Black Hat USA 2025 | 2 Cops 2 Broadcasting: TETRA End-To-End Under Scrutiny
In this talk, we will present the first public security analysis of TETRA end-to-end encryption (E2EE) used for the most sensitive communications - such as those by intelligence agencies and special forces. In all-new material, we present seven security vulnerabilities pertaining to TETRA and its E2EE, three of which are critical. TETRA is a European standard for trunked radio used globally by police and military operators. Additionally, TETRA is widely deployed in industrial environments such as harbors and airports, as well as critical infrastructure such as SCADA telecontrol of pipelines, transportation and electric and water utilities. While we previously reverse-engineered and published the then-secret algorithms underpinning TETRA cryptography, the vendor-proprietary E2EE solution...
https://www.youtube.com/watch?v=oUhb2tTgmgg
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Hackers make FAKE notifications
https://jh.live/varonis || Secure your AI and the data that powers it, with Varonis! Try their free risk assessment: https://jh.live/varonis https://ipurple.team/2026/03/25/toast-notifications/ https://learn.microsoft.com/en-us/windows/apps/develop/notifications/app-notifications/adaptive-interactive-toasts?tabs=appsdk https://learn.microsoft.com/en-us/windows/apps/develop/notifications/app-notifications/toast-schema https://learn.microsoft.com/en-us/uwp/schemas/tiles/toastschema/element-action https://learn.microsoft.com/en-us/windows/apps/develop/notifications/app-notifications/toast-desktop-apps https://learn.microsoft.com/en-us/windows/win32/shell/enable-desktop-toast-with-appusermodelid https://learn.microsoft.com/en-us/windows/apps/develop/launch/handle-uri-activation https://learn.microsoft.com/en-us/windows/apps/design/shell/tiles-and-notifications/notifications-visualizer https://github.com/Windos/BurntToast Learn...
https://www.youtube.com/watch?v=wrAFZLa1TAk
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Soutenez No Hack Me sur Tipeee

L'Actu de la veille

🍍📟 Firmware 1.0.8 - WiFi Pineapple Pager
Firmware 1.0.8 for the WiFi Pineapple Pager is out now! Update over-the-air on device, or download it from downloads.hak5.org ____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
https://www.youtube.com/watch?v=mS1iQXPOA9o
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Black Hat USA 2025 | Bypassing PQC Signature Verification with Fault Injection
Post-quantum cryptographic (PQC) algorithms are being integrated into firmware, bootloaders, and other embedded systems as a replacement for RSA and ECC. While these schemes are designed to resist quantum attacks, their implementations remain vulnerable to classical fault injection techniques. This talk presents practical voltage fault injection attacks on three major PQC signature schemes: Dilithium, XMSS, and SPHINCS+. By targeting signature verification logic — including challenge generation, bit shifts, and checksum validation — we demonstrate how to forge valid signatures without breaking the underlying cryptographic primitives. All attacks are performed on real microcontroller hardware using open-source PQC libraries running on bare metal. We also show how shared components like...
https://www.youtube.com/watch?v=JS30uepSuMo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Black Hat USA 2025 | The 5G Titanic
5G networks are designed with advanced protections to counter interception, fraud, and denial-of-service attacks. But what happens when an attacker leverages legitimate protocol semantics to navigate beyond intended security boundaries? This talk presents a new class of attacks that exploit subtle flaws in the design and deployment of 5G user plane architecture. Through hands-on evaluation across multiple commercial and open-source 5G cores, we demonstrate how trust assumptions in user-plane traffic can be broken—enabling communication with otherwise unreachable core systems. The findings expose limitations in current protections and call for a reexamination of user plane trust in 5G architectures. By: Altaf Shaik | Senior Researcher, Fast IoT and TU Berlin Robert Jaschek | MS Student...
https://www.youtube.com/watch?v=AZ4y3ODsVW4
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

An AI Hacker Showed Me How to Exfil Data in Zero Clicks
LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 Episode 2 of Becoming an AI Hacker. This time I sat down with Ads and learned how to actually exfiltrate data from AI chatbots. We cover: - Threat modeling for AI chatbots - Finding the Q parameter (delivery mechanism) - Exfiltration via markdown links (single click) - Exfiltration via markdown images (zero click) - DNS exfil when markdown is blocked - Indirect prompt injection Challenge: Find a chatbot and try to exfil your own data. Drop your results in the comments. Episode 1: https://www.youtube.com/watch?v=dG6NFXQOmsE 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE...
https://www.youtube.com/watch?v=BFcXTxHLaKE
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

L'Actu à J-2

Black Hat USA 2025 | AI Agents for Offsec with Zero False Positives
Large language models are increasingly helping to automate vulnerability discovery and exploit development in real-world software. However, naïvely asking LLMs to identify vulnerabilities leads to a deluge of false positives that can drown out real findings. In this talk, we will present techniques that enable AI agents to find vulnerabilities at scale, fully autonomously and with zero false positives. The key to our approach is developing robust exploit validators that can conclusively determine whether an exploit claimed by the agent is real, allowing the agent to make arbitrarily many attempts without increasing the amount of human effort needed to review the results. Using these techniques, we were able to test thousands of web apps found on Docker Hub, identifying over 200 zero days...
https://www.youtube.com/watch?v=8voNmYCUXSk
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

WhatsApp Hackers for Hire on the Dark Web (Surprisingly cheap)
Thank you to ThreatLocker for sponsoring my trip to ZTW26 and also for sponsoring this video. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal // Colin Ellis' SOCIAL // LinkedIn: https://www.linkedin.com/in/collinellis95/ // ThreatLocker's SOCIAL // LinkedIn: https://www.linkedin.com/company/threatlockerinc/posts/?feedView=all X: https://x.com/threatlocker Instagram: https://www.instagram.com/threatlocker/ Website: https://www.threatlocker.com/ // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb X: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal...
https://www.youtube.com/watch?v=t_Oy395P4Q0
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Black Hat USA 2025 | Protecting Small Organizations in the Era of AI Bots
Small organizations, startups, and self-hosted servers face increasing strain from automated web crawlers and AI bots, whose online presence has increased dramatically in the past few years (2024 Impreva, Bad Bot Report). Modern bots evade traditional throttling and can degrade server performance through sheer volume even when they are well-behaved. Current tools which use public, shared blocklists for detection quickly go out of date, with one study indicating that 87% of new attacks are not on such lists (Li et al. 2021, Good Bot, Bad Bot). Our interest is in detecting any mechanical access patterns, whether well behaved or malicious, and distinguishing those from human patterns. We introduce an open source, command line tool, Logrip, and a novel security approach that leverages data visualization...
https://www.youtube.com/watch?v=S5DJtN1FDYo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

L'Actu des jours précédents

🔴 [PAYLOAD REVIEW] WiFi Pineapple Pager 📟🍍

https://www.youtube.com/watch?v=LW-g9Aea3Zw
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Black Hat USA 2025 | Kernel-Enforced DNS Exfiltration Security
Kernel-Enforced DNS Exfiltration Security: Framework Built for Cloud Environments to Stop Data Breaches via DNS at Scale DNS-based data exfiltration via C2 channels and DNS tunneling is a critical cybersecurity challenge, as DNS is a foundational protocol that must remain open on firewalls. Attackers now use DNS not just for exfiltration, but to establish backdoors, execute remote commands, and maintain persistent control over compromised systems. With the evolving scale of C2 infrastructure—leveraging multiplayer C2 modes and botnets—real-time prevention becomes significantly more complex, especially when aiming for zero data loss and accurate process-level implant termination at the endpoint. Traditional defenses rely heavily on timing and volume-based passive anomaly detection, signature-based...
https://www.youtube.com/watch?v=Yh9C1Xn_ixo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Black Hat USA 2025 | Burning, Trashing, Spacecraft Crashing
Burning, Trashing, Spacecraft Crashing: A Collection of Vulnerabilities That Will End Your Space Mission The frequency of space missions has been increasing in recent years, raising concerns about security breaches and satellite cyber threats. Each space mission relies on highly specialized hardware and software components that communicate through dedicated protocols and standards developed for mission-specific purposes. Numerous potential failure points exist across both the space and ground segments, any of which could compromise mission integrity. Given the critical role that space-based infrastructure plays in modern society, every component involved in space missions should be recognized as part of critical infrastructure and afforded the highest level of security consideration. This...
https://www.youtube.com/watch?v=uLZab4pe4X0
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

AI Cyber Defense Ops Course Launch!
Just Hacking Training livestream with Anton Ovrutsky to announce and celebrate his new course launch: "AI Cyber Defense Ops" available at https://justhacking.com
https://www.youtube.com/watch?v=8WCLOIQ2NuM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Black Hat USA 2025 | Universal and Context-Independent Triggers for Precise Control of LLM Outputs
In this talk, we will introduce a novel gradient-based prompt-injection technique that can generate universal triggers to manipulate open-source Large Language Model (LLM) outputs. While previous attacks often depend heavily on prompt context or require multiple iterations to fully control the model's behavior, our method discovers "universal and context-independent triggers" that force the LLM to produce precisely crafted, attacker-chosen text—regardless of the original prompt or task. We will outline how these triggers are discovered via discrete gradient descent on extensive and diverse instruction datasets. Our demonstrations will show how such triggers can be applied to attack open source LLM applications to achieve remote code execution. Furthermore, we will discuss the substantial...
https://www.youtube.com/watch?v=W8zzpTGVHRE
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Black Hat USA 2025 | Decoding Signal: Understanding the Real Privacy Guarantees of E2EE
In this talk, we will explore the security foundations of Signal, one of the commonly used end-to-end encrypted (E2EE) messaging applications. As an application security engineer, I'll guide the audience through the inner workings of Signal, including the Double Ratchet protocols that provide forward and backward secrecy, while also highlighting risks, including a real 0-click vulnerability. We'll begin with an overview of Signal's architecture, examining its client-server model and how its unique tech stack, particularly the use of Rust, reduces memory corruption vulnerabilities in the Signal protocol. Next, we'll dive into Signal's 1:1 messaging system, breaking down key cryptographic protocols like Double Ratchet and Sealed Sender, which enable various privacy guarantees. A key challenge...
https://www.youtube.com/watch?v=CxnBO2gxMyI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Extremely Easy Identity Management (with Authentik!)
https://jh.live/authentik || Take a look at the cool stuff authentik is cooking up 😊 https://jh.live/authentik Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training See what else I'm up to with: https://jh.live/newsletter ℹ️ Affiliates: Learn how to code with CodeCrafters: https://jh.live/codecrafters Host your own VPN with OpenVPN: https://jh.live/openvpn Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense
https://www.youtube.com/watch?v=2ttrqnw5kDE
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

