⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️

DEF CON VLOG: https://www.youtube.com/watch?v=PJvlMRIz4d4

@endingwithali →
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev

Want to work with Ali? [email protected]

[❗] Join the Patreon→ https://patreon.com/threatwire
0:00 0 – Intro
00:07 1 – Google Sunsetting Play Store Bug Bounty
01:23 2 – SolarWinds Critical Vulnerability
01:48 3 – CEO Of Telegram Arrested
03:33 4 – USDoD Found
04:37 5 – Outro

LINKS
🔗 Story 1: Google Sunsetting Play Store Bug Bounty
https://bughunters.google.com/about/rules/android-friends/5604090422493184/google-play-security-reward-program-rules
https://www.androidauthority.com/google-play-security-reward-program-winding-down-3472376/
https://cyberscoop.com/google-play-store-bug-bounty-shut-down-gpsrp/
🔗 Story 2: SolarWinds Critical Vulnerability
https://support.solarwinds.com/SuccessCenter/s/article/SolarWinds-Web-Help-Desk-12-8-3-Hotfix-2
https://www.bleepingcomputer.com/news/security/solarwinds-fixes-hardcoded-credentials-flaw-in-web-help-desk/
🔗 Story 3: CEO Of Telegram Arrested
https://www.tf1info.fr/justice-faits-divers/info-tf1-lci-le-fondateur-et-pdg-de-la-messagerie-cryptee-telegram-interpelle-en-france-2316072.html
https://arstechnica.com/security/2024/08/shocker-french-make-surprise-arrest-of-telegram-founder-at-paris-airport/
https://blog.cryptographyengineering.com/2024/08/25/telegram-is-not-really-an-encrypted-messaging-app/
https://blog.cryptographyengineering.com/2024/08/25/telegram-is-not-really-an-encrypted-messaging-app/
🔗 Story 4: USDoD Found
https://hackread.com/usdod-hacker-ssn-leak-reveals-brazilian-citizen/
https://hackread.com/hacker-scrapes-publishes-crowdstrike-ioc-list/
—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Community → https://www.hak5.org/community
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
____________________________________________

Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Read More

Want to try for yourself? Find the code on Github → https://github.com/diarrabell/ConfusionMatrix
Learn more about the technology → https://ibm.biz/Bdah5r

Ever wondered why your machine learning model is struggling to deliver accurate results? The answer lies in the confusion matrix. In this tutorial, Diarra Bell reveals the hidden secrets of the confusion matrix, and shows you how to harness its power to supercharge your classification model’s performance. You’ll learn how to fine-tune your logistic regression models, and master the essential techniques for evaluating model performance using metrics like accuracy, precision, and recall. Transform your machine learning skills and take your models to the next level!

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM → https://ibm.biz/Bdah5s

Read More

🧭 Check out Zero To Mastery’s Full Ethical Hacker Career Path here: https://links.zerotomastery.io/cybersecuritycareerpath_WithSandra

Also check out their other courses here:
– How to Get Started with Bug Bounties: https://links.zerotomastery.io/bugbounty_WithSandra
– Cybersecurity for Beginners: https://links.zerotomastery.io/cybersecurityforbeginners_WithSandra
– AI in Cybersecurity: https://links.zerotomastery.io/AICybersecurity_WithSandra
– Career Path Quiz: https://links.zerotomastery.io/careerpathquiz_WithSandra

💼 My Cybersecurity Coaching Program: https://your-cybersecurity-journey.teachable.com/p/cybersecurity-career-kickstart

——————————————————

Brand/collaboration inquiries: [email protected]

Disclaimer: All opinions expressed in videos on this YouTube channel are solely my own. Some links are affiliate links, as an Amazon Influencer, I earn from qualifying purchases.

Start the FREE IT Introduction Course with CourseCareers Now: https://coursecareers.com/a/WithSandracourse=it

👯 Join our Discord 😀 – https://discord.gg/2YZUVbbpr9

Connect on LinkedIn: https://www.linkedin.com/in/withsandra/
Instagram: https://www.instagram.com/cyberwithsandra
Luca’s SWE Channel: https://www.youtube.com/c/TechwithLuca

❈ My Desk/Tech Stuff on Amazon ❈
https://www.amazon.com/shop/withlove.sandra

Top 5 Beginner Cybersecurity Projects: https://youtu.be/zc7LTa9q2nI

#cybersecurity #cybersecurityforbeginners #cybersecuritydayinthelife
——————————————————

