0:00 Facebook might owe you money
2:10 NSO Continued to Hack WhatsApp
4:25 iPhones Mysteriously Rebooting
6:38 Alleged Snowflake Hacker Arrested

===============================================
My Website: https://www.seytonic.com/
Follow me on TWTR: https://twitter.com/seytonic
Follow me on INSTA: https://www.instagram.com/jhonti/
===============================================

Read More

As the cybersecurity landscape continues to change, understanding the perspectives of security researchers is essential for effective risk management.

In this 30-minute live webinar session, we’ll dive into the top five takeaways from the 8th Annual Hacker-Powered Security Report. With practical examples and actionable recommendations, you’ll learn how to:

– Ensure that AI deployments are secure and trustworthy
– Enhance your approach to vulnerability management
– Implement demonstrably valuable security measures

Join this fast-paced exploration of the vital role of human expertise in the AI era.

To download the full report, visit: hackerone.com/report

Read More

⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️

@endingwithali β†’
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev

Want to work with Ali? [email protected]

[❗] Join the Patreonβ†’ https://patreon.com/threatwire
00:00 – Intro
00:12 – NVD is coming back
02:01 – Faux Data Requests
03:48 – CISA is at Risk
05:29 – Outro

LINKS
πŸ”— Story 1: NVD is coming back
https://securityboulevard.com/2024/11/nist-clears-backlog-of-known-security-flaws-but-not-all-vulnerabilities/
https://www.nist.gov/itl/nvd
https://lacework.com/cloud-security-fundamentals/nvd-what-is-the-national-vulnerability-database
πŸ”— Story 2: Faux Data Requests
https://gizmodo.com/hackers-are-using-police-emails-to-send-tech-companies-fraudulent-data-requests-2000522134
https://techcrunch.com/2024/11/08/fbi-says-hackers-are-sending-fraudulent-police-data-requests-to-tech-giants-to-steal-peoples-private-information/
https://gizmodo.com/hackers-are-using-police-emails-to-send-tech-companies-fraudulent-data-requests-2000522134
πŸ”— Story 3: CISA is at Risk
https://www.politico.com/news/2024/11/14/rand-paul-kneecap-cisa-00189698
—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†
Our Site β†’ https://www.hak5.org
Shop β†’ http://hakshop.myshopify.com/
Community β†’ https://www.hak5.org/community
Subscribe β†’ https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support β†’ https://www.patreon.com/threatwire
Contact Us β†’ http://www.twitter.com/hak5
____________________________________________

Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Read More

Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bit.ly/bbg-social

Animation tools: Adobe Illustrator and After Effects.

Checkout our bestselling System Design Interview books:
Volume 1: https://amzn.to/3Ou7gkd
Volume 2: https://amzn.to/3HqGozy

The digital version of System Design Interview books: https://bit.ly/3mlDSk9

ABOUT US:
Covering topics and trends in large-scale system design, from the authors of the best-selling System Design Interview series.

Read More

Want to try for yourself? Find the code on Github β†’ https://ibm.biz/BdaT2a
Learn more about the technology β†’ https://ibm.biz/BdaT2G

Need help making sense of complex code? In this video, PJ Hagerty demonstrates how to use Granite LLM for code summarization, generation, and completion, all on a coding level. From generating missing code to completing partially functional code, learn how to effectively use these features to improve your coding workflow, enhance code quality, and increase productivity.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/BdaT2n

#ai #largelanguagemodels #granite

Read More

Let me explain to you what you can learn from these tweets. Did you know the name trick?

Buy my terrible font (ad): https://shop.liveoverflow.com
Learn hacking (ad): https://hextree.io

Quote Tweet: https://twitter.com/avlidienbrunn/status/1697869590569582932
Original Tweet: https://twitter.com/Rhynorater/status/1696862832841916679
Critical Thinking Podcast: https://www.criticalthinkingpodcast.io/
XSS Origin Series: https://www.youtube.com/playlist?list=PLhixgUqwRTjyakFK7puB3fHVfXMinqMSi

Chapters:
00:00 – Intro
00:37 – Tweets About Tricky XSS
01:24 – XSS Testbed Setup with php
03:45 – Exploring the XSS Context
05:24 – The window Object
06:46 – Tweet 1: Justin’s XSS Explained
08:22 – Tweet 2: Mathias’s Variant With Object
09:52 – Tweet 2: Mathias’s Variant Creating Class
10:30 – The window.name Trick
12:00 – Closing Script Tag XSS
12:28 – Outro

=[ ❀️ Support ]=

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ πŸ• Social ]=

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Streaming: https://twitch.tvLiveOverflow/
β†’ TikTok: https://www.tiktok.com/@liveoverflow_
β†’ Instagram: https://instagram.com/LiveOverflow/
β†’ Blog: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

Read More

Register now to learn more about how Guardium Data Protection can safeguard your data here β†’ https://ibm.biz/Bda9ha
Learn more about the technology β†’ https://ibm.biz/Bda9pK

As the use of AI and machine learning continues to grow, a hidden threat is emerging that demands attention. Jeff Crume explores the concept of Shadow AI and its implications for your organization’s data and security, and discusses how it can be hidden in plain sight. He’ll discuss how to identify and mitigate risks such as data exfiltration, access control issues, and poisoning of AI models. Learn how to take control and protect your organization’s assets.