AppSec Israel Highlight
- Managed by the OWASP® Foundation https://owasp.org/
https://www.youtube.com/watch?v=pKBb3vSh7HU
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

OWASP AppSec Day France Highlight
- Managed by the OWASP® Foundation https://owasp.org/
https://www.youtube.com/watch?v=gBJjGpOLb_g
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

German OWASP Day Highlight
- Managed by the OWASP® Foundation https://owasp.org/
https://www.youtube.com/watch?v=k99TYEEc-8Q
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Beyond the Checklist: Adversary Simulation for Proactive Insecure Design Discovery track 2
Standard penetration tests often focus on implementation bugs, but the most critical breaches stem from Insecure Design (OWASP Top 10 A04:2021). This session, presented from the perspective of an active red teamer and adversary simulation specialist, dives into the gap between theoretical threat modeling and real-world attack path exploitation. We will explore how to translate high-level adversary tactics (like those in MITRE ATT&CK) into proactive design reviews and custom attack scenarios. Learn to move beyond surface-level vulnerabilities by building and leveraging custom tooling and simulation techniques that specifically target design flaws, authentication/authorization logic, and chained architectural weaknesses in modern application environments (e.g., Cloud, Serverless). Attendees...
https://www.youtube.com/watch?v=k8M9pQEhWCk
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Securing Apps Without a Budget: Minimal Viable Security Strategies track 2
Not every team has a security budget. Not every project has a dedicated AppSec engineer. But every product exposed to the internet needs some level of security to survive. This talk explores what I call “The AppSec Poverty Line” also known as ‘Minimal Viable Security” — the minimum viable set of practices, tools, and cultural shifts that under-resourced dev teams can adopt to meaningfully improve application security. Whether you're a startup with no security hires, an independent dev, or part of a team that doesn't have a security budget, this talk will help you prioritize what actually matters. We'll cover practical approaches to getting from zero to secure-ish, with a focus on: • Training developers to write more secure code, and spot unsafe code • Cultivating a security-positive...
https://www.youtube.com/watch?v=bf1nBpjf5iI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

MCP Deception Incubator — Honeytraps as a Framework for Zero Trust AI Environments track 2
As AI agents gain autonomy through the Model Context Protocol (MCP), they increasingly access internal APIs, secrets, and systems—often beyond traditional security visibility or control. These agent-to-agent (A2A) interactions introduce new reconnaissance blind spots and exposure pathways inside modern Zero Trust environments. Building on continued research, this session introduces the MCP Deception Incubator—a deception-as-a-framework approach designed to detect rogue or unintended AI behavior at the reconnaissance stage. Built on serverless edge workers and open deception primitives such as Canarytokens, the framework enables defenders to deploy no-cost, high-fidelity MCP honeytraps across multiple surfaces, including APIs, DNS, kubeconfigs, and credentials—without operational overhead....
https://www.youtube.com/watch?v=amS0icidxOs
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

The Payload Podcast #005 - AI with Shane Caldwell

https://www.youtube.com/watch?v=wuJQCDdLfNA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Secure Financial Analytics with Homomorphic Encryption and GAN Driven Data Track 2
Financial systems demand strong security guarantees while still enabling high-value analytics. This session examines how homomorphic encryption (HE) and GAN-based synthetic data can advance secure financial intelligence in alignment with OWASP's mission of building trustworthy systems. Homomorphic encryption enables computation on encrypted data without ever decrypting it, eliminating exposure of sensitive financial records during analysis. Modern GPU-optimised HE frameworks now support SQL-like queries and lightweight machine-learning inference directly on encrypted transaction datasets, bringing performance close to traditional execution and reducing operational overhead previously associated with secure multi-party approaches. Integrating HE into ETL and analytics workflows strengthens...
https://www.youtube.com/watch?v=UMFyWWBQP4Q
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Noise vs. Signal: The Central Paradox of LLMs in Threat Modeling track 2
Large Language Models promise faster, automated threat modeling. But in practice, they introduce a fundamental and intractable failure mode, which we call “The Central Paradox”. When asked to generate all possible threats, LLMs produce excessive noise that overwhelms developers and AppSec teams. Yet, when asked to identify only the “important” threats, the same models demonstrate properties that are non-deterministic, opaque, and untrustworthy. You cannot rely on their selections with 100% confidence, and you cannot reproduce their choices. Used indiscriminately in threat modeling, LLMs generate more work, reduce reliability, undermine credibility with stakeholders, and create an absence of regulatory readiness. This talk dissects the Central Paradox and explains why threat modeling,...
https://www.youtube.com/watch?v=OQkzw8TEEu8
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Trust No One – Especially the Agents Building Zero Trust Through Machine Identity Track 2
Zero Trust has always been about verifying every user and device - but what happens when the actor isn't human at all? Autonomous systems and AI agents are now executing code, provisioning infrastructure, and making operational decisions in production environments. Yet, these systems often operate on implicit trust, static credentials, or shared secrets - the opposite of Zero Trust principles. This talk explores how organizations can extend Zero Trust beyond humans by using machine identity as the foundation for verifiable trust. Attendees will learn how open standards like SPIFFE and SPIRE can be adopted to federate and manage access for machine identities and AI agents. We'll walk through architectural patterns and practical steps to embed machine identity into modern application design...
https://www.youtube.com/watch?v=JM_Y_uSR6Lk
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Stop Lecturing, Start Playing! track 1
Shift-left doesn't start with scanning the code for security vulnerabilities; it begins with designing it. Too often, the shift-left mantra consists of implementing AI code scanning and applying AI-powered security fixes for remediation. Also, don't forget to implement the AI-powered benchmark for AI-Powered Security Fixes. Should security architecture, security requirement analysis, penetration testing, and threat modeling be conducted by security professionals, or is the answer to automate everything? Don't automate yourself away from thinking! Design must start before coding, and being agile means that the whole team needs to participate. This is not work done by security champions, but by everyone on the development team, not only the selected few, but an army of appsec volunteers....
https://www.youtube.com/watch?v=z8fd4E2gtT8
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

From Logs to Defense: Building AI Enhanced XDR Pipelines for Application Level Threats track 1
Security teams collect huge volumes of application logs every day, yet many organizations struggle to turn those logs into timely and meaningful security actions. This talk introduces a simple, approachable way to think about how logs can evolve into real defenses using AI-enhanced XDR pipelines. Starting from the basics, we will explore what application logs are, why they matter for security, and how they can be used as signals to detect potential threats. The session then walks through how AI can help identify unusual behavior in logs and how those insights can flow into an XDR pipeline to support detection and response at the application level. This talk focuses on concepts and practical understanding rather than complex algorithms or advanced security theory. No prior experience with...
https://www.youtube.com/watch?v=wqbqtMqlOqM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Connecting the dots: 5 lessons learned from an 8 year journey of an AppSec Program track 1
Steve Jobs famously said in one of his most memorable speeches, “You can't connect the dots looking forward; you can only connect them looking backward.” In this talk, I'll show you how that perfectly applies to an AppSec program. I'll share the five most important lessons I learned during my eight-year journey leading the AppSec program at one of Latin America's largest banks. Max Alejandro Gómez Sánchez Vergaray Application Security Program Leader I designed and led the application security program during the digital transformation process of one of the largest banks in Latin America, training more than 3,000 people in secure software development, specially in Secure Design using OWASP Cornucopia, another tools for threat modeling and in DevSecOps. I´m a Cornucopia Contributor,...
https://www.youtube.com/watch?v=rX9tSR_i3hs
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

It's Giving Insecure Vibes: Secure Coding Literacy for Vibe Coders Track 1
Vibe coding has a time and a place: it is great for making quick prototypes, and is very tempting for less technical folks. However, those who don't understand their own code will be blissfully unaware of the many security vulnerabilities that AI assistants can introduce. In this presentation, I will cover a variety of common vulnerabilities that can be introduced from vibe coding, and then how to recognize and fix them. I will also cover how to prompt genAI tools to code more securely and help you review your code, as well as how to take a hybrid approach with AI-advised coding. This is a crucial topic for anyone venturing into vibe coding, as well as any team leads who are starting to see AI-generated code introduced by more junior members. Betta Lyon Delsordo AWS Ethical Hacker Betta...
https://www.youtube.com/watch?v=h043nFYrGyA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

9125 Days of OWASP Did We Make Software Safer?
OWASP helped teach the world how software breaks. The next challenge is ensuring it does not. Over 25 years we created the Top 10, testing standards, ASVS and a generation of security practitioners. Yet modern systems are more complex, more connected, and more fragile than ever. I want to explore how we move beyond advice and into assurance, embedding security as a verifiable engineering property rather than an afterthought. The future of OWASP is not more guidance. It is measurable, automatable, and built in by default. Daniel Cuthbert Santander Group Global Head of Cyber Security Research Daniel Cuthbert is a senior security researcher, technologist, and long-standing contributor to the global cybersecurity community. He serves as Global Head of Cyber Security Research for the Santander...
https://www.youtube.com/watch?v=4FrXRSgYjdc
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

“The Developer First Security Mindset” Making Security a Product Feature, Not a Blocker
Security doesn't have to be the department of “no.” This talk reimagines AppSec through the developer's lens where security becomes a product enabler, not an obstacle. We'll explore how to integrate guardrails instead of gates, and how to align secure coding with product velocity and customer value. Svitlana Samko Verizon Connect and CEO of W2Business IT Academy Senior Technical Project Manager Svitlana Samko is an experienced technology manager and visionary leader with 18 years of success managing and leading high-performing, innovative teams. She has a demonstrated ability to define and execute strategies that drive a product-centric culture, embed agile delivery practices, and consistently deliver complex initiatives on time and under budget. In recognition of her leadership...
https://www.youtube.com/watch?v=mqr1aqwSEZc
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

