⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️

@endingwithali β†’
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev

Want to work with Ali? [email protected]

[❗] Join the Patreonβ†’ https://patreon.com/threatwire
0:00 0 – Intro
0:07 1 – Record Breaking DDoS Attack
1:46 2 – CUPS DDoS
3:56 3 – Telegram Gave Data
4:34 4 – Outro

LINKS
πŸ”— Story 1: Record Breaking DDoS Attack
https://blog.cloudflare.com/how-cloudflare-auto-mitigated-world-record-3-8-tbps-ddos-attack/
https://censys.com/june-20-improper-authentication-vulnerability-in-asus-routers/
πŸ”— Story 2: CUPS DDoS
https://www.akamai.com/blog/security-research/october-cups-ddos-threat
https://www.bleepingcomputer.com/news/security/recently-patched-cups-flaw-can-be-used-to-amplify-ddos-attacks/
πŸ”— Story 3: Telegram Gave Data
https://www.404media.co/telegram-confirms-it-gave-u-s-user-data-to-the-cops/
—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†
Our Site β†’ https://www.hak5.org
Shop β†’ http://hakshop.myshopify.com/
Community β†’ https://www.hak5.org/community
Subscribe β†’ https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support β†’ https://www.patreon.com/threatwire
Contact Us β†’ http://www.twitter.com/hak5
____________________________________________

Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Read More

Want to play with the technology yourself? β†’ https://ibm.biz/BdaRHv
Learn more about the technology β†’ https://ibm.biz/BdaRHK

In this video, Sanket Panda explains what Quantum Serverless is and how it helps manage quantum and classical resources across the development workflow. The video covers the need for flexible tools to manage different resources, such as CPUs, GPUs, and QPUs, and how Quantum Serverless provides a solution for long-running workloads that require flexible resources.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/BdaRHa

Read More

AWS GuardDuty Runtime Monitoring for EC2 detects threats in real-time by monitoring processes through an agent. In this tutorial, we’ll create a malware, download the malware into the target server, then trigger a reverse shell, showing GuardDuty’s capability on detecting suspicious and malicious activity.

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Read More

Get NordVPN 2Y plan + 4 months extra plus up to 20 GB Saily data voucher ➼ https://nordvpn.com/networkchuck

It’s risk-free with Nord’s 30-day money-back guarantee!

In this video, I install a high-precision time server in my studio using the OpenTimeCard Mini from TimeBeat. Instead of relying on external Network Time Protocol (NTP) servers, I’m hosting my own time server to achieve nanosecond-level accuracy using Precision Time Protocol (PTP).
The OpenTimeCard Mini combines a GPS module that receives signals from satellites equipped with atomic clocks and a Raspberry Pi Compute Module 4 (CM4) acting as the server. This setup allows me to synchronize all the clocks on my network with unprecedented precision.

Additional Information:
β€’ The Birth of Atomic Clocks: The first practical atomic clock was developed in 1955 by Louis Essen at the National Physical Laboratory in the UK. By 1967, the second was redefined based on the vibrations of cesium atoms, marking a significant leap in timekeeping accuracy.
β€’ GPS Satellites and Timekeeping: The Global Positioning System (GPS) began with the launch of its first satellite in 1978. These satellites carry atomic clocks that provide precise time signals, revolutionizing navigation and global time synchronization.
β€’ Understanding NTP Synchronization: The Network Time Protocol (NTP) dynamically adjusts its synchronization intervals, typically ranging from 64 to 1,024 seconds, to maintain accurate time across devices connected to the internet.
β€’ Time Zones and Global Standardization: The concept of standardized time zones was proposed by Sir Sandford Fleming in 1879. The 1884 International Meridian Conference endorsed these time zones, paving the way for the global timekeeping system we use today.
β€’ Raspberry Pi and Hardware Timestamping: While the Raspberry Pi Compute Module 4 (CM4) allows for hardware timestamping through additional network interfaces, the standard Raspberry Pi 4 does not support this feature on its built-in Ethernet port. The new Raspberry Pi 5 introduces hardware timestamping support directly on its Ethernet interface.
β€’ Why Nanosecond Accuracy Matters: Industries such as financial trading, where transactions happen in fractions of a second, rely heavily on precise time synchronization. Broadcasting and aerospace also require this level of accuracy to ensure seamless operations.
Further Reading and Resources:
β€’ TimeBeat’s OpenTimeCard Mini: https://store.timebeat.app/products/open-timecard-mini
β€’ TimeBeat Software: https://www.timebeat.app/solutions/
β€’ Understanding Precision Time Protocol (PTP): https://www.timebeat.app/blog/sync-showdown-ntp-vs-ptp-vs-tsn-vs-ethercat
β€’ History of Timekeeping: https://www.timebeat.app/blog/timekeeping-history-and-technology
β€’ Quartz Crystal Oscillators Explained: https://www.timebeat.app/blog/quartz-crystal-oscillators
β€’ Atomic Clocks and GPS Technology: https://www.timebeat.app/blog/atomic-clocks-gps-timing
β€’ Raspberry Pi Hardware Capabilities: https://www.timebeat.app/raspberry-pi-hardware-capabilities
β€’ Network Time Protocol (NTP) Details: https://www.timebeat.app/blog/sync-showdown-ntp-vs-ptp
β€’ Global Standard Time Zones: https://www.timebeat.app/blog/global-time-zones

