Read the Cloud Threat Landscape Report β†’ https://ibm.biz/BdaXnm
Learn more about AI for Cybersecurity β†’ https://ibm.biz/BdaXnK

The cloud is a prime target for cyber attacks, but there are steps you can take to protect your organization. Join cybersecurity expert Jeff Crume as he discusses the latest cloud security threats and shares recommendations for implementing robust security measures. Learn how to safeguard your cloud environment and stay ahead of the threats.

Read the Cost of a Data Breach report β†’ https://ibm.biz/BdaXnn

Read More

SUPPORT MY WORK BY BECOMMING PATREON
—————————————————
https://patreon.com/Lsecqt

Curious about the necessity of malware development? In this detailed video, we explore how malware development contributes to the field of cybersecurity. Understand the role of malware in threat analysis, vulnerability testing, and security enhancements. Discover why ethical hackers and cybersecurity experts consider malware development a crucial part of their toolkit.

πŸ“Œ Highlights:

– The importance of malware in cybersecurity research
– How malware helps in identifying system weaknesses
– Ethical implications and responsible use of malware

🌟 Subscribe for more in-depth videos on cybersecurity and tech trends!

πŸ‘ If this video was useful, please hit the like button and share your thoughts in the comments!

FOLLOW ME
—————————————————
Twitter: https://twitter.com/lsecqt
Twitch: https://www.twitch.tv/lsecqt
Reddit: https://www.reddit.com/user/lsecqt
Medium: https://medium.com/@lsecqt
Support my Work: https://www.buymeacoffee.com/lsecqt
Red Teaming Army Discord Server: https://discord.gg/dWCe5ZMvtQ Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/
Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/

malware development
maldev
coding malware
hacking

Read More

Malcat is a powerful binary file dissector that’s essential for Windows and Linux IT-security professionals. As both a feature-rich hexadecimal editor and a disassembler, Malcat offers a comprehensive toolkit for in-depth binary analysis.

Join us as we dive deep into Malcat with its creator. We’ll explore its key features, learn how to leverage its capabilities effectively, and witness a live demo where Malcat is used to dissect an NSIS dropper and emulate shellcode.

Don’t miss this opportunity to gain valuable insights and enhance your binary analysis skills.

The demo will be based on this blog post, in case you want to follow along:

https://malcat.fr/blog/reversing-a-nsis-dropper-using-quick-and-dirty-shellcode-emulation/

Read More

Learn more about artificial intelligence β†’ https://ibm.biz/BdajP6
IBM X-Force Cloud Threat Landscape Report β†’ https://ibm.biz/BdajPU

Will DeepDive replace the Mixture of Experts podcast? In Episode 23, host Tim Hwang is joined by IBM Researchers Marina Danilevsky, Nathalie Baracaldo and Vagner Santana to dissect this week’s AI news. First, the experts talk about the hype around Google’s NotebookLM, specifically regarding the DeepDive podcast feature. Next, OpenAI DevDay sparks some interesting conversation around vision fine-tuning and multimodality. Finally, it’s Cybersecurity Awareness Month and IBM X-Force released the Cloud Threat Landscape Report. Will AI prevent phishing attacks? Tune-in to this week’s episode to learn more!

Intro – 0:00
AI prevent phising – 1:05
NotebookLM – 12:18
OpenAI DevDay – 23:01

Subscribe for AI updates β†’ https://ibm.biz/BdajP5

The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.

Read More

Want to try for yourself? Find the code on Github β†’ https://github.com/nicknochnack/beeagent
Learn more about the technology β†’ https://ibm.biz/BdarpJ

In this tutorial, Nicholas Renotte will guide you through the process of creating a robust and intelligent agent using the Bee Agent Framework. You’ll learn how to harness the power of Large Language Models (LLMs) to generate responses, integrate tools, and leverage code to build a sophisticated agent. From setup to deployment, learn the essential steps to help you achieve your goals.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/Bdarpu

Read More

SUPPORT MY WORK BY BECOMMING PATREON
—————————————————
https://patreon.com/Lsecqt

Curious about the necessity of malware development? In this detailed video, we explore how malware development contributes to the field of cybersecurity. Understand the role of malware in threat analysis, vulnerability testing, and security enhancements. Discover why ethical hackers and cybersecurity experts consider malware development a crucial part of their toolkit.