From Gut to Gold Standard: The Admiralty System in CTI
From Your Gut to a Gold Standard: Introducing the Admiralty System in CTI 🎙️ Freddy Murstad, Senior Threat Intelligence Advisor, Intelligence Tradecraft 📍 Presented at SANS CTI Summit 2026 This presentation introduces the Admiralty System, a time-tested framework originally used for evaluating intelligence. Today, this system offers CTI professionals a robust method for assessing the reliability of Cyber Threat Intelligence (CTI) in an increasingly complex digital landscape. The presentation will highlight its adaptability for addressing modern cybersecurity challenges and explore the system's historical context. A key focus will be on understanding the crucial distinction between Source Reliability (the trustworthiness of the origin of the information) and Information Credibility...
https://www.youtube.com/watch?v=y-CSDxMMXb0
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Hunting North Korea's Contagious Interview Operation
Hunting North Korea's State-Sponsored “Contagious Interview” Operation: Attacks on Developers via the Software Supply Chain 🎙️ Kirill Boychenko, Senior Threat Intelligence Analyst, Socket 📍 Presented at SANS CTI Summit 2026 North Korean state-sponsored threat actors behind the “Contagious Interview” operation blend social engineering with malicious open source packages to compromise developers and tech job seekers. Throughout 2025, we identified and analyzed hundreds of malicious npm packages (thousands of downloads) delivering stealthy, multi-stage loaders and infostealers that fetch the BeaverTail malware and the InvisibleFerret backdoor. Operators pose as recruiters on LinkedIn, deliver “coding assignments” via GitHub, Bitbucket, and Google Docs, and pressure targets...
https://www.youtube.com/watch?v=BJveyxO_t_c
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Can We Forecast CTI's Future? Mapping with SATs
Can We Forecast Our Own Fate? Mapping the Future of the CTI Industry with SATs 🎙️ Josh Darby MacLellan, Staff Threat Intelligence Advisor, Feedly 📍 Presented at SANS CTI Summit 2026 CTI teams frequently forecast threats, but what if we forecast the future of CTI itself? Disruption from technology and geopolitics are increasing, CTI is not immune. Foresight SATs (Structured Analytic Techniques) provide insights into whether the CTI industry is heading for a boom, bust, or something completely different. More importantly, forecasting enables CTI analysts to prepare for our possible futures. In this session, I will provide a step-by-step walkthrough of how I used Foresight Technique SATs (including Key Drivers Generation, Key Uncertainties Finder, Multiple Scenarios Generation and...
https://www.youtube.com/watch?v=B9TkeUbD1Mk
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Poison in the Digital Well: Supply Chain Defense
Poison in the Digital Well: Intelligence-Driven Defense Against Supply Chain Attacks 🎙️ Shilpi Mittal, Lead Security Engineer, Tyson Foods Inc. 📍 Presented at SANS CTI Summit 2026 Software supply chain attacks are surging to unprecedented levels. In 2025, such attacks doubled compared to the previous year, now accounting for roughly 30% of all breaches. Threat actors are exploiting trusted vendor relationships as an entry point–effectively poisoning the well upstream to compromise countless downstream customers. A stark example occurred in September 2025, when a single npm attack injected malware into 18 widely used packages (totaling 2.6 billion weekly downloads). This incident underscored how a “weakest link” in the software supply chain can jeopardize thousands of organizations...
https://www.youtube.com/watch?v=T8gt7uSDnc8
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Can't Stop, Won't Stop: TA584 Innovates Initial Access
Can't Stop, Won't Stop: TA584 Innovates Initial Access 🎙️ Selena Larson, Staff Threat Researcher, Proofpoint 📍 Presented at SANS CTI Summit 2026 TA584 is one of the most prominent cybercriminal threat actors tracked by Proofpoint threat researchers. In 2025, the actor demonstrated multiple attack chain changes including new, global targeting; ClickFix social engineering; and delivering new malware, Tsundere Bot. TA584 is a prominent initial access broker (IAB) that targets organizations globally. Campaigns typically target hundreds of organizations with tens of thousands of messages and impersonate a variety of organizations including those in healthcare, government, business services, nonprofits, software, and financial services, among others. Proofpoint assesses with high...
https://www.youtube.com/watch?v=5NUNowKonXM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Beyond Bullet Points: Visual Intelligence in the Age of AI
Beyond Bullet Points: Visual Intelligence in the Age of AI 🎙️ Sierra (Stanczyk) Karcher, Intelligence Practices Lead, PwC Global Threat Intelligence 🎙️ David Johnson, Threat Intelligence Advisor, Feedly 📍 Presented at SANS CTI Summit 2026 The way we consume and interact with information constantly evolves. For intelligence analysts, the challenge is not just collecting and analyzing data, it's how we transform that complexity into clarity for ourselves, our teams, and our stakeholders. Intelligence consumers are equally challenged with an influx of information, often turning to AI to summarize news feeds and intelligence reports. CTI analysts have a unique opportunity: We can sharpen our visual tradecraft, embrace new tools, and reimagine how we deliver intelligence to our...
https://www.youtube.com/watch?v=XJSM6EIlbKs
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

NEW2CTI | Beyond the Feed: CTI That Matters to Business
NEW2CTI | Beyond the Feed: Designing CTI Programs That Matter to the Business 🎙️ Sydney Jones, Head of Cyber Threat Management, CLS Group 🎙️ Arun Warikoo, Head of Cyber Threat Intelligence, CIB Americas, BNP Paribas 📍 Presented at SANS CTI Summit 2026 Across organizations, intelligence teams grapple with the following challenges: aligning the threat intelligence program with organization's business priorities, and articulating its tangible business value. How does a threat intelligence program ensure that insights on the current and emerging threat landscape reach the right stakeholders and ultimately safeguard business continuity and resiliency.
https://www.youtube.com/watch?v=_xC1qCweFIA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

NEW2CTI | Connecting the Dots: Incident to Campaign Intel
NEW2CTI | Connecting the Dots: Transforming Incident Data into Actionable Campaign Intelligence 🎙️ Scott Durand, Cyber Threat Intelligence Analyst, Deloitte 🎙️ Adam Cook, Cyber Threat Intelligence Manager, Deloitte 📍 Presented at SANS CTI Summit 2026 In today's evolving threat landscape, Cyber Threat Intelligence (CTI) teams are often challenged by fragmented incident data and a lack of a structured analysis process. This talk focuses on a specific, actionable topic: how structured intrusion analysis can transform scattered incident data into structured, intelligence-driven campaign narratives. ​ Many organizations struggle to move beyond reactive incident response. Without a structured approach, critical connections between incidents can be overlooked, resulting in missed...
https://www.youtube.com/watch?v=JuHFcs0Lrzg
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Rhadamanthys and the Limits of Private Sector Ops
Rhadamanthys and The Limits of Private Sector Offensive Operations 🎙️ Silas Cutler, Principal Security Researcher, Censys 📍 Presented at SANS CTI Summit 2026 This talk will debrief on an operation against the Rhadamanthys infostealer in the months following its initial release. Though this operation, we were able to obtain a copies of data stolen by attackers across all publicly identifiable control servers, using a combination of broad Internet scanning and a previously unreleased exploit. While technically successful, Rhadamanthys continues to be used today and has become increasingly resilient to disruption. This talk will focus on the details of how this operation was executed and the politics of public/private partnership.
https://www.youtube.com/watch?v=J62HquBD1jw
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

NEW2CTI | Bling-Up CTI Requirements with Diamond Model
NEW2CTI | Bling-up Your Intelligence Requirements: Enhancing Your CTI Requirements With the Diamond Model Of Intrusion Framework 🎙️ Sherman Chu, Cyber Threat Intelligence Lead, BlackRock 📍 Presented at SANS CTI Summit 2026 Developing intelligence requirements is a recurring challenge often highlighted by the CTI community. Despite numerous great write-ups, discussions, and presentations on extracting and converting stakeholder needs into intelligence requirements, there is still plenty of room to explore practical ways of using requirements to evaluate and improve CTI lifecycles continuously. One such method involves leveraging core concepts from the Diamond Model of Intrusion Analysis. This presentation will examine and walk through how core principles from the Diamond Model can...
https://www.youtube.com/watch?v=aJKhO3V0QcQ
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

NEW2CTI | Operationalizing CTI: From PIRs to Priority TTPs
NEW2CTI | Operationalizing CTI: From PIRs to Priority TTPs 🎙️ Ondra Rojcik, CTI Analyst, Red Hat 🎙️ Keith Swagler, CTI Analyst, Red Hat 📍 Presented at SANS CTI Summit 2026 The value of Priority Intelligence Requirements (PIRs) is well-known in CTI, yet many teams, including ours, struggle to translate these high-level concepts into tangible, day-to-day actions of Security Operations, and Cyber Defense activities. This presentation offers a direct, no-fluff walkthrough of how to transform PIRs from a strategic document into an **engine for proactive cyber defense**. It moves beyond theory, providing a practical, step-by-step guide to operationalizing PIRs. This talk will equip attendees with the immediate, actionable methodology required to transform strategic Priority Intelligence...
https://www.youtube.com/watch?v=dlA8SwicfPc
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Managing the Deprecation of Threat Actor Aliases
Managing the Deprecation of Threat Actor Aliases 🎙️ Nicholas Vidal, Senior Cyber Threat Intelligence Analyst, SecAlliance 📍 Presented at SANS CTI Summit 2026 Most of us are familiar with the seemingly endless variety of threat actor naming conventions used by vendors to describe distinct clusters of adversary activity. Serious discussion is merited regarding several aspects of this industrywide practice, including the methods different researchers use to cluster activity, the inferences that should be drawn from observed indicator overlap, and the degree to which greater taxonomical harmonization is possible given data transparency constraints; nevertheless, there is broad consensus across the CTI community that clustering helps analysts more effectively catalog, describe, and correlate...
https://www.youtube.com/watch?v=Zg0to6loMjg
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