πŸ”₯πŸ”₯Join the NetworkChuck Academy!: https://ntck.co/NCAcademy

**Sponsored by NordVPN

SUPPORT NETWORKCHUCK
—————————————————
β˜•β˜• COFFEE and MERCH: https://ntck.co/coffee
πŸ†˜πŸ†˜NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck

FOLLOW ME EVERYWHERE
—————————————————
Instagram: https://www.instagram.com/networkchuck/
Twitter: https://twitter.com/networkchuck
Facebook: https://www.facebook.com/NetworkChuck/
Join the Discord server: http://bit.ly/nc-discord

AFFILIATES & REFERRALS
—————————————————
(GEAR I USE…STUFF I RECOMMEND)
My network gear: https://geni.us/L6wyIUj
Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: https://geni.us/aBeqAL
Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!!
fast and reliable unifi in the cloud: https://hostifi.com/?via=chuck

1. How to set up a nanosecond-level time server using TimeBeat’s OpenTimeCard
2. Achieving precise time synchronization with Precision Time Protocol (PTP)
3. Installing a GPS-based time server with Raspberry Pi Compute Module 4
4. Understanding the difference between NTP and PTP for network timekeeping
5. Configuring TimeBeat software for nanosecond accuracy
6. Implementing hardware timestamping for ultra-precise timing
7. Step-by-step guide to setting up a Stratum 1 NTP server
8. Using GPS antennas for optimal time server reception
9. Exploring the history of timekeepingβ€”from sundials to atomic clocks
10. Why nanosecond-level synchronization is crucial in financial trading

#ptp #timeserver

Read More

Check out Snyk πŸ‘‰πŸΌ snyk.co/nahamsec
LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! πŸ‘

πŸ“š If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training
πŸ’» If you want to practice some of my free labs and challenges: https://app.hackinghub.io

πŸ’΅ FREE $200 DigitalOcean Credit:
https://m.do.co/c/3236319b9d0b

πŸ”— LINKS:
πŸ“– MY FAVORITE BOOKS:
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2
Hacking APIs: Breaking Web Application Programming Interfaces – https://amzn.to/45g4bOr
Black Hat GraphQL: Attacking Next Generation APIs – https://amzn.to/455F9l3

🍿 WATCH NEXT:
If I Started Bug Bounty Hunting in 2024, I’d Do this – https://youtu.be/z6O6McIDYhU
2023 How to Bug Bounty – https://youtu.be/FDeuOhE5MhU
Bug Bounty Hunting Full Time – https://youtu.be/watch?v=ukb79vAgRiY
Hacking An Online Casino – https://youtu.be/watch?v=2eIDxVrk4a8
WebApp Pentesting/Hacking Roadmap – https://youtu.be/watch?v=doFo0I_KU0o

MY OTHER SOCIALS:
🌍 My website – https://www.nahamsec.com/
πŸ‘¨β€πŸ’» My free labs – https://app.hackinghub.io/
🐦 Twitter – https://twitter.com/NahamSec
πŸ“Έ Instagram – https://instagram.com/NahamSec
πŸ‘¨β€πŸ’» Linkedin – https://www.linkedin.com/in/nahamsec/

WHO AM I?
If we haven’t met before, hey πŸ‘‹! I’m Ben, most people online know me online as NahamSec. I’m a hacker turned content creator. Through my videos on this channel, I share my experience as a top hacker and bug bounty hunter to help you become a better and more efficient hacker.

FYI: Some of the links I have in the description are affiliate links that I get a a percentage from.