πŸ“Œ Highlights:

– The importance of malware in cybersecurity research
– How malware helps in identifying system weaknesses
– Ethical implications and responsible use of malware

🌟 Subscribe for more in-depth videos on cybersecurity and tech trends!

πŸ‘ If this video was useful, please hit the like button and share your thoughts in the comments!

FOLLOW ME
—————————————————
Twitter: https://twitter.com/lsecqt
Twitch: https://www.twitch.tv/lsecqt
Reddit: https://www.reddit.com/user/lsecqt
Medium: https://medium.com/@lsecqt
Support my Work: https://www.buymeacoffee.com/lsecqt
Red Teaming Army Discord Server: https://discord.gg/dWCe5ZMvtQ Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/
Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/

malware development
maldev
coding malware
hacking

Read More

Peter Manev of Stamus Networks is a long-time Suricata contributor, creator of the Threat Hunting platform SELKS, and co-founder of Stamus Networks. Join us for an informal discussion around network security monitoring, managing a popular Linux distribution, some threat hunting tips and much more!

πŸ”₯ Join this channel to get access to perks:
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA/join

Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
πŸŽ“ Courses on Pluralsight πŸ‘‰πŸ» https://www.pluralsight.com/authors/josh-stroschein
🌢️ YouTube πŸ‘‰πŸ» Like, Comment & Subscribe!
πŸ™πŸ» Support my work πŸ‘‰πŸ» https://patreon.com/JoshStroschein
🌎 Follow me πŸ‘‰πŸ» https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
βš™οΈ Tinker with me on Github πŸ‘‰πŸ» https://github.com/jstrosch
🀝 Join the Discord community and more πŸ‘‰πŸ» https://www.thecyberyeti.com

22:00 MS/AD Lataeral Movement with SamrEnumerate
24:30 Steps to complete to follow along
28:00 Getting into SELKS
30:00 Filter sets to help hunt in traffic
36:00 Detections methods and IDS alerts
40:30 Kibana and SELKS dashboards
46:00 File Transactions
54:00 Q&A

Read More

In Episode 20 of Darknet Diaries, we heard from Greg aka β€œmobman” who said he created the sub7 malware. Something didn’t sit right with a lot of people about that episode. It’s time to revisit that episode and get to the bottom of things.

Visit https://darknetdiaries.com/episode/150/ for a list of sources, full transcripts, and to listen to all episodes.

Read More

⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️

@endingwithali β†’
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev

NEW VIDEO: https://www.youtube.com/watch?v=17lyi46UzA0&ab_channel=AliDiamond

Want to work with Ali? [email protected]

[❗] Join the Patreonβ†’ https://patreon.com/threatwire
00:00 0 – Intro
00:07 1 – Mega Meta Fine
01:24 2 – Kia Web App Vulnerability
03:20 3 – Linux CUPS CVE
05:42 4 – Outro

LINKS
πŸ”— Story 1: Mega Meta Fine
https://www.dataprotection.ie/en/news-media/press-releases/data-protection-commission-opens-statutory-inquiry-facebook-0
https://krebsonsecurity.com/2019/03/facebook-stored-hundreds-of-millions-of-user-passwords-in-plain-text-for-years/
https://petapixel.com/2024/09/30/meta-fined-102-million-for-storing-users-passwords-in-plain-text/
πŸ”— Story 2: Kia Web App Vulnerability
https://samcurry.net/hacking-kia
πŸ”— Story 3: Linux CUPS CVE
Out of respect for the victims of the security researcher from the CUPS story, I’ve chosen not to link to any of the researcher’s work. If you believe you’re a victim of domestic abuse, please check out https://www.thehotline.org/ for more resources.
https://www.aquasec.com/blog/cups-a-critical-9-9-linux-vulnerability-reviewed/
https://securitylabs.datadoghq.com/articles/emerging-vulnerability-cups/