NEW2CTI | Red Teams with Receipts
NEW2CTI | Red Teams with Receipts: Operationalizing CTI for Real Adversary Simulations 🎙️ Nigel Boston, Senior Cyber Threat Intelligence Analyst, Grainger 🎙️ Ralph Hittell, Offensive Security Lead, Grainger 📍 Presented at SANS CTI Summit 2026 Red teams often rely on generic playbooks that don't reflect how adversaries truly operate. Meanwhile, CTI produces detailed insights into campaigns and TTPs that too often go unused. This talk will show how to bridge that gap by using CTI as the “receipts” to design red team operations that emulate actual threats. We'll walk through practical workflows for turning CTI into adversary playbooks, highlight tools for operationalizing intelligence, and share lessons from real-world scenarios, including how intelligence on Black Basta...
https://www.youtube.com/watch?v=Js1cPtxxdkI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Operation Trashpanda: Disrupting RaccoonO365
Operation Trashpanda: Disrupting RaccoonO365's Phishing Empire 🎙️ Maurice Mason, Principal Cybercrime Investigator, Microsoft 🎙️ Nick Monaco, Principal Cybercrime Investigator, Microsoft 📍 Presented at SANS CTI Summit 2026 In this session, Microsoft's Digital Crimes Unit (DCU) will dive into the recent disruption of RaccoonO365, the fastest-growing phishing-as-a-service (PhaaS) platform that sold phishing kits targeting Microsoft Office 365 users that empowered cybercriminals across 94 countries to steal thousands of Microsoft 365 credentials. With slick branding, AI-enhanced attack tools, and a thriving underground marketplace, RaccoonO365 lowered the barrier to entry for digital crime—making it easy for anyone to launch sophisticated phishing campaigns. The DCU, in partnership...
https://www.youtube.com/watch?v=AE4MRFk_gUQ
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Black Hat Stories | Or Yair, Security Research Team Lead at SafeBreach
In this episode of Black Hat Stories, we sit down with Or Yair, the Security Research Team Lead at SafeBreach. With multiple years of experience attending Black Hat — including presenting at Black Hat Europe 2025 — Or shares his unique perspective on vulnerability research, curiosity, and the real purpose of the Black Hat community. For the past five years, Or has focused on vulnerability research in the Windows environment and third‑party components. He describes the research process as unpredictable and challenge‑driven — “like living in an escape room” — where success is never guaranteed, but the chase is part of the thrill. Or also highlights what makes Black Hat truly shine: its ability to bring impact to the security industry. By attending talks on topics he wouldn't...
https://www.youtube.com/watch?v=rNtuyrXPIc0
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Black Hat USA 2025 | Ghost Calls: Abusing Web Conferencing for Covert Command & Control
Red team operators frequently struggle with establishing interactive command and control (C2) over traditional C2 channels. While long-term covert channels are well-suited for stealthy, persistent communication, they often lack the bandwidth or real-time responsiveness needed for operations such as SOCKS proxying, layer two pivoting, relaying attacks, or hidden VNC sessions. Attempting to use traditional C2 mechanisms for these activities in a well-monitored network can be slow, conspicuous, and easily detected. Our research explores the use of real-time communication protocols as a short-term, high-speed C2 channel that seamlessly complements a covert long-term C2 infrastructure. Specifically, we leverage web conferencing protocols, which are designed for real-time, low-latency communication...
https://www.youtube.com/watch?v=V9znA01MqUc
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

No More Routers In The US - Threat Wire
⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev Want to work with Ali? hak5@endingwithali.com [❗] Join the Patreon→ https://patreon.com/threatwire 00:00 0 - Intro 00:15 1 - TeamPCP On A Rampage 03:41 2 - Consumer Routers Banned 06:12 3 - Delve Fakes Compliance 08:54 4 - Cloudflare Injecting Analytics 09:33 5 - Comments 10:33 6 - Outro LINKS 🔗 Story 1: TeamPCP On A Rampage https://www.endorlabs.com/learn/teampcp-isnt-done https://www.aquasec.com/blog/trivy-supply-chain-attack-what-you-need-to-know/ https://www.wiz.io/blog/teampcp-attack-kics-github-action https://www.ox.security/blog/teampcps-telnyx-windows-malware-technical-analysis/ https://www.helpnetsecurity.com/2026/03/30/teampcp-supply-chain-attacks-ransomware/ 🔗...
https://www.youtube.com/watch?v=vo5vxUjOd8E
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Black Hat USA 2025 | Practical Attacks on Nostr, a Decentralized Censorship-Resistant Protocol
Nostr is an emerging open-source, decentralized social networking protocol with over 1.1 million users—and a critical blind spot in its security design. While decentralized architectures promise resilience and user control, rigorous real-world security analyses remain uncommon in this space. In this session, we unveil the first comprehensive security study of Nostr and its popular client applications, demonstrating how subtle flaws in cryptographic design, event verification, and link previews allow an attacker to forge "encrypted" direct messages (DMs), impersonate user profiles, and even leak the confidential message from "encrypted" DMs. We also show how a lack of signature checks in many clients—whether due to outright skipped verification or a TOCTOU caching flaw—enables effortless...
https://www.youtube.com/watch?v=O97xhyHFSsw
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Black Hat USA 2025 | Uncovering and Responding to the tj-actions Supply Chain Breach
When 'Changed Files' Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach What began as a routine CI/CD run quickly uncovered a disturbing reality: the popular tj-actions/changed-files GitHub Action, used by 23,000+ repositories including those from NVIDIA, Meta, Microsoft and other tech giants, had been weaponized to exfiltrate secrets. This presentation dissects how one of the most consequential supply chain attacks of 2025 unfolded and was ultimately contained. On March 14, 2025, at 1:01 PM PT, we detected an anomalous outbound network connection to gist.githubusercontent.com from a pipeline run. This single alert led to the discovery that attackers had redirected all tags of the tj-actions/changed-files GitHub Action to point to a single malicious commit....
https://www.youtube.com/watch?v=-BCngzJC1Rc
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Black Hat USA 2025 | Dark Corners: How a Failed Patch Left VMware ESXi VM Escapes Open for Two Years
VMware ESXi appears to be increasingly secure, as indicated by fewer CVEs and 0 success at Pwn2Own. However, on March 4 this year, VMware disclosed three critical vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) that enable ESXi virtual machine escape and have been confirmed to be exploited in the wild. This brings attention back to VMware ESXi, raising questions about the security of this influential commercial virtualization platform and the cost of breaking it. Our team successfully demonstrated a VMware ESXi VM escape at the Tianfu Cup in late 2023, winning both the championship and the Most Valuable Product Crack Award. This was the only publicly demonstrated VMware ESXi VM escape since 2021. In this presentation, we will disclose the vulnerabilities (CVE-2024-22252,...
https://www.youtube.com/watch?v=MhQmaK8Zsfw
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Black Hat USA 2025 | More Flows, More Bugs: Empowering SAST with LLMs and Customized DFA
Static Application Security Testing (SAST) plays a significant role in modern vulnerability discovery. For example, GitHub uses CodeQL to scan repositories. However, our analysis of over 100 real-world vulnerabilities has revealed that its detection performance is limited by two main factors: 1) incomplete source and sink coverage in built-in propagation rules, and 2) disruptions in data flow due to insufficient support for certain language features. In this talk, we will introduce a framework to empower SAST tools' capabilities to identify previously undetectable vulnerabilities and new CVEs. First, we will demonstrate how to leverage Large Language Models (LLMs) to automatically identify sources and sinks from open-source frameworks. Second, we will introduce the implementation principles...
https://www.youtube.com/watch?v=Zp0x-cfClPY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

HUGE npm axios supply chain attack
https://www.huntress.com/blog/supply-chain-compromise-axios-npm-package https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan https://socket.dev/blog/axios-npm-package-compromised https://socket.dev/npm/package/plain-crypto-js/files/4.2.1/setup.js https://www.aikido.dev/blog/axios-npm-compromised-maintainer-hijacked-rat https://gist.github.com/joe-desimone/36061dabd2bc2513705e0d083a9673e7 https://github.com/axios/axios/blob/v1.x/.github/workflows/deprecate.yml Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training See what else I'm up to with: https://jh.live/newsletter ℹ️ Affiliates: Learn how to code with CodeCrafters: https://jh.live/codecrafters Host your own VPN with OpenVPN: https://jh.live/openvpn Get...
https://www.youtube.com/watch?v=A58cV17avpM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

🚨 NPM axios Supply Chain Attack 🚨
( huge thanks livestream partner https://jh.live/specterops-stream )
https://www.youtube.com/watch?v=A-KpP-6Dt8E
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

3 AI Skills Cybersecurity Teams Need Now + Free Training Resources
AI was everywhere at RSAC 2026 — but what do cybersecurity teams actually need to learn right now? In this video, we break down the 3 AI skill areas that matter most to cybersecurity professionals and leaders today: protecting AI systems, using AI to enhance security operations, and establishing governance to use AI responsibly across the organization. You'll hear perspectives from James Stanger of CompTIA, Keatron Evans of Cengage and Infosec, and Theo Nasser of Right-Hand Cybersecurity on what teams should prioritize now, how attackers are already using AI, and where cybersecurity training and certifications are heading next. We also share free AI training resources and highlight new cybersecurity AI certifications that can help you start closing the skills gap. 0:00 - Intro: What...
https://www.youtube.com/watch?v=8cgIqSBtIN0
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Google Big Sleep: The End of Human Hackers?
Big thank you to DeleteMe for sponsoring this video. Use my link http://jointdeleteme.com/Bombal to receive a 20% discount or use the QR code in the video. Welcome back to the channel! In this deep dive, Stephen returns to break down the rapidly evolving landscape of AI in cybersecurity. We explore the critical differences between offensive AI (using AI to enhance attacks) and adversarial AI (attacking the AI models themselves). Learn the mechanics behind prompt injection, LLM jailbreaking, and how vector databases are structured. We also analyze real-world case studies, including Google Project Zero's Big Sleep autonomous zero-day agent, and demonstrate how new AI-driven tools are being used for patch diffing and root cause analysis. Finally, we tackle the massive industry question: will...
https://www.youtube.com/watch?v=Il4zammf52w
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

I Earned M Hacking. Here's Everything I Know
LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE 0 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 🔗 LINKS: 📖 MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2 Hacking APIs: Breaking Web Application Programming Interfaces - https://amzn.to/45g4bOr Black Hat GraphQL: Attacking Next Generation APIs - https://amzn.to/455F9l3 🍿 WATCH NEXT: If I Started Bug Bounty Hunting in 2024, I'd Do this - https://youtu.be/z6O6McIDYhU 2023 How to Bug Bounty - https://youtu.be/FDeuOhE5MhU Bug Bounty Hunting...
https://www.youtube.com/watch?v=pbu7ElRTBrc
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Vibe Hacking: How AI Is Helping Hackers
Big thank you to Radware for sponsoring this video. Download the Radware Global Threat Analysis Report 2026 here: https://www.radware.com/threat-analysis-report/ In this interview, David Bombal sits down with Radware's Pascal Geenens to unpack the realities of the latest global threat report. The cybersecurity landscape has experienced a major paradigm shift: the era of "Vibe Hacking" is here. Pascal explains how Agentic AI, the Model Context Protocol (MCP), and uncensored offline models (like DeepSeek-R1) have created a "digital garden of Eden" for adversaries. Discover how novice script kiddies are now use the power of AI hacking which once strictly reserved for nation-state actors. We dive deep into the automation of cyber attacks, the rise of AI-driven tools like Xantarox AI, the...
https://www.youtube.com/watch?v=u0ynt7CK2og
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