Read the Cost of a Data Breach report β†’ https://ibm.biz/Bda9py

#ai #machinelearning #cybersecurity

Read More

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! πŸ‘

πŸ“š If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training
πŸ’» If you want to practice some of my free labs and challenges: https://app.hackinghub.io

πŸ’΅ FREE $200 DigitalOcean Credit:
https://m.do.co/c/3236319b9d0b

πŸ”— LINKS:
πŸ“– MY FAVORITE BOOKS:
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2
Hacking APIs: Breaking Web Application Programming Interfaces – https://amzn.to/45g4bOr
Black Hat GraphQL: Attacking Next Generation APIs – https://amzn.to/455F9l3

🍿 WATCH NEXT:
If I Started Bug Bounty Hunting in 2024, I’d Do this – https://youtu.be/z6O6McIDYhU
2023 How to Bug Bounty – https://youtu.be/FDeuOhE5MhU
Bug Bounty Hunting Full Time – https://youtu.be/watch?v=ukb79vAgRiY
Hacking An Online Casino – https://youtu.be/watch?v=2eIDxVrk4a8
WebApp Pentesting/Hacking Roadmap – https://youtu.be/watch?v=doFo0I_KU0o

MY OTHER SOCIALS:
🌍 My website – https://www.nahamsec.com/
πŸ‘¨β€πŸ’» My free labs – https://app.hackinghub.io/
🐦 Twitter – https://twitter.com/NahamSec
πŸ“Έ Instagram – https://instagram.com/NahamSec
πŸ‘¨β€πŸ’» Linkedin – https://www.linkedin.com/in/nahamsec/

WHO AM I?
If we haven’t met before, hey πŸ‘‹! I’m Ben, most people online know me online as NahamSec. I’m a hacker turned content creator. Through my videos on this channel, I share my experience as a top hacker and bug bounty hunter to help you become a better and more efficient hacker.

FYI: Some of the links I have in the description are affiliate links that I get a a percentage from.

Read More

Stop storing your secrets and API keys in your code!! Try Keeper, a password manager you can use in the terminal: (built for devs/admins): https://www.keeper.io/networkchuck

I did it…..after days of frustration, blood, sweat and coffee..I finally figured out a way to clone a voice to use with my fully local, AI voice assistant!!!! This isn’t using cloud-based products like ElevenLabs…no…we are using a fully-local, open-source project called Piper TTS. This works wonderfully with the Assist voice pipeline in Home Assistant.

πŸ“GUIDE and WALKTHROUGH: https://blog.networkchuck.com/posts/how-to-clone-a-voice/

πŸ”₯πŸ”₯Join the NetworkChuck Academy!: https://ntck.co/NCAcademy

**Sponsored by Keeper

SUPPORT NETWORKCHUCK
—————————————————
➑️NetworkChuck membership: https://ntck.co/Premium
β˜•β˜• COFFEE and MERCH: https://ntck.co/coffee

Check out my new channel: https://ntck.co/ncclips

πŸ†˜πŸ†˜NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch

READY TO LEARN??
—————————————————
-Learn Python: https://bit.ly/3rzZjzz
-Get your CCNA: https://bit.ly/nc-ccna

FOLLOW ME EVERYWHERE
—————————————————
Instagram: https://www.instagram.com/networkchuck/
Twitter: https://twitter.com/networkchuck
Facebook: https://www.facebook.com/NetworkChuck/
Join the Discord server: http://bit.ly/nc-discord

AFFILIATES & REFERRALS
—————————————————
(GEAR I USE…STUFF I RECOMMEND)
My network gear: https://geni.us/L6wyIUj
Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: https://geni.us/aBeqAL
Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!!
fast and reliable unifi in the cloud: https://hostifi.com/?via=chuck

#homeassistant #alexa #clonevoice

Read More

Explore the podcast β†’ https://ibm.biz/BdaQyv

Building an AI pilot is relatively easy, but implementing it is much, much harder. It’s why 4 out of 5 AI pilots crash and burn before takeoff. In this episode, guests Apunam Singh, VP of Engineering at Roblox, and Nick Renotte, Chief AI Engineer at IBM, reveal the hidden pitfalls that doom AI implementations β€” like cost, data quality, and user experience β€” and how you can avoid falling into the same trap.