—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†—–β˜†
Our Site β†’ https://www.hak5.org
Shop β†’ http://hakshop.myshopify.com/
Community β†’ https://www.hak5.org/community
Subscribe β†’ https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support β†’ https://www.patreon.com/threatwire
Contact Us β†’ http://www.twitter.com/hak5
____________________________________________

Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

What happened to the 9.9 CVSS Linux CVE? – ThreatWire

Read More

Let’s talk about a “security flaw in hospital software that allows full access to medical devices”. This issue was disclosed on LinkedIn and included a full exploit code. Let’s use this app as an example on how to find a macOS privilege escalation and learn how local root exploits can work.
Print BINGO sheet: https://twitter.com/liveoverflow/status/1682650394227351552

Sources:
Original LinkedIn Post: https://web.archive.org/web/20230424004137/https://www.linkedin.com/posts/jeanpereira00_sicherheitsl%C3%BCcke-in-krankenhaus-software-activity-7055185115584303104-2eZr
The Exploit code: https://0day.today/exploit/38531
“The project has been deprecated for 2 years. Version 1.0.0-beta has been an EOL for at least 5 years” – developer statement: https://twitter.com/tehkapa/status/1650059269939552256

My references finding priv esc issues in macOS apps:
https://github.com/cure53/Publications/blob/master/summary-report_tunnelbear.pdf
https://github.com/cure53/Publications/blob/master/summary-report_tunnelbear_2018.pdf
https://github.com/cure53/Publications/blob/master/summary-report_tunnelbear_2019.pdf
https://github.com/cure53/Publications/blob/master/pentest-report_IVPN.pdf

Help me pay for any legal trouble in case somebody wants to sue me (advertisement): https://shop.liveoverflow.com/

Chapters:
00:00 – Intro: Practice Research with Existing Issues
01:45 – HospitalRun Functionality
03:07 – What is a Local Root Exploit?
05:49 – Typical macOS Priviledge Escalation Issues
09:23 – Looking for Priviledged Helper in HospitalRun
10:10 – My Experience in finding Local Root Exploits on macOS
11:46 – Threat Modeling and Common Deployments
13:11 – Was this an April Fools Joke?
14:18 – Analysing and Cleaning Up The Exploit Code
17:51 – Reading Comments on LinkedIn
19:29 – BINGO!

=[ ❀️ Support ]=

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ πŸ• Social ]=

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Streaming: https://twitch.tvLiveOverflow/
β†’ TikTok: https://www.tiktok.com/@liveoverflow_
β†’ Instagram: https://instagram.com/LiveOverflow/
β†’ Blog: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

Read More

Get our 158-page System Design PDF for free by subscribing to our weekly newsletter: https://bit.ly/bytebytegoYTshorts

Animation tools: Adobe Illustrator and After Effects.

Checkout our bestselling System Design Interview books:
Volume 1: https://amzn.to/3Ou7gkd
Volume 2: https://amzn.to/3HqGozy

The digital version of System Design Interview books: https://bit.ly/3mlDSk9

ABOUT US:
Covering topics and trends in large-scale system design, from the authors of the best-selling System Design Interview series.

Read More

Tired of managing authentication or dealing with costly auth providers? Try PropelAuth.

Use code BYTE24 for 50% off their Growth plan for 6 months: https://www.propelauth.com/

——-
Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bit.ly/bytebytegoytTopic

Animation tools: Adobe Illustrator and After Effects.

Checkout our bestselling System Design Interview books:
Volume 1: https://amzn.to/3Ou7gkd
Volume 2: https://amzn.to/3HqGozy

The digital version of System Design Interview books: https://bit.ly/3mlDSk9

ABOUT US:
Covering topics and trends in large-scale system design, from the authors of the best-selling System Design Interview series.

Read More

Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bit.ly/bytebytegoytTopic

Animation tools: Adobe Illustrator and After Effects.

Checkout our bestselling System Design Interview books:
Volume 1: https://amzn.to/3Ou7gkd
Volume 2: https://amzn.to/3HqGozy

The digital version of System Design Interview books: https://bit.ly/3mlDSk9

ABOUT US:
Covering topics and trends in large-scale system design, from the authors of the best-selling System Design Interview series.

Read More