RTVcron | C2 for Red Team: A Practical Introduction with Sliver
RTVcron is our monthly live stream where we bring workshops to you! Learn more about cron and RTV at https://redteamvillage.io This month we're joined by Maor Tal for "C2 for Red Team: A Practical Introduction with Sliver" In modern red team engagements, Command and Control (C2) frameworks are essential for managing post-exploitation activities and maintaining persistent access. Mastering C2 operations is now a core skill for any red teamer. In this beginner-friendly workshop, Maor will guide participants through setting up, operating, and designing a red team operation using Sliver, a powerful and open-source C2 framework gaining wide adoption in the offensive security community. Whether you're new to C2 or seeking practical experience with Silver, this session offers a solid foundation...
https://www.youtube.com/watch?v=qRYYJhaRC6U
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Why is Google Closing Android? - Threat Wire
⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev Want to work with Ali? hak5@endingwithali.com [❗] Join the Patreon→ https://patreon.com/threatwire 0:00 0 - Intro 1 - Nvidia Helps OpenClaw 2 - Two Major iOS security Issues 3 - Google Closing Android 4 - Micro Stories 5 - Comment Section 6 - Outro LINKS 🔗 Story 1: Nvidia Helps OpenClaw https://nvidianews.nvidia.com/news/nvidia-announces-nemoclaw https://www.zdnet.com/article/nvidia-openclaw-nemoclaw-security-stack-gtc-2026/ https://www.theregister.com/2026/03/12/china_cert_openclaw_security_warning/ 🔗 Story 2: Two Major iOS security Issues https://thehackernews.com/2026/03/apple-warns-older-iphones-vulnerable-to.html https://thehackernews.com/2026/03/darksword-ios-exploit-kit-uses-6-flaws.html https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit https://www.lookout.com/threat-intelligence/article/darksword https://support.apple.com/en-us/126776 https://arstechnica.com/security/2026/03/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild/ 🔗...
https://www.youtube.com/watch?v=--QqcKVAHTY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Stay Ahead of Ransomware - Initial Access via Evolving Social Engineering
For years, Initial Access in the world of Ransomware and Cyber Extortion was a battle between phishing, Remote Desktop Protocol (then just "remote access"), and software vulnerability exploitation. While those three remain key players, social engineering tactics have evolved and taken on a more substantial share of the initial access market. Ransomware campaigns are more commonly involving threats such as the ever-evolving ClickFix along with Teams-based social engineering tactics that often involve QuickAssist and/or RMM threats. Join Ryan and Mari as they walk you through example attacks, live with hands-on keyboard analysis of such attacks, and discuss tips and tricks related to prevention, detection, and response for these initial access methods.
https://www.youtube.com/watch?v=1IFeGVyny2c
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Inside H1-468: Live Hacking Event with Epic Games in Stockholm
Step inside H1-468, a HackerOne Live Hacking event hosted in Stockholm, Sweden, where top security researchers from around the world teamed up with Epic Games to uncover vulnerabilities, level up defensive strategies, and push the limits of continuous security. This event highlights how live hacking can strengthen modern gaming platforms and why the researcher community continues to be an essential partner in securing online experiences at scale. For more information about HackerOne, visit https://www.hackerone.com/ ▼ Keep up with us ▼ ◇ LinkedIn → https://www.linkedin.com/company/HackerOne ◇ Twitter → https://twitter.com/Hacker0x01
https://www.youtube.com/watch?v=AXyJU6P0j9w
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Meta Ending End to End on Instagram- Threat Wire
⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev Want to work with Ali? endingwithalicollabs@gmail.com [❗] Join the Patreon→ https://patreon.com/threatwire 00:00 0 - Intro 00:15 1 - Meta Tighting Offerings 01:56 2 - Wiz Fully Acquired 03:20 3 - Amazon Blames AI 06:32 4 - Comments 07:43 5 - Other News 08:32 6 - Outro LINKS 🔗 Story 1: Meta Tighting Offerings https://help.instagram.com/491565145294150 https://thehackernews.com/2026/03/meta-to-shut-down-instagram-end-to-end.html 🔗 Story 2: Wiz Fully Acquired https://www.googlecloudpresscorner.com/2026-03-11-Google-Completes-Acquisition-of-Wiz https://www.reuters.com/technology/cybersecurity/googles-32-billion-deal-wiz-accelerated-under-trump-sources-say-2025-03-19/ https://techcrunch.com/2026/03/11/google-completes-32b-acquisition-of-wiz/ https://botcrawl.com/google-buys-israeli-military-linked-cybersecurity-firm-wiz/ 🔗...
https://www.youtube.com/watch?v=Xkp331rVb5g
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

ChatGPT For The Dark Web
https://jh.live/flare-032026 || Manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: https://jh.live/flare-032026 Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training See what else I'm up to with: https://jh.live/newsletter ℹ️ Affiliates: Learn how to code with CodeCrafters: https://jh.live/codecrafters Host your own VPN with OpenVPN: https://jh.live/openvpn Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense
https://www.youtube.com/watch?v=oqU41QwtAGE
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

State of the Cybersecurity Workforce, JHT / WiCyS RSAC Preview
Just Hacking Training Livestream with Lynn Dohm of WiCyS and Will Markow of FourOne Insights! Thursday, March 19 at 1:00pm Eastern Time https://justhacking.com
https://www.youtube.com/watch?v=eGRxa9s1y0g
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Bloodhound OpenGraph
Justin Kohler joins the party to dig into BloodHound OpenGraph! Big thanks to livestream partner SpecterOps https://jh.live/specterops-stream
https://www.youtube.com/watch?v=xOBqbN0d0qQ
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

BIG DAY TODAY
( huge thanks livestream partner https://jh.live/specterops-stream )
https://www.youtube.com/watch?v=5_w2tUCq9DI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Mac Imaging Made Easy with Fuji
🎉 New for 2026! In this episode, we'll look at Fuji — a free, open-source tool for performing live, logical forensic acquisitions of Mac computers (Intel or Apple Silicon). You'll see how Fuji leverages built-in macOS tools to generate a DMG image, ready for analysis in your forensic tool of choice. This video is an excerpt from the 13Cubed training course "Investigating macOS Endpoints." Visit https://training.13cubed.com to learn more! 🛠 Resources Fuji: https://github.com/Lazza/Fuji
https://www.youtube.com/watch?v=9ZkLdFodhzM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

can AI eat its own tail? 🤖
( big thanks livestream partner https://jh.live/specterops-stream )
https://www.youtube.com/watch?v=TtWh-TiMeMU
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

new phone who dis?
( big thanks livestream partner https://jh.live/specterops-stream )
https://www.youtube.com/watch?v=bxV-hFEwYw4
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Meet SecAI+: CompTIA's first certification for the AI security era
Save 0 on your CompTIA SecAI+ Boot Camp — use code SAVE250 at checkout (must start befor April 30, 2026): https://www.infosecinstitute.com/courses/comptia-secai-plus-boot-camp/?utm_source=youtube&utm_medium=webinar&utm_campaign=secaiwebinar AI is reshaping cybersecurity careers — but what AI skills do employers actually want? CompTIA SecAI+ has the answer. This new certification from CompTIA is their first focused entirely on AI security — validating your ability to secure AI systems, defend against AI-driven threats and use AI to strengthen security operations. Join James Stanger, Chief Technology Evangelist at CompTIA, for an inside look at SecAI+. James met with organizations worldwide about AI security — and he'll share what he learned and how it shaped this new certification....
https://www.youtube.com/watch?v=puMPRYzaMQs
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

BECOMING AN AI HACKER (Episode 01)
LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE 0 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 🔗 LINKS: 📖 MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2 Hacking APIs: Breaking Web Application Programming Interfaces - https://amzn.to/45g4bOr Black Hat GraphQL: Attacking Next Generation APIs - https://amzn.to/455F9l3 🍿 WATCH NEXT: If I Started Bug Bounty Hunting in 2024, I'd Do this - https://youtu.be/z6O6McIDYhU 2023 How to Bug Bounty - https://youtu.be/FDeuOhE5MhU Bug Bounty Hunting...
https://www.youtube.com/watch?v=dG6NFXQOmsE
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

NahamSec Teaches Me Bug Bounty Basics
Big thanks to @NahamSec for showing me the ropes for bug bounty 😎 You can try his "BlueWings" demo challenge here: https://jh.live/hhub-bluewings -- and snag 50% off Ben's Hands-On Web Exploitation Course with 15+ hours of content 100+ labs at https://jh.live/hhub-web Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training See what else I'm up to with: https://jh.live/newsletter ℹ️ Affiliates: Learn how to code with CodeCrafters: https://jh.live/codecrafters Host your own VPN with OpenVPN: https://jh.live/openvpn Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense
https://www.youtube.com/watch?v=lNuvI48ysVo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Chrome Is Thinking Quantum - Threat Wire
⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev Want to work with Ali? endingwithalicollabs@gmail.com [❗] Join the Patreon→ https://patreon.com/threatwire 0:00 0 - Intro 1 - Chrome Updating HTTPS Certificates 2 - Wikipedia Worm 3 - OpenAI Aardvark Reveal 4 - Comment Section 5 - Other News 6 - Outro LINKS 🔗 Story 1: Chrome Updating HTTPS Certificates https://arstechnica.com/security/2026/02/google-is-using-clever-math-to-quantum-proof-https-certificates/ https://security.googleblog.com/2026/02/cultivating-robust-and-efficient.html 🔗 Story 2: Wikipedia Worm https://www.bleepingcomputer.com/news/security/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/ 🔗...
https://www.youtube.com/watch?v=Yke1sPwxcVw
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

GraphSpy: Hacker's Tooling Deep Dive (w/ creator @RedByte1337!)
Big thanks to Keanu for showing me all the cool stuff in GraphSpy! Check it out for yourself: https://github.com/RedByte1337/GraphSpy Keanu's: ... Github: https://github.com/RedByte1337 Twitter/X: https://x.com/RedByte1337 LinkedIn: https://www.linkedin.com/in/keanunys/ Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training See what else I'm up to with: https://jh.live/newsletter ℹ️ Affiliates: Learn how to code with CodeCrafters: https://jh.live/codecrafters Host your own VPN with OpenVPN: https://jh.live/openvpn Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense
https://www.youtube.com/watch?v=qEtoKC32UoE
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Was This Vulnerability Worth ,000?
LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE 0 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 🔗 LINKS: 📖 MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2 Hacking APIs: Breaking Web Application Programming Interfaces - https://amzn.to/45g4bOr Black Hat GraphQL: Attacking Next Generation APIs - https://amzn.to/455F9l3 🍿 WATCH NEXT: If I Started Bug Bounty Hunting in 2024, I'd Do this - https://youtu.be/z6O6McIDYhU 2023 How to Bug Bounty - https://youtu.be/FDeuOhE5MhU Bug Bounty Hunting...
https://www.youtube.com/watch?v=oJM8GxyWs20
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

