence/gotta-catch-em-all-how-pokemon-go-covertly-captured-your-data-for-years-to-train-a-massive-ai-model
—–β—–β—–β—–β—–β—–β—–β—–β—–β—–β
Our Site β https://www.hak5.org
Shop β http://hakshop.myshopify.com/
Community β https://www.hak5.org/community
Subscribe β https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support β https://www.patreon.com/threatwire
Contact Us β http://www.twitter.com/hak5
____________________________________________
Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community β where all hackers belong.
Learn more about artificial intelligence β https://ibm.biz/BdGcTP
Whatβs the mystery behind the name ChatGPT refuses to discuss? In Episode 32 of Mixture of Experts host Tim Hwang dives into the hottest topics shaping the AI landscape with an all-star panel: Aaron Baughman, Vagner Figueredo de Santana, and Shobhit Varshney. First, they disect the biggest announcements and takeaways from AWS re:Invent 2024, Amazonβs premier AI event. Next, they talk about overcoming architectural vulnerabilities in AI systems, and finally they uncover the curious case of a name ChatGPT wonβt discussβand the questions this raises about privacy and transparency in AI. Get ready for an episode packed with insights, debates, and forward-thinking perspectives!
0:00 – Intro
1:01 – AWS re:invent 2024
13:57 – LLM Flowbreaking
28:20 – David Mayer
The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.
Subscribe for AI updates β https://ibm.biz/BdGcTy
In part 08, we’ll look at how Lockbit uses the Windows API ZwSetInformationThread to detach any debuggers, allowing it to continue running without interruption. We’ll also discuss how to patch the binary in memory using x64dbg.
Join this channel to get access to perks:
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA/join
Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
π Courses on Pluralsight ππ» https://www.pluralsight.com/authors/josh-stroschein
πΆοΈ YouTube ππ» Like, Comment & Subscribe!
ππ» Support my work ππ» https://patreon.com/JoshStroschein
π Follow me ππ» https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
βοΈ Tinker with me on Github ππ» https://github.com/jstrosch
π€ Join the Discord community and more ππ» https://www.thecyberyeti.com
0:48 Identifying the first anti-analysis function
2:25 Using x64dbg to understand what function is being called
3:30 Jumping on trampolines
4:04 We’re not lost, just doing some research
5:40 Updating our IDB
7:05 NOPing out bytes in x64dbg
Video Summary Video Summary The video discusses a humorous predicament faced by a parent whose youngest daughter, Jenny, has a habit of throwing an entire roll of toilet paper into the toilet when the bathroom door is left open and the toilet seat is up. Despite acknowledging the simple solution of…
This Hacking Tool Tricks Windows Into Sharing Passwords
#cybersecurity #hacking #podcast #windows
Listen to the full episode π Darknet Diaries Ep. 149: Mini-Stories Vol. 3
Download the AI model guide to learn moreΒ βΒ https://ibm.biz/Bdaw7r
Learn more about the technologyΒ β https://ibm.biz/Bdaw7i
Want to get more out of your language models? Follow Cedric Clyburn as he shows how to fine-tune large language models using InstructLab, an open-source tool that can help you customize and specialize them for specific tasks. By fine-tuning your language models, you’ll be able to tackle complex tasks with ease, automate repetitive work, and unlock new insights that help you solve real-world problems and achieve your goals.
AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β https://ibm.biz/Bdaw7j
#finetuning #largelanguagemodels #ai
As quantum devices become more accessible, there’s a whole area of software engineering opening up. Mohammad Mousavi specialises in software engineering for quantum computing.
Mohammad Reza Mousavi is a professor of Software Engineering at King’s College London & one of the centre directors at Kingβs Quantum.
Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: https://jane-st.co/computerphile
This video was filmed and edited by Sean Riley.
Computerphile is a sister project to Brady Haran’s Numberphile. More at https://www.bradyharanblog.com
Read the X-Force Threat Intelligence IndexΒ β https://ibm.biz/Bda9aw
Learn more about the technology β https://ibm.biz/Bda9GB
The dark web is a mysterious and often misunderstood part of the internet, shrouded in secrecy and intrigue. Join Jeff Crume as he explores what the dark web is, how it works, and what kinds of content you can find there. From whistleblowers and journalists to marketplaces and hackers, Jeff covers it all. But be warned: the dark web is not for the faint of heart, and it’s not without its risks. So, if you’re curious about the dark side of the internet, keep watching.
Read the Cost of a Data Breach report β https://ibm.biz/Bda9GF
#darkweb #cybersecurity #security
Welcome to part 2! In this video, we’ll walk through how to manually update Suricata’s rule set using Emerging Threats Open. While Suricata typically ships with a rule manager, it is missing in the Windows distribution. These rules can serve as a foundation for detecting malicious and anomalous patterns in network traffic and are typically a great place to start.