Current sub count: 114,500

Tags: How to Become an Ethical Hacker in 2025,FULL Learning Pathway to Become a Pentester as a Beginner,How to Become an Ethical Hacker,FULL Learning Pathway to Become a Pentester as a Beginner 2025,how to be an ethical hacker,how to become a hacker in 2024,how to become a pentester,how to become a penetration tester,how to become a red teamer,how to be a pentester 2025,how to become a pentester 2025,ethical hacker courses,ethical hacking for beginners,beginner ethical hacker roadmap,best beginner ethical hacking course

Read More

⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️

@endingwithali →
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev

Want to work with Ali? [email protected]

[❗] Join the Patreon→ https://patreon.com/threatwire
00:00 0 – Intro
00:10 1 – Okta Oopsies
01:01 2 – Strava is Bad Opsec
01:51 3 – Sophos Hacks Back
03:38 4 – LLM Discovered SQLite Vulnerability
05:49 5 – Outro

LINKS
🔗 Story 1: Okta Oopsies
https://trust.okta.com/security-advisories/okta-ad-ldap-delegated-authentication-username/
https://x.com/bcrypt/status/1852575080989257893
🔗 Story 2: Strava is Bad Opsec
https://www.the-independent.com/world/strava-security-trump-putin-macron-secret-service-b2637282.html
https://www.kyivpost.com/post/19325
🔗 Story 3: Sophos Hacks Back
https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/
https://news.sophos.com/en-us/2024/10/31/pacific-rim-timeline/
https://news.sophos.com/en-us/2024/10/31/pacific-rim-neutralizing-china-based-threat/
🔗 Story 4: LLM Discovered SQLite Vulnerability
https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html
—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Community → https://www.hak5.org/community
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
____________________________________________

Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Read More

Malleable encryption means you can flip a bit in the encrypted message and the corresponding bit is flipped in the unencrypted plain text. Dr Tim Muller gives us some examples.

nb This video is a reupload due to an audio problem with the first version. For those interested there were tones at approx 2.1k and then at approx 5.5k & 9k – guessing computer fan noise as there were a couple of occasions where it changed frequency slightly possibly as it sped up or slowed down.

Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: https://jane-st.co/computerphile

This video was filmed and edited by Sean Riley.

Computerphile is a sister project to Brady Haran’s Numberphile. More at https://www.bradyharanblog.com

Read More

Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bit.ly/bbg-social

Animation tools: Adobe Illustrator and After Effects.

Checkout our bestselling System Design Interview books:
Volume 1: https://amzn.to/3Ou7gkd
Volume 2: https://amzn.to/3HqGozy

The digital version of System Design Interview books: https://bit.ly/3mlDSk9

ABOUT US:
Covering topics and trends in large-scale system design, from the authors of the best-selling System Design Interview series.

Read More

Download the AI model guide to learn more → https://ibm.biz/Bdab9w
Learn more about AI solutions → https://ibm.biz/Bdab9k

Get ready for a showdown between LangChain and LangGraph, two powerful frameworks for building applications with large language models (LLMs.) Master Inventor Martin Keen compares the two, taking a look at their unique features, use cases, and how they can help you create innovative, context-aware solutions.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM → https://ibm.biz/Bdab9t
#llm #largelanguagemodels #langchain

Read More

Download the AI model guide to learn more → https://ibm.biz/Bdahts
Learn more about AI solutions → https://ibm.biz/Bdahti

Explore the world of Llama, an open-source AI model that’s transforming the way we think about artificial intelligence. Brianne Zavala will take you on a journey through the history, benefits, and applications of Llama. From data generation to knowledge distillation, and from multi-lingual capabilities to context windows discover how Llama is being used to revolutionize various industries and improve lives.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM → https://ibm.biz/BdahtY

Read More

Read the Cloud Threat Landscape Report → https://ibm.biz/BdabCs
Learn more about the technology → https://ibm.biz/BdabCi

Delve into the concept of Cross-Site Scripting (XSS) attacks, a type of security threat that has been prevalent for over two decades. Jeff Crume explores the architecture of an XSS attack, its potential impacts, and provide recommendations to mitigate such threats. By understanding the anatomy of an XSS attack and implementing effective prevention strategies, you can significantly reduce the occurrence of these attacks.

Read the Cost of a Data Breach report → https://ibm.biz/BdabCj

Read More

Protect yourself, your family and your business from scams: https://bitdefend.me/SCNetworkChuck

I’m replacing Amazon Alexa with my own, completely local AI voice assistant!! The amazing part is that it cleanly integrates with my home automation system, Home Assistant. Also, it’s using local LLMs like llama3.2 with Ollama. I think it’s finally time for you to replace your voice assistant with something local.