PromptShield™ Vs Claude File Creation Attacks
Your new file analysis tools are the latest entry point for command injection. Attackers use external files to trick your environment into running untrusted code and scraping sensitive data from SharePoint or internal projects. A request to "analyze a CSV" can silently append environment variables to a PDF, leaking your runtime keys because the model shares your administrator's permissions. Validating these attacks is nearly impossible when the payload is plain English. You can't rely on basic filters to catch exfiltration when the model is designed to be helpful. PromptShield™ identifies the underlying intent before data leaves the environment, detecting unauthorized access in real-time. It sees into the corners of your workflow to stop the noise before it becomes a breach. 🔒...
https://www.youtube.com/watch?v=Fm39l8WdLVM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

PromptShield™ Vs LLMs Exploiting NPM Packages
Your build pipeline is a wide-open door. Attackers are now compromising popular NPM packages to execute post-install scripts that hunt for your secrets. It isn't just a Windows problem; these exploits recursively search Linux and Mac OS directories to dump sensitive data from Trezor, Ledger, and Metamask wallets. If your API has elevated permissions, these prompt injections bypass standard file access controls to exfiltrate data before your SOC even sees the spike. Monitoring for suspicious commands is a start, but manual review can't keep up with the noise. You need a defensible architecture that stops the intent of the attack, not just the known signature. While most systems are vulnerable to this level of command injection, our prompt classification identifies the malicious payload...
https://www.youtube.com/watch?v=WMeL-KKcQ98
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Security-driven Rapid Release - Pwn2Own Documentary (Part 4)
Learn hacking (ad): https://www.hextree.io What does it take to fix a vulnerability in Firefox and release an Update? part 1: https://www.youtube.com/watch?v=YQEq5s4SRxY part 2: https://www.youtube.com/watch?v=uXW_1hepfT4 part 3: https://www.youtube.com/watch?v=NT1VCmJF3mU part 4: https://www.youtube.com/watch?v=x4CUAuwoZVk (Spoilers) Firefox Security Response to pwn2own 2025: https://blog.mozilla.org/security/2025/05/17/firefox-security-response-to-pwn2own-2025/ =[ ❤️ Support ]= → My courses: https://www.hextree.io/ → My font: https://shop.liveoverflow.com/ → per Video: https://www.patreon.com/join/liveoverflow → per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join 2nd Channel: https://www.youtube.com/LiveUnderflow =[ 🐕 Social ]= → LinkedIn: https://www.linkedin.com/in/liveoverflow →...
https://www.youtube.com/watch?v=x4CUAuwoZVk
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

GrapheneOS is moving on from Pixels? ThreatWire
⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev Want to work with Ali? endingwithalicollabs@gmail.com [❗] Join the Patreon→ https://patreon.com/threatwire 0:00 0 - Intro 1 - GrapheneOS Coming To Motorola 2 - Anthropic 3 - Comment Section 4 - Outro LINKS 🔗 Story 1: GrapheneOS Coming To Motorola https://9to5mac.com/2026/02/26/iphone-and-ipad-approved-to-handle-classified-nato-information-without-any-third-party-add-on-solutions/ https://www.apple.com/newsroom/2026/02/iphone-and-ipad-approved-to-handle-classified-nato-information/ https://grapheneos.org/faq#future-devices https://x.com/GrapheneOS/status/2028464084467990761 https://cybernews.com/security/motorola-grapheneos-partnership-to-boost-smartphone-security/ 🔗...
https://www.youtube.com/watch?v=LDbN-ZsNY_w
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Firefox JIT Bug - Pwn2Own Documentary (Part 3)
Learn hacking (ad): https://www.hextree.io We talk to Manfred Paul and learn about his research process. We also dive into the technical details about his JIT bug and learn about the optimization he exploited. part 1: https://www.youtube.com/watch?v=YQEq5s4SRxY part 2: https://www.youtube.com/watch?v=uXW_1hepfT4 part 3: https://www.youtube.com/watch?v=NT1VCmJF3mU part 4: https://www.youtube.com/watch?v=x4CUAuwoZVk (Spoilers) Firefox Security Response to pwn2own 2025: https://blog.mozilla.org/security/2025/05/17/firefox-security-response-to-pwn2own-2025/ =[ ❤️ Support ]= → My courses: https://www.hextree.io/ → My font: https://shop.liveoverflow.com/ → per Video: https://www.patreon.com/join/liveoverflow → per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join 2nd...
https://www.youtube.com/watch?v=NT1VCmJF3mU
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

The First Exploit - Pwn2Own Documentary (Part 2)
Learn hacking (ad): https://www.hextree.io What happens in the Pwn2Own disclosure room? Let's find out in part 2 of my short documentary about how Mozilla fixes 0days. part 1: https://www.youtube.com/watch?v=YQEq5s4SRxY part 2: https://www.youtube.com/watch?v=uXW_1hepfT4 part 3: https://www.youtube.com/watch?v=NT1VCmJF3mU part 4: https://www.youtube.com/watch?v=x4CUAuwoZVk (Spoilers) Firefox Security Response to pwn2own 2025: https://blog.mozilla.org/security/2025/05/17/firefox-security-response-to-pwn2own-2025/ =[ ❤️ Support ]= → My courses: https://www.hextree.io/ → My font: https://shop.liveoverflow.com/ → per Video: https://www.patreon.com/join/liveoverflow → per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join 2nd Channel: https://www.youtube.com/LiveUnderflow =[...
https://www.youtube.com/watch?v=uXW_1hepfT4
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

I Hacked My First AI Chatbot
LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE 0 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 🔗 LINKS: 📖 MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2 Hacking APIs: Breaking Web Application Programming Interfaces - https://amzn.to/45g4bOr Black Hat GraphQL: Attacking Next Generation APIs - https://amzn.to/455F9l3 🍿 WATCH NEXT: If I Started Bug Bounty Hunting in 2024, I'd Do this - https://youtu.be/z6O6McIDYhU 2023 How to Bug Bounty - https://youtu.be/FDeuOhE5MhU Bug Bounty Hunting...
https://www.youtube.com/watch?v=T9pdU9XZXlA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

The World's Hardest Hacking Competition - Pwn2Own Documentary (Part 1)
Learn hacking (ad): https://www.hextree.io Pwn2Own 2025 was happening in Berlin and I got the opportunity to follow Mozilla into the disclosure room and document how Mozilla fixes critical vulnerabilities. part 1: https://www.youtube.com/watch?v=YQEq5s4SRxY part 2: https://www.youtube.com/watch?v=uXW_1hepfT4 part 3: https://www.youtube.com/watch?v=NT1VCmJF3mU part 4: https://www.youtube.com/watch?v=x4CUAuwoZVk (Spoilers) Firefox Security Response to pwn2own 2025: https://blog.mozilla.org/security/2025/05/17/firefox-security-response-to-pwn2own-2025/ Sorry for the long delay of this video... Permiere Pro hated me in this project and 2025 was a shit year. =[ ❤️ Support ]= → My courses: https://www.hextree.io/ → My font: https://shop.liveoverflow.com/ → per Video: https://www.patreon.com/join/liveoverflow →...
https://www.youtube.com/watch?v=YQEq5s4SRxY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

PromptShield™ Vs Google Calendar Invitation Attacks
Adversaries are weaponizing Google Calendar to execute unauthorized commands on connected infrastructure. A malicious meeting invite bypasses traditional secure email gateways because it originates from a verified Google server. The payload is not a macro or an executable file. It is a plain-text prompt injection hidden within the event description. The attack triggers when Google's native AI assistant attempts to parse the calendar schedule. The AI reads the malicious instructions and executes them with the victim's full privilege level. Over time, this allows attackers to manipulate linked devices without triggering a malware alert. 🔒 Secure A With PromptShield™ --------------------------------------------------------------- Sitting between users and your AI models, PromptShield™...
https://www.youtube.com/watch?v=aRR2WZgrmRs
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Password Managers are Swiss Cheese - Threat Wire
⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev Want to work with Ali? endingwithalicollabs@gmail.com [❗] Join the Patreon→ https://patreon.com/threatwire 0:00 0 - Intro 1 - NotePad's Punched Holes 2 - Discord Facial Age Recognition 2.5 - Comment Section 3 - Swiss Holes In Password Manager 4 - Other News 5 - Outro LINKS 🔗 Story 1: NotePad's Punched Holes https://www.cve.org/CVERecord?id=CVE-2026-20841 https://www.bleepingcomputer.com/news/microsoft/windows-11-notepad-flaw-let-files-execute-silently-via-markdown-links/ https://foss-daily.org/posts/microsoft-notepad-2026/ 🔗 Story 2: Discord...
https://www.youtube.com/watch?v=iUSmmBLXTgM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 - DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks - Ryan Emmon
Network Attached Storage (NAS) devices are indispensable in many corporate and home environments. These devices often live on the network edge, providing convenient remote access to confidential files and internal networks from the public internet. What happens when this goes terribly wrong? In this presentation, I'll discuss how I developed a zero-day exploit targeting dozens of Synology NAS products. At the time of discovery, the exploit facilitated unauthenticated root-level remote code execution on millions of NAS devices in the default configuration. My exploitation strategy centered around smuggling different types of delimiters that targeted multiple software components. In the past, exploitation of the vulnerability's bug class demanded additional primitives that weren't available...
https://www.youtube.com/watch?v=3F5icGjDWfg
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 - Browser Extension Clickjacking: One Click and Your Credit Card Is Stolen - Marek Tóth
Browser extensions have become increasingly popular for enhancing the web browsing experience. Common examples are ad blockers, cryptocurrency wallets, and password managers. At the same time, modern websites frequently display intrusive elements, such as cookie consent banners, newsletter subscription modals, login forms, and other elements that require user interaction before the desired content can be displayed. In this talk, I will present a new technique based on clickjacking principles that targets browser extensions, where I used fake intrusive elements to enforce user interaction. In my research, I tested this technique on the 11 most widely used password managers, which resulted in discovering multiple 0-day vulnerabilities that could affect tens of millions of users. Typically,...
https://www.youtube.com/watch?v=Gu4IoDXNqoU
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 - Can't Stop the ROP: Automating Universal ASLR Bypasses - Bramwell Brizendine
High-entropy ASLR was supposed to make bypasses of ASLR on Windows virtually impossible - until now! This talk will debut nine novel bypasses of the strongest form of ASLR on Windows, which makes attacks such as brute-forcing totally infeasible. This talk showcases how mostly simple, easy-to-find ROP gadgets can be used to construct highly reliable, universal ASLR bypasses to key Windows system DLLs, allowing ROP gadgets from those DLLs to be used freely in exploits! The end result? The attack surface is greatly expanded, making it possible to do more attacks on binaries previously constrained by limited gadgets. What may have been impossible before due to insufficient ROP gadgets, now is quite possible! While this talk focuses primarily on ASLR bypass for x64, we will also briefly touch upon...
https://www.youtube.com/watch?v=NrTNNi9PP5Y
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Inside H1-65: Inside OKX's Live Hacking Event in Singapore
In H1-65 in Singapore, OKX partnered with HackerOne to host a live hacking event that put trust, transparency, and collaboration front and center. Security researchers worked side by side with OKX's security team, testing real systems in real-time and uncovering vulnerabilities that matter. ▶️ Watch how collaboration, expertise, and shared purpose drive real security outcomes. For more information about HackerOne, visit https://www.hackerone.com/ ▼ Keep up with us ▼ ◇ LinkedIn → https://www.linkedin.com/company/HackerOne ◇ Twitter → https://twitter.com/Hacker0x01
https://www.youtube.com/watch?v=TGzCzF27wUU
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Tracking Program Execution with a Little Known Registry Key
In this episode, we'll take a look at another obscure, registry-based execution artifact that may help you fill in yet another piece of the puzzle. *** If you enjoy this video, please consider supporting 13Cubed on Patreon at patreon.com/13cubed. *** 📖 Chapters 00:00 - Intro 00:33 - About Registry Hives 02:10 - Demo 🛠 Resources FeatureUsage — Evidence of Execution: https://upadhyayraj.medium.com/featureusage-evidence-of-execution-appswitched-8df98ac0ddc2 The Windows Forensic Journey — “AppSwitched”: https://medium.com/@boutnaru/the-windows-forensic-journey-appswitched-55abc690f0f0 #Forensics #DigitalForensics #DFIR #ComputerForensics #WindowsForensics
https://www.youtube.com/watch?v=yoFkF-NHZvo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Can I Replace AI With My Recon Methodology?
LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE 0 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 🔗 LINKS: 📖 MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2 Hacking APIs: Breaking Web Application Programming Interfaces - https://amzn.to/45g4bOr Black Hat GraphQL: Attacking Next Generation APIs - https://amzn.to/455F9l3 🍿 WATCH NEXT: If I Started Bug Bounty Hunting in 2024, I'd Do this - https://youtu.be/z6O6McIDYhU 2023 How to Bug Bounty - https://youtu.be/FDeuOhE5MhU Bug Bounty Hunting...
https://www.youtube.com/watch?v=1BSm5aJsk-Y
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

