LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! πŸ‘

πŸ“š If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training
πŸ’» If you want to practice some of my free labs and challenges: https://app.hackinghub.io

πŸ’΅ FREE $200 DigitalOcean Credit:
https://m.do.co/c/3236319b9d0b

πŸ”— LINKS:
πŸ“– MY FAVORITE BOOKS:
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2
Hacking APIs: Breaking Web Application Programming Interfaces – https://amzn.to/45g4bOr
Black Hat GraphQL: Attacking Next Generation APIs – https://amzn.to/455F9l3

🍿 WATCH NEXT:
If I Started Bug Bounty Hunting in 2024, I’d Do this – https://youtu.be/z6O6McIDYhU
2023 How to Bug Bounty – https://youtu.be/FDeuOhE5MhU
Bug Bounty Hunting Full Time – https://youtu.be/watch?v=ukb79vAgRiY
Hacking An Online Casino – https://youtu.be/watch?v=2eIDxVrk4a8
WebApp Pentesting/Hacking Roadmap – https://youtu.be/watch?v=doFo0I_KU0o

MY OTHER SOCIALS:
🌍 My website – https://www.nahamsec.com/
πŸ‘¨β€πŸ’» My free labs – https://app.hackinghub.io/
🐦 Twitter – https://twitter.com/NahamSec
πŸ“Έ Instagram – https://instagram.com/NahamSec
πŸ‘¨β€πŸ’» Linkedin – https://www.linkedin.com/in/nahamsec/

WHO AM I?
If we haven’t met before, hey πŸ‘‹! I’m Ben, most people online know me online as NahamSec. I’m a hacker turned content creator. Through my videos on this channel, I share my experience as a top hacker and bug bounty hunter to help you become a better and more efficient hacker.

FYI: Some of the links I have in the description are affiliate links that I get a a percentage from.

Read More

Welcome to this 5 part series in which we’ll install Suricata into the FLARE-VM, and then use it to generate network alerts from malicious traffic. In part 01, we’ll go through the installation and basic setup of Suricata in the FLARE-VM, ensuring that Suricata is properly installed. We’ll be using Suricata’s offline mode capability to process PCAPs and won’t need to setup Suricata as a service.

Join this channel to get access to perks:
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA/join

Part 02 will cover how to update the rule set.

Part 03 will introduce a batch script to process PCAPs and grep out alert data.

Part 04 will cover generating PCAPs from network emulation using FAKENET-NG.

Part 05 Will introduce the basics of how you can create custom rules.

Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
πŸŽ“ Courses on Pluralsight πŸ‘‰πŸ» https://www.pluralsight.com/authors/josh-stroschein
🌢️ YouTube πŸ‘‰πŸ» Like, Comment & Subscribe!
πŸ™πŸ» Support my work πŸ‘‰πŸ» https://patreon.com/JoshStroschein
🌎 Follow me πŸ‘‰πŸ» https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
βš™οΈ Tinker with me on Github πŸ‘‰πŸ» https://github.com/jstrosch
🀝 Join the Discord community and more πŸ‘‰πŸ» https://www.thecyberyeti.com

Read More

Resource control policies (RCPs) are a type of organization policy that you can use to manage permissions in your organization. RCPs offer central control over the maximum available permissions for resources in your organization. RCPs help you to ensure resources in your accounts stay within your organization’s access control guidelines.

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Read More

Download the AI model guide to learn more β†’ https://ibm.biz/BdawFh
Learn more about the technology β†’ https://ibm.biz/BdawFV

Llama is a powerful AI model with a wide range of applications, from image understanding to conversational AI. Join Brianne Zavala as she explores the many use cases of Llama and shows how it can be used to drive business success and improve personal productivity. By leveraging advanced AI capabilities, businesses and individuals can gain insights into its potential applications and benefits, such as improving language generation, document understanding, and more.AI news moves fast.
Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/BdawFJ

#llama #ai #ai #aimodel #naturallanguageprocessing #conversationalai

Read More

Want to learn everything about using Flipper Zero to become the ultimate cyber-security pro? Check out the Full Flipper Zero Course right here: https://www.udemy.com/course/full-flipper-zero-course/

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Read More

Get 20% off DeleteMe US consumer plans when you go to https://joindeleteme.com/seytonic and use promo code SEYTONIC at checkout.
DeleteMe International Plans: https://international.joindeleteme.com/

0:00 Spotify Has a Malware Problem
2:21 DeleteMe (ad)
3:26 Hack First, Get Hired Later
6:06 SMS Blasters Pwned

===============================================
My Website: https://www.seytonic.com/
Follow me on TWTR: https://twitter.com/seytonic
Follow me on INSTA: https://www.instagram.com/jhonti/
===============================================

Read More

Want to learn everything about using Flipper Zero to become the ultimate cyber-security pro? Check out the Full Flipper Zero Course right here: https://www.udemy.com/course/full-flipper-zero-course/

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Read More

⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️

VOTE IN THE PAYLOAD AWARDS: https://shop.hak5.org/pages/payload-awards

@endingwithali β†’
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev

Want to work with Ali? [email protected]

[❗] Join the Patreonβ†’ https://patreon.com/threatwire
00:00 0 – Intro
00:07 1 – Swiss Phishing Test
01:49 2 – Google Monopoly Breakdown
02:51 3 – New Wi-Fi Based Attack Discovered
05:15 4 – OUTRO