#cybersecurity #hacking #bugbounty

Read More

SUPPORT MY WORK BY BECOMMING PATREON
—————————————————
https://patreon.com/Lsecqt

In this video, we dive deep into the world of malware development and discuss the best programming languages used by malware creators. We’ll explore the key differences between compiled and interpreted languages, and how each plays a role in the creation of malicious software.

What you’ll learn:

Why languages like C, C++, and Assembly are popular in malware development
How interpreted languages are used for scripting attacks and exploits
The differences between compiled and interpreted languages in terms of speed, security, and effectiveness
How malware creators choose the right language for specific attack types
Make sure to LIKE and SUBSCRIBE for more cybersecurity and programming content!
Got questions? Drop them in the comments!

#MalwareDevelopment #CyberSecurity #ProgrammingLanguages #CompiledLanguages #InterpretedLanguages #Malware #Hacking

Read More

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Read More

Improve your career using my code β€œSANDRA” for 30% off on all their programs! Sign up for a FREE TripleTen career consultation with my link: https://get.tripleten.com/WithSandra #TripleTen #bootcamp #TripleTenbootcamp

πŸ“• Get My FREE Cybersecurity Beginner Roadmap Guide: https://www.withsandra.dev/

πŸ‘― Join our Discord πŸ˜€ – https://discord.gg/2YZUVbbpr9

Connect on LinkedIn: https://www.linkedin.com/in/withsandra/
Instagram: https://www.instagram.com/cyberwithsandra
Luca’s SWE Channel: https://www.youtube.com/c/TechwithLuca

Disclaimer: All opinions expressed in videos on this YouTube channel are solely my own. Some links are affiliate links, as an Amazon Influencer, I earn from qualifying purchases.

❈ My Desk/Tech Stuff on Amazon ❈
https://www.amazon.com/shop/withlove.sandra

Top 5 Beginner Cybersecurity Projects: https://youtu.be/zc7LTa9q2nI

#cybersecurity #cybersecurityforbeginners #career #job #tech #income #techskills #portfolio
β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”

Current sub count: 112,010

Tags: How to Start a Career in Tech with No Experience in 2025,how to start a career in tech,how to start a tech career,how to start a tech career 2025,how to start a career in tech in 2025,how to get into tech,how to break into tech,how to get into tech with no experience,how to get into tech with no experience 2025,how to break into tech with no experience,how to become a cybersecurity analyst,how to become a software engineer,how to become a software engineer 2025,how to break into cybersecurity,how to start a tech career,how to start a tech career in 2025

Read More

Learn more about AI Infrastructure β†’ https://ibm.biz/BdaYHY
Learn more about Hybrid Cloud β†’ https://ibm.biz/BdaYHz
Learn more about IBM Concert β†’ https://ibm.biz/BdaYHq

Generative AI can be expensive. Host Albert Lawrence discusses both the obvious as well as hidden costs of deploying AI with Rebecca Gott, CTO IBM Power Systems and Penny Madsen, Senior Director of Research, IDC. Learn about the best ways to control costs as well get insight into some of value and ROI that firms are experiencing with early deployment. This hard-hitting episode tells it like it is when it comes to the challenges of cost for AI, supported by rich set of research data and wealth of client examples.

Learn more about costs, and control and how to leverage, instructure, and hybrid cloud to to control costs.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/BdaYHP

Read More

Assess your risk: take the Cyber Resiliency Assessment β†’ https://ibm.biz/BdaZ4e
Learn more about the technologyΒ β†’ https://ibm.biz/BdaZ4V

In today’s world, cyber attacks are inevitable. Learn how to quickly recover with a robust cyber resiliency plan. In this video, Grant Harris explains the 5 steps you need to reduce recovery time, protect your data with immutable snapshots, and automate the recovery process for maximum efficiency.

Read the Report: Shifting from Cybersecurity to Cyber Resilience β†’ https://ibm.biz/BdaZ4L

Read More

LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! πŸ‘

πŸ“š If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training
πŸ’» If you want to practice some of my free labs and challenges: https://app.hackinghub.io

πŸ’΅ FREE $200 DigitalOcean Credit:
https://m.do.co/c/3236319b9d0b

πŸ”— LINKS:
πŸ“– MY FAVORITE BOOKS:
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2
Hacking APIs: Breaking Web Application Programming Interfaces – https://amzn.to/45g4bOr
Black Hat GraphQL: Attacking Next Generation APIs – https://amzn.to/455F9l3