OpenClaw Is A Mess And I Don't Care - Threat Wire
⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev Want to work with Ali? endingwithalicollabs@gmail.com [❗] Join the Patreon→ https://patreon.com/threatwire 0:00 0 - Intro 1 - React2Shell Leads to NGINX Take Overs 2 - Global Social Media Bans 3 - I Refuse To Cover OpenClaw 4 - Other News You Should Know 5 - Comment Section 6 - Outro LINKS 🔗 Story 1: React2Shell Leads to NGINX Take Overs https://cybernews.com/security/high-severity-vulnerability-affects-nginx/ https://securitylabs.datadoghq.com/articles/web-traffic-hijacking-nginx-configuration-malicious/ https://thehackernews.com/2026/02/hackers-exploit-react2shell-to-hijack.html 🔗...
https://www.youtube.com/watch?v=5VFQ8X4XcIQ
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

How AI Gets Tested in the Real World | Salesforce Live Hacking Event
As AI becomes foundational to modern software, security teams are rethinking AI systems. This video captures H1-3120, a live AI hacking event with Salesforce, marking 10 years of collaboration with HackerOne. Security researchers and the Salesforce security team work side by side to test AI products, explore emerging attack patterns, and share insights from real-world experimentation. Featuring perspectives from Salesforce security leaders and the researcher community, this video offers a behind-the-scenes look at how AI security testing is evolving, and why human insight remains critical in an AI-first future. CTA: For more information about HackerOne, visit https://www.hackerone.com/ ▼ Keep up with us ▼ ◇ LinkedIn → https://www.linkedin.com/company/HackerOne ◇ Twitter →...
https://www.youtube.com/watch?v=Sq9tt2Z-RF8
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

10+ Daily Essentials As An Ethical Hacker
LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE 0 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 🔗 LINKS: 📖 MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2 Hacking APIs: Breaking Web Application Programming Interfaces - https://amzn.to/45g4bOr Black Hat GraphQL: Attacking Next Generation APIs - https://amzn.to/455F9l3 🍿 WATCH NEXT: If I Started Bug Bounty Hunting in 2024, I'd Do this - https://youtu.be/z6O6McIDYhU 2023 How to Bug Bounty - https://youtu.be/FDeuOhE5MhU Bug Bounty Hunting...
https://www.youtube.com/watch?v=1Fd6ZjfAeHE
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

CISA Director Uploaded Documents to ChatGPT - Threat Wire
⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev Want to work with Ali? endingwithalicollabs@gmail.com [❗] Join the Patreon→ https://patreon.com/threatwire 00:00 0 - Intro 00:00:15 - Big Tech Makes Moves to Secure 00:02:55 - Google Engineer Tried Stealing 00:05:04 - Backdoor Delivered by Infrastructure Vuln 00:06:18 - Ingress Nginx End of Life Alarms 00:08:07 - DDoSecrets Has Changed Domains 00:08:35 - Other Stories 00:09:51 - Comment Section 00:11:08 - Outro LINKS 🔗 Story 1: Big Tech Makes Moves to Secure https://blog.whatsapp.com/whatsapps-latest-privacy-protection-strict-account-settings https://www.bleepingcomputer.com/news/apple/new-apple-privacy-feature-limits-location-tracking-on-iphones-ipads/ https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526 https://www.bleepingcomputer.com/news/security/whatsapp-gets-new-lockdown-feature-that-blocks-cyberattacks/ 🔗...
https://www.youtube.com/watch?v=GXyLby0eyd0
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Hacking a Windows Web Application
LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE 0 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 🔗 LINKS: 📖 MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2 Hacking APIs: Breaking Web Application Programming Interfaces - https://amzn.to/45g4bOr Black Hat GraphQL: Attacking Next Generation APIs - https://amzn.to/455F9l3 🍿 WATCH NEXT: If I Started Bug Bounty Hunting in 2024, I'd Do this - https://youtu.be/z6O6McIDYhU 2023 How to Bug Bounty - https://youtu.be/FDeuOhE5MhU Bug Bounty Hunting...
https://www.youtube.com/watch?v=kPGpxg1Op8U
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Live Hacking 2025: .3M in Bounties, Tested Around the World
In 2025, HackerOne Live Hacking events brought the security researcher community and organizations together across the world—from Australia to Amsterdam and beyond. The result? Real-world systems tested in real time, and .3 million paid in bounties for impactful findings. This recap captures the intensity, collaboration, and results behind Live Hacking Events, where diverse perspectives help surface what tools alone can't and turn insight into action. 🌍 Global reach. 💥 Real impact. 🔐 Stronger security. Learn more about Live Hacking Event and continuous security at https://www.hackerone.com/ ▼ Keep up with us ▼ ◇ LinkedIn → https://www.linkedin.com/company/HackerOne ◇ Twitter → https://twitter.com/Hacker0x01
https://www.youtube.com/watch?v=QRuNFSB26kI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

The Rise of the Bionic Hacker: AI, Autonomy & the Future of Offensive Security | Black Hat Europe
AI is transforming offensive security—expanding attack surfaces, accelerating exploitation, and redefining how organizations defend themselves. In this full presentation from Black Hat Europe 2025, Laurie Mercer, Senior Director of Sales Engineering at HackerOne, breaks down what the data tells us about the future of AI-driven security. Drawing from the 2025 Hacker-Powered Security Report and real-world insights from the HackerOne platform, Laurie explores how AI is reshaping both attacker behavior and defensive strategy. In this session, you'll learn: -Why prompt injection attacks increased 540% in the last year -How 70% of security researchers are using AI tools to find vulnerabilities faster -What AI-native testing and autonomous agents mean for modern offensive security -How leading...
https://www.youtube.com/watch?v=7vI6JLU6hXQ
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

AI is Killing Bug Bounties - Threat Wire
⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else: https://links.ali.dev Want to work with Ali? endingwithalicollabs@gmail.com [❗] Join the Patreon→ https://patreon.com/threatwire 00:00 0 - Intro 00:14 1 - cURL 02:33 2 - amorphic 04:30 3 - cloudfare 06:46 4 - news LINKS 🔗 Story 1: AI is Killing Bug Bounties https://daniel.haxx.se/blog/2026/01/26/the-end-of-the-curl-bug-bounty/ 🔗 Story 2: Anthropic MCPs Vulnerable https://cyata.ai/blog/cyata-research-breaking-anthropics-official-mcp-server/ 🔗 Story 3: Cloudflare Went Wild In Miami https://blog.cloudflare.com/route-leak-incident-january-22-2026/ 🔗 Story...
https://www.youtube.com/watch?v=otVwTlRbKLg
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Exciting Announcement With an Upcoming Capture the Flag!
Signup for Snyk's Capture the Flag 👉🏼 https://snyk.co/ujxq4 LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE 0 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 🔗 LINKS: 📖 MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2 Hacking APIs: Breaking Web Application Programming Interfaces - https://amzn.to/45g4bOr Black Hat GraphQL: Attacking Next Generation APIs - https://amzn.to/455F9l3 🍿 WATCH NEXT: If I Started Bug Bounty Hunting in 2024, I'd Do this - https://youtu.be/z6O6McIDYhU 2023...
https://www.youtube.com/watch?v=KdALh119Upc
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

HackerOne Agentic PTaaS Demo: Continuous Validation for Real-World Risk
In this demo, we walk through how HackerOne combines agentic automation with expert human validation to deliver continuous pentesting at enterprise scale. You'll see how reconnaissance, testing, and validation adapt as environments change—so findings reflect real-world exploitability, not theoretical risk. This demo is designed for security leaders and teams looking to move beyond point-in-time pentests and reduce risk continuously. For more information about HackerOne, visit https://www.hackerone.com/ ▼ Keep up with us ▼ ◇ LinkedIn → https://www.linkedin.com/company/HackerOne ◇ Twitter → https://twitter.com/Hacker0x01
https://www.youtube.com/watch?v=ml_bEsSxmQo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