Get weekly AI, cloud, security and sustainability industry news, events and insights β†’ https://ibm.biz/BdaQyK

The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.

Read More

Nmap Tutorial for Beginners (2025)

Learn the basics of Nmap in this Nmap Tutorial for Beginners! Whether you’re diving into ethical hacking or exploring the fundamentals of penetration testing, this guide has you covered. Discover how to scan networks, identify open ports, gather essential information using Nmap and perform Active Reconnaissance.

SUPPORT MY WORK BY BECOMMING PATREON
—————————————————
https://patreon.com/Lsecqt

TIMESTAMPS
—————————————————
00:00 – Into
00:22 – What is Active Reconnaissance?
01:00 – What is Nmap and how does it work?
04:04 – How I use Nmap
09:54 – Biggest new hackers do
11:54 – Outro

FOLLOW ME
—————————————————
Patreon: https://patreon.com/Lsecqt
Twitter: https://twitter.com/lsecqt
Twitch: https://www.twitch.tv/lsecqt
Reddit: https://www.reddit.com/user/lsecqt
Medium: https://medium.com/@lsecqt
Support my Work: https://www.buymeacoffee.com/lsecqt
Red Teaming Army Discord Server: https://discord.gg/dWCe5ZMvtQ Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/
Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/

nmap tutorial for beginners
nmap tutorial
kali linux tutorial for beginners
nmap full tutorial
nmap for beginners
nmap tutorial for windows
nmap complete tutorial
nmap tutorialt for beginners
nmap tutorial kali linux
nmap beginner
for beginners
nmap hacking tutorial
nmap for beginners in hindi
hacking tutorial
nmap for hacking
introduction : nmap tutorial for beginners
nmap linux tutorial
ethical hacking tutorials for beginners

#nmap #ethicalhacking #penetration_testing

Read More

What’s in a language? Dr Laurie Tratt breaks it down by creating a brand new programming language by writing an interpreter in a few lines of code.

Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: https://jane-st.co/computerphile

Dr Laurence Tratt is programmer and the Shopify / Royal Academy of Engineering Research Chair in Language Engineering in the Department of Informatics at King’s College London

This video was filmed and edited by Sean Riley.

Computerphile is a sister project to Brady Haran’s Numberphile. More at https://www.bradyharanblog.com

Read More

Want to learn more about AI agents and assistants? Register for Virtual Agents Day here β†’ https://ibm.biz/Bda3mw
Download the AI model guide to learn more β†’ https://ibm.biz/BdaJTb
Learn more about the technology β†’ https://ibm.biz/BdaJwB

Get ready to transform the way you work with AI assistants and AI agents! Martin Keen & Amanda Downie dive into the differences between these two types of AI and how they’re shaping the future of work. From AI assistants that help with routine tasks to AI agents that take on complex challenges, discover how these two types of AI are designed to improve business outcomes and drive automation.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/BdaJT8

#ai #aiagents #aiassistant

Read More

Start your career as an SOC Analyst with LetsDefend and get 55% off (Code SANDRA55) when you sign up for their annual plan: https://app.letsdefend.io/pricing?discount=SANDRA55

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”

πŸ“• Get My FREE Cybersecurity Roadmap Guide: https://www.withsandra.dev/

Brand/collaboration inquiries: [email protected]

Disclaimer: All opinions expressed in videos on this YouTube channel are solely my own. Some links are affiliate links, as an Amazon Influencer, I earn from qualifying purchases.

πŸ‘― Join our Discord πŸ˜€ – https://discord.gg/2YZUVbbpr9

Connect on LinkedIn: https://www.linkedin.com/in/withsandra/
Instagram: https://www.instagram.com/cyberwithsandra
Luca’s SWE Channel: https://www.youtube.com/c/TechwithLuca

❈ My Desk/Tech Stuff on Amazon ❈
https://www.amazon.com/shop/withlove.sandra

Top 5 Beginner Cybersecurity Projects: https://youtu.be/zc7LTa9q2nI

#cybersecurity #cybersecurityforbeginners #cybersecuritydayinthelife
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”

Current sub count: 115,102

Tags: How to become a SOC Analyst with LetsDefend,BEST SOC Analyst Pathway for Beginners,how to become an SOC analyst,soc analyst beginner roadmap,soc analyst courses,best soc analyst courses,best soc analyst training,best soc analyst roadmap,how to be an soc analyst,soc analyst,beginner soc analyst,soc analyst beginner,cybersecurity for beginners,best entry level cybersecurity job,best entry level cybersecurity job,best entry level cybersecurity jobs,soc analysts,best soc analyst courses for beginners,best beginner soc analyst training

Read More