🍿 WATCH NEXT:
If I Started Bug Bounty Hunting in 2024, I’d Do this – https://youtu.be/z6O6McIDYhU
2023 How to Bug Bounty – https://youtu.be/FDeuOhE5MhU
Bug Bounty Hunting Full Time – https://youtu.be/watch?v=ukb79vAgRiY
Hacking An Online Casino – https://youtu.be/watch?v=2eIDxVrk4a8
WebApp Pentesting/Hacking Roadmap – https://youtu.be/watch?v=doFo0I_KU0o

MY OTHER SOCIALS:
🌍 My website – https://www.nahamsec.com/
πŸ‘¨β€πŸ’» My free labs – https://app.hackinghub.io/
🐦 Twitter – https://twitter.com/NahamSec
πŸ“Έ Instagram – https://instagram.com/NahamSec
πŸ‘¨β€πŸ’» Linkedin – https://www.linkedin.com/in/nahamsec/

WHO AM I?
If we haven’t met before, hey πŸ‘‹! I’m Ben, most people online know me online as NahamSec. I’m a hacker turned content creator. Through my videos on this channel, I share my experience as a top hacker and bug bounty hunter to help you become a better and more efficient hacker.

FYI: Some of the links I have in the description are affiliate links that I get a a percentage from.

Read More

Get the guide to responsible AI governance β†’ Β https://ibm.biz/BdK735
Learn more about the technology β†’ https://ibm.biz/BdK7Td

In this video, Vyoma Gajjar discusses the future of AI governance in 2024 and beyond, highlighting the importance of productionizing Gen AI methods, augmenting traditional AI practices, and addressing governance challenges. She outlines the key pillars of governance, including risk management, compliance management, and life cycle governance, and provides examples of using generative AI including for social media sentiment analysis.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/BdK7Tx

#AI #MachineLearning #AIGovernance #MLGovernance #GenAI #GenAIGovernance

Read More

This malware development course will prepare you to write C code for offense as an ethical hacker or penetration tester. Today we focus on pointers and memory. What are they?

SUPPORT MY WORK BY BECOMMING PATREON
—————————————————
https://patreon.com/Lsecqt

⚠️ DISCLAIMER: This video is for educational purposes only. The techniques demonstrated are intended solely for ethical hacking and lawful security testing on systems where you have explicit permission. Always follow legal guidelines and obtain proper authorization before conducting any security tests.

TIMESTAMPS
—————————————————
00:00 – Intro
00:50 – Value vs Reference
10:25 – Memory Allocation and Debugging
21:22 – Outro

FOLLOW ME
—————————————————
Patreon: https://patreon.com/Lsecqt
Twitter: https://twitter.com/lsecqt
Twitch: https://www.twitch.tv/lsecqt
Reddit: https://www.reddit.com/user/lsecqt
Medium: https://medium.com/@lsecqt
Support my Work: https://www.buymeacoffee.com/lsecqt
Red Teaming Army Discord Server: https://discord.gg/dWCe5ZMvtQ Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/
Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/

malware development
maldev
creating c2 agent
coding malware
hacking
ethical hacking

#EthicalHacking #MythicC2 #MalwareDevelopment #RedTeam #Cybersecurity #C2Agent #PenetrationTesting #LiveCoding

Read More

In this video, I’m breaking down 6 roles in cybersecurity, detailing what each role does, the expected salary, and the certifications you need to land the job. Whether you’re aiming to become a Security Analyst, Penetration Tester, or Cloud Security Engineer, I’ll give you an insight on these roles. Plus, I’ll cover how much you can expect to earn in each role and the certifications that will make you stand out. If you’re serious about a high-paying career in cybersecurity, this is the guide you need! #Cybersecurity #TechCareers #CareerGuide

// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join

// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/

// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD

// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.

Read More

⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️

@endingwithali β†’
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev

Want to work with Ali? [email protected]

[❗] Join the Patreonβ†’ https://patreon.com/threatwire
0:00 0 – Intro
0:05 1 – Chrome Security Updates
01:03 2 – Azure DDoS
02:14 3 – Outro

LINKS
πŸ”— Story 1: Chrome Security Updates
https://security.googleblog.com/2024/07/improving-security-of-chrome-cookies-on.html
πŸ”— Story 2: Azure DDoS
https://azure.status.microsoft/en-us/status/history/#incident-history-collapse-KTY1-HW8
—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†
Our Site β†’ https://www.hak5.org
Shop β†’ http://hakshop.myshopify.com/
Community β†’ https://www.hak5.org/community
Subscribe β†’ https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support β†’ https://www.patreon.com/threatwire
Contact Us β†’ http://www.twitter.com/hak5
____________________________________________

Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Read More