📜📜📜COMMANDS: https://academy.networkchuck.com/blog/local-ai-voice-assistant

⚙️⚙️⚙️ PARTS LIST ⚙️⚙️⚙️
– Raspberry Pi 4: https://geni.us/mzJF55
– Raspberry Pi 5: https://geni.us/z0BVIc
– KEYESTUDIO ReSpeaker 2-Mic Pi HAT: https://geni.us/zRmnHr
– Raspberry Pi Speakers: https://geni.us/6GE5rW

🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy

**Sponsored by Bitdefender

SUPPORT NETWORKCHUCK
—————————————————
➡️NetworkChuck membership: https://ntck.co/Premium
☕☕ COFFEE and MERCH: https://ntck.co/coffee

Check out my new channel: https://ntck.co/ncclips

🆘🆘NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch

READY TO LEARN??
—————————————————
-Learn Python: https://bit.ly/3rzZjzz
-Get your CCNA: https://bit.ly/nc-ccna

FOLLOW ME EVERYWHERE
—————————————————
Instagram: https://www.instagram.com/networkchuck/
Twitter: https://twitter.com/networkchuck
Facebook: https://www.facebook.com/NetworkChuck/
Join the Discord server: http://bit.ly/nc-discord

AFFILIATES & REFERRALS
—————————————————
(GEAR I USE…STUFF I RECOMMEND)
My network gear: https://geni.us/L6wyIUj
Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: https://geni.us/aBeqAL
Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!!
fast and reliable unifi in the cloud: https://hostifi.com/?via=chuck

1. Tired of Alexa Build a fully local AI assistant with Raspberry Pi.
2. No more cloud; let’s make privacy-first voice commands a reality.
3. Run a custom voice assistant using Home Assistant and Whisper.
4. Control your home offline with local voice automation.
5. Replace Alexa with your own AI using Piper TTS.
6. Setup a local AI assistant that answers like Terry Crews!
7. Customize wake words and commands with Home Assistant.
8. Fully local speech-to-text with Whisper, no cloud required.
9. Train your own AI assistant’s voice with Piper.
10. Learn how to integrate Ollama with Home Assistant.
11. Set up a private, offline AI voice assistant from scratch.
12. Privacy-focused home automation with a Raspberry Pi.
13. Create your voice assistant with a unique personality.
14. Offload voice processing to your AI server for speed.
15. Use the Wyoming protocol for secure, private voice commands.
16. Follow this step-by-step tutorial for a local AI assistant.
17. Achieve full voice control offline with Home Assistant’s Assist.
18. Level up with Whisper, Piper, and Ollama – no cloud.
19. Equip Raspberry Pi with the ReSpeaker Pi Hat for voice.
20. Make Raspberry Pi your private AI assistant’s powerhouse.
21. Step-by-step setup for DIY voice automation at home.
22. Use Open Wake Word for custom assistant wake commands.
23. Fully offline, voice-powered smart home with Whisper and Piper.
24. Achieve seamless voice-to-text processing locally.
25. Run your AI assistant on Raspberry Pi or a dedicated server.

#homeassistant #alexa #ollama

Read More

Want to play with the technology yourself? Explore our interactive demo for watsonx.ai → https://ibm.biz/Bdvu3f

Welcome to IBM Tech Now, a bi-weekly series bringing you the latest and greatest IBM technology news and announcements.

This week we’re covering the following topics:
(00:15) 1. IBM Guardium Quantum Safe: https://ibm.biz/itn-ibm-guardium-quantum-safe
(01:22) 2. IBM Concert Resilience Lens: https://ibm.biz/itn-ibm-concert-resilience-lens
(02:22) 3. Apptio portfolio on Azure: https://ibm.biz/apptio-portfolio-on-azure

Subscribe to the IBM Cloud channel to be notified when a new IBM Tech Now video publishes → http://ibm.biz/subscribe-now

AI news moves fast. Sign up for the weekly Think newsletter → https://ibm.biz/tech-now-think-newsletter

Read More

Download the AI model guide to learn more → https://ibm.biz/Bdan6Z
Learn more about AI solutions → https://ibm.biz/Bdan62

Writing code can be a massive headache, even for seasoned developers. Code summarization is a tool that uses AI to generate code snippets or explain existing code in plain English. Join Chad Allison as he explores the benefits of code summarization in software development, from code translation to team collaboration. Learn how this game-changing technology can help you write better code, translate code from one language to another, and keep your team on the same page.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM → https://ibm.biz/Bdan6q

Read More