Join this channel to get access to perks:
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA/join
Part 03 will introduce a batch script to process PCAPs and grep out alert data.
Part 04 will cover generating PCAPs from network emulation using FAKENET-NG.
Part 05 Will introduce the basics of how you can create custom rules.
Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
π Courses on Pluralsight ππ» https://www.pluralsight.com/authors/josh-stroschein
πΆοΈ YouTube ππ» Like, Comment & Subscribe!
ππ» Support my work ππ» https://patreon.com/JoshStroschein
π Follow me ππ» https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
βοΈ Tinker with me on Github ππ» https://github.com/jstrosch
π€ Join the Discord community and more ππ» https://www.thecyberyeti.com
Check out the full video here: https://ntck.co/aivoiceassistant
#SmartHome #Alexa #HomeAssistant
The Secret Backdoor Hackers Use to Access Your Accounts
#cybersecurity #podcast
Listen to the full episode π Darknet Diaries Ep. 148: Dubsnatch
Download the guide to learn moreΒ β https://ibm.biz/BdawDw
Learn more about AI solutionsΒ β https://ibm.biz/BdawDk
Ever wondered how AI can make business intelligence (BI) more precise and consistent? In this video, Hosam will show how combining a semantic layer with large language models (LLMs) enables automated SQL generation, enriched data insights, and clear summarization of results. Perfect for developers looking to streamline BI workflows and deliver scalable, accurate answers.
AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β https://ibm.biz/BdawDt
#dataanalytics #ai #businessstrategy #datascience #artificialintelligence
Get the Buyerβs Guide to Generative AI Assistants β https://ibm.biz/Bda7aw
Explore the podcast β https://ibm.biz/Bda7ak
Can AI agents can make you better at your job? This autonomous form of AI can do a lot more for you than chatbots, AI assistants and Large Language Models can. In this episode, Ethan Mollick, Co-Director of Generative AI Lab at Wharton, talks about AI agents and their potential impacts on how (and how well) we work — urging organizations to start thinking about their implications now.
The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.
Get weekly AI, cloud, security and sustainability industry news, events and insights β https://ibm.biz/Bda7a6
Explore Simplilearn’s CyberSecurity Programs: https://bit.ly/Sandra-CS-CyberSecurity
ββββββββββββββββββ
π― My Beginner Cybersecurity Course: https://your-cybersecurity-journey.teachable.com/p/your-first-cyber-security-job
π‘ Technical Interview Prep Course: https://www.withcybersecurity.com/
π» My Cyber Security Career Resources: https://withsandra.square.site/
Start the FREE IT Introduction Course with CourseCareers Now: https://coursecareers.com/a/WithSandracourse=it
Cybersecurity for Beginners: https://links.zerotomastery.io/cybersecurityforbeginners_WithSandra
How to Get Started with Bug Bounties: https://links.zerotomastery.io/bugbounty_WithSandra
Cybersecurity Career Path: https://links.zerotomastery.io/cybersecuritycareerpath_WithSandra
AI in Cybersecurity: https://links.zerotomastery.io/AICybersecurity_WithSandra
Career Path Quiz:Β https://links.zerotomastery.io/careerpathquiz_WithSandra
π Google Cybersecurity Certificate: http://imp.i384100.net/k0R0rz
π§ Springboard Cybersecurity Bootcamp (Get a Job or Your Money Back Guaranteed – $1000 off Code WITHSANDRA): https://www.springboard.com/landing/influencer/withsandra
π Get My FREE Cybersecurity Beginner Roadmap Guide: https://www.withsandra.dev/
ββββββββββββββββββ
Brand/collaboration inquiries: [email protected]
Disclaimer: All opinions expressed in videos on this YouTube channel are solely my own. Some links are affiliate links, as an Amazon Influencer, I earn from qualifying purchases.
π― Join our Discord π – https://discord.gg/2YZUVbbpr9
Connect on LinkedIn: https://www.linkedin.com/in/withsandra/
Instagram: https://www.instagram.com/cyberwithsandra
Lucaβs SWE Channel: https://www.youtube.com/c/TechwithLuca
β My Desk/Tech Stuff on Amazon β
https://www.amazon.com/shop/withlove.sandra
Top 5 Beginner Cybersecurity Projects: https://youtu.be/zc7LTa9q2nI
#cybersecurity #cybersecurityforbeginners #cybersecuritydayinthelife
ββββββββββββββββββ
Current sub count: 117,700
Tags: Top 5 Cybersecurity Trends 2025,What Cyber Security Trends to Follow in 2025,top cybersecurity skills 2025,top cybersecurity trends 2025,top cybersecurity trends,top cybersecurity trends to follow,cybersecurity trends,cyber security trends,top cyber security trends,top cyber security trends to follow in 2025,cyber trends 2025,tech trends 2025,cybersecurity for beginners,cyber security for beginners,what to learn for cybersecurity,how to get into cybersecurity 2025