LINKS
πŸ”— Story 1: Swiss Phishing Test
https://www.ncsc.admin.ch/ncsc/en/home/aktuell/im-fokus/2024/2024-meteosuisse.html
https://www.theregister.com/2024/11/16/swiss_malware_qr/
πŸ”— Story 2: Google Monopoly Breakdown
https://techcrunch.com/2024/11/20/doj-google-must-sell-chrome-to-end-monopoly/
πŸ”— Story 3: New Wi-Fi Based Attack Discovered
https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/
—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†
Our Site β†’ https://www.hak5.org
Shop β†’ http://hakshop.myshopify.com/
Community β†’ https://www.hak5.org/community
Subscribe β†’ https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support β†’ https://www.patreon.com/threatwire
Contact Us β†’ http://www.twitter.com/hak5
____________________________________________

Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Read More

Bayesian logic is already helping to improve Machine Learning results using statistical models. Professor Mike Osborne drew us some sausage plots to explain the idea.

Mike Osborne is Professor of Machine Learning at the University of Oxford – Find out more here: http://www.robots.ox.ac.uk/~mosb?

Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: https://jane-st.co/computerphile

This video was filmed and edited by Sean Riley.

Computerphile is a sister project to Brady Haran’s Numberphile. More at https://www.bradyharanblog.com

Read More

Download the guide to learn more β†’ https://ibm.biz/BdaV3U
Learn more about the technology β†’ https://ibm.biz/BdaV37

Join Dinesh Shetty as he explores the fascinating world of AI and the critical topic of AI Bias and the principles of avoiding bias, emphasizing the importance of AI Governance in identifying and addressing bias.

#AI #ArtificialIntelligence #AIBias #AIGovernance #CounterfactualFairness #MachineLearning #DeepLearning #DataScience #Tech #Innovation

Read More

Happy Thanksgiving! πŸ˜€ – Get $2000 OFF Your Springboard Cyber Security Boot camp with my code SANDRA2000. See if you qualify for the JOB GUARANTEE! πŸ‘‰https://www.springboard.com/landing/influencer/withsandra2000/?utm_medium=influencer&utm_source=sandra2000&utm_campaign=csc2&utm_term=paid&utm_content=revewyoutubevideo

πŸ“• Get My FREE Cybersecurity Beginner Roadmap Guide: https://www.withsandra.dev/

🎯 My Beginner Cybersecurity Course: https://your-cybersecurity-journey.teachable.com/p/your-first-cyber-security-job
πŸ’‘ Technical Interview Prep Course: https://www.withcybersecurity.com/
πŸ’­ My Cybersecurity Coaching Program: https://your-cybersecurity-journey.teachable.com/p/cybersecurity-career-kickstart

πŸ’Ό For GRC Analysts: https://www.symposia.com/channel-partner/s

Cybersecurity for Beginners: https://links.zerotomastery.io/cybersecurityforbeginners_WithSandra
How to Get Started with Bug Bounties: https://links.zerotomastery.io/bugbounty_WithSandra
Cybersecurity Career Path: https://links.zerotomastery.io/cybersecuritycareerpath_WithSandra
AI in Cybersecurity: https://links.zerotomastery.io/AICybersecurity_WithSandra
Career Path Quiz: https://links.zerotomastery.io/careerpathquiz_WithSandra

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”

Brand/collaboration inquiries: [email protected]

Disclaimer: All opinions expressed in videos on this YouTube channel are solely my own. Some links are affiliate links, as an Amazon Influencer, I earn from qualifying purchases.

πŸ‘― Join our Discord πŸ˜€ – https://discord.gg/2YZUVbbpr9

Connect on LinkedIn: https://www.linkedin.com/in/withsandra/
Instagram: https://www.instagram.com/cyberwithsandra
Luca’s SWE Channel: https://www.youtube.com/c/TechwithLuca

❈ My Desk/Tech Stuff on Amazon ❈
https://www.amazon.com/shop/withlove.sandra

Top 5 Beginner Cybersecurity Projects: https://youtu.be/zc7LTa9q2nI

#cybersecurity #cybersecurityforbeginners #cybersecuritydayinthelife
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”

Current sub count: 117,300

Tags: Is It Too Late to Get Into Cybersecurity in 2025,is it too late for cybersecurity in 2025,is it too late to get into cybersecurity 2025,cybersecurity for beginners,is cybersecurity worth it in 2025,is cyebrsecurity worth it 2025,should i still go into cybersecurity in 2025,should i still get into cybersecurity in 2025,should i go into cybersecurity in 2025,dont go into cybersecurity,should i become a cybersecurity analyst,why you should become a cybersecurity analyst,why you should be a cyber security analyst,cyber security analyst,cyber security careers 2025,cybersecurity careers 2025

Read More

0:00 Russia’s Impressive New WiFi Hacking Trick
2:24 Spreading Malware with Snail Mail
4:06 Andrew Tate Hacked (Again)
6:17 Russia Targets Ukraine Recruits

===============================================
My Website: https://www.seytonic.com/
Follow me on TWTR: https://twitter.com/seytonic
Follow me on INSTA: https://www.instagram.com/jhonti/
===============================================

Read More