How to Become a Top Bug Bounty Hunter in 2026
Thank you to YesWeHack for sponsoring this video. Check them out at http://hhub.io/ywhblog or get a free private invite by doing their monthly challenges: http://hhub.io/ywhdojo LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE 0 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 🔗 LINKS: 📖 MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2 Hacking APIs: Breaking Web Application Programming Interfaces - https://amzn.to/45g4bOr Black Hat GraphQL: Attacking Next Generation APIs - https://amzn.to/455F9l3 🍿...
https://www.youtube.com/watch?v=oFxcG7yerG4
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

The Truth About Windows Explorer Timestamps
In this episode, we'll uncover how Windows Explorer really retrieves file timestamps when you browse a directory of files. Learn why these timestamps actually come from the $FILE_NAME attribute in the parent directory's $I30 index, not from $STANDARD_INFORMATION, and how NTFS structures like $INDEX_ROOT and $INDEX_ALLOCATION make this process efficient. *** If you enjoy this video, please consider supporting 13Cubed on Patreon at patreon.com/13cubed. *** 📖 Chapters 00:00 - Intro 01:02 - Recap of MACB Timestamps 04:52 - Recap of $I30 06:58 - Conclusion 🛠 Resources $STANDARD_INFORMATION vs. $FILE_NAME: https://dfir.ru/2021/01/10/standard_information-vs-file_name/ #Forensics #DigitalForensics #DFIR #ComputerForensics #WindowsForensics
https://www.youtube.com/watch?v=PdyVkmhMcOA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

This Simple Vulnerability Was Worth ,000
Signup for Snyk's CTF 👉🏼 http://snyk.co/ujxq4 LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE 0 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 🔗 LINKS: 📖 MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2 Hacking APIs: Breaking Web Application Programming Interfaces - https://amzn.to/45g4bOr Black Hat GraphQL: Attacking Next Generation APIs - https://amzn.to/455F9l3 🍿 WATCH NEXT: If I Started Bug Bounty Hunting in 2024, I'd Do this - https://youtu.be/z6O6McIDYhU 2023 How to Bug Bounty...
https://www.youtube.com/watch?v=uW7COsIKTXM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

I bought this tiny ereader… Then rewrote It
Meet the Xteink X4, a tiny 4.3" E-ink eReader that can cost around and is small enough to slip in a pocket. If you're a security professional (or just someone who lives in technical docs) and you want a way to read without getting pulled into notifications and doomscrolling, this minimalist ereader is a surprisingly good alternative to reading on your phone. What makes the Xteink X4 interesting isn't just the price it's how much you can do with it. It's ESP32-based, which makes it a genuinely approachable device for anyone learning firmware development and embedded C++. I walk through the usability, why I recommend the community firmware for a cleaner UI, and how I use it with Calibre and Calibre-Web for a more self-hosted, library-style workflow instead of being locked into a...
https://www.youtube.com/watch?v=yMoq17-1pJA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

AI Red Teaming: What Breaks, How It Breaks, and Human Role
What is AI Red Teaming, and how is it different from traditional red teaming or AI jailbreaking? In this video, security researcher rez0 explains how AI red teaming has evolved beyond alignment testing to focus on real-world AI security risks inside modern applications. If your application uses LLMs, chat interfaces, or AI-powered features, this conversation breaks down what security teams and developers need to know, without the hype. 🔐 AI changes the attack surface. Human expertise is essential to find what tools miss. Read more on AI Red Teaming here: https://www.hackerone.com/blog/ai-red-teaming-explained-by-red-teamers ▼ Keep up with us ▼ ◇ LinkedIn → https://www.linkedin.com/company/HackerOne ◇ Twitter → https://twitter.com/Hacker0x01 ◇ Instagram → https://www.instagram.com/hacker0x01/...
https://www.youtube.com/watch?v=ld-I17vRC78
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Major Update to 13Cubed Courses: Chaos at Cobalt
Chaos at Cobalt, a major new practice scenario, is now available for Investigating Windows Endpoints, Investigating Windows Memory, and Investigating Linux Devices. Access the Additional Content module to get started! 🚀 Or enroll today at https://training.13cubed.com #Forensics #DigitalForensics #DFIR #ComputerForensics #WindowsForensics #LinuxForensics
https://www.youtube.com/watch?v=CzF6DFhSfHw
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 Recon Village - How to Become One of Them: Deep Cover Ops - Sean Jones, Kaloyan Ivanov

https://www.youtube.com/watch?v=aSOiPxOBs1E
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 Recon Village - Inside the Shadows Tracking RaaS Groups, Cyber Threats - John Dilgen

https://www.youtube.com/watch?v=esKyHO5WjPU
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 Recon Village - Autonomous Video Hunter AI Agents for Real Time OSINT - Kevin Dela Rosa

https://www.youtube.com/watch?v=oHjQSpcP664
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 Recon Village - A Playbook for Integration Servers - Ryan Bonner, Guðmundur Karlsson

https://www.youtube.com/watch?v=wgf5GKrY3nc
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 Recon Village - Mapping the Shadow War From Estonia to Ukraine - Evgueni Erchov

https://www.youtube.com/watch?v=y-1_nKM8DRQ
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 Recon Village - Building Local Knowledge Graphs for OSINT - Donald Pellegrino

https://www.youtube.com/watch?v=yIUfntW_TxY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 Recon Village - OSINT & Modern Recon Uncover Global VPN Infrastructure - Vladimir Tokarev

https://www.youtube.com/watch?v=4HGFlZZfWc8
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 Recon Village - Pretty Good Pivot - Simwindie

https://www.youtube.com/watch?v=6mykx1zS1yo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 Recon Village - enumeraite: AI Assisted Web Attack Surface Enumeration - Özgün Kültekin

https://www.youtube.com/watch?v=IzsBS_E2RVY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 Recon Village - OSINT Signals Pop Quiz - Master Chen

https://www.youtube.com/watch?v=L-ZqeZbiWn8
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 Recon Village - Investigating Foreign Tech from Online Retailers - Michael Portera

https://www.youtube.com/watch?v=MAtllbHmxP4
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DEF CON 33 Recon Village - Attack Surface in Motion - Muslim Koser

https://www.youtube.com/watch?v=N7w6FklAmVA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

My Favorite Bug Bounty Findings In 2025
LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 Try Snyk's Cursor Integration 👉🏼 https://snyk.co/nahamsec-integration 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE 0 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 🔗 LINKS: 📖 MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2 Hacking APIs: Breaking Web Application Programming Interfaces - https://amzn.to/45g4bOr Black Hat GraphQL: Attacking Next Generation APIs - https://amzn.to/455F9l3 🍿 WATCH NEXT: If I Started Bug Bounty Hunting in 2024, I'd Do this - https://youtu.be/z6O6McIDYhU 2023...
https://www.youtube.com/watch?v=zvUglkPWals
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Manipulating Memory with Cheat Engine - Hacky Christmas [NahamCon 2025 CTF]
🎅 Video walkthrough for the Hacky Christmas challenge I made for the NahamCon Capture the Flag (CTF) competition 2025 Winter Edition (organised by @NahamSec) It was a game hacking challenge (Unity) where players were expected to escape the ice box (teleport) and then obtain more than 1 million points. The easiest way to do this is to identify those values (coordinates and points) in memory, and modify them! Write-ups/tutorials aimed at beginners - Hope you enjoy 🙂 #NahamCon #NahamCon2025 #NahamConCTF #CTF #GameHacking #CheatEngine Full write-ups for all my NahamCon 2025 challenges: https://cryptocat.me/blog/ctf/2025#nahamcon-winter Want to learn more about hacking games with cheat engine? Check out my full tutorial series over on the @intigriti channel: https://www.youtube.com/watch?v=ku6AtIY-Lu0&list=PLmqenIp2RQcg0x2mDAyL2MC23DAGcCR9b...
https://www.youtube.com/watch?v=fs9WeNkUB4M
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

This Feature in Burp Suite Low-Key Changes Everything
LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE 0 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 🔗 LINKS: 📖 MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2 Hacking APIs: Breaking Web Application Programming Interfaces - https://amzn.to/45g4bOr Black Hat GraphQL: Attacking Next Generation APIs - https://amzn.to/455F9l3 🍿 WATCH NEXT: If I Started Bug Bounty Hunting in 2024, I'd Do this - https://youtu.be/z6O6McIDYhU 2023 How to Bug Bounty - https://youtu.be/FDeuOhE5MhU Bug Bounty Hunting...
https://www.youtube.com/watch?v=cy-crkgLPvI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Adversarial Image Attacks Explained
Adversarial images are specially crafted visuals that embed hidden prompts or instructions, invisible to humans but detectable by AI systems, allowing attackers to manipulate AI behavior through prompt injection. These attacks exploit image processing pipelines like OCR and scaling, potentially leading to data leaks, unauthorized actions, or command execution in tools like Google Gemini and Vertex AI. To defend against them, treat all images as untrusted inputs, disable unnecessary automated processing, and use advanced tools like PromptShield™ to scan and block risky content in real time. Read the full article: https://purplesec.us/learn/adversarial-image-attacks/ 🔒 Secure Your LLMs With PromptShield™ --------------------------------------------------------------- Sitting between...
https://www.youtube.com/watch?v=fNhXqDOoMfA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Mother Printers: Full Exploit Chain Analysis + Demo [HackingHub]
Mother Printers is a multi-stage challenge (web/rev/pwn) I created for @HackingHub_io. It was inspired by the Brother Printers CVEs discovered by Stephen Fewer (@OfficialRapid7) and extended by Star Labs (@STAR-Labs) for Pwn2Own 2025. Players must first enumerate a printer manufacturer website. When downloading the firmware, they will spot an open directory listing with a "printer_build" binary and a remote printer configuration (exposed secrets). While reversing the binaries, they find a similar chain of vulnerabilities to the original research; info leak, authentication bypass (default password generation), buffer overflow in the referer header (3-byte overwrite) and an SSRF. The challenge is designed so that players must chain all vulnerabilities together, i.e. a vulnerability can only...
https://www.youtube.com/watch?v=ebNYtX_8lOY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

I Got A Remote Code Execution On A Wordpress Site Using AI
Check out Neo here 👉🏼 https://neo.projectdiscovery.io LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE 0 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 🔗 LINKS: 📖 MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2 Hacking APIs: Breaking Web Application Programming Interfaces - https://amzn.to/45g4bOr Black Hat GraphQL: Attacking Next Generation APIs - https://amzn.to/455F9l3 🍿 WATCH NEXT: If I Started Bug Bounty Hunting in 2024, I'd Do this - https://youtu.be/z6O6McIDYhU 2023 How to...
https://www.youtube.com/watch?v=AnVONITvWw4
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

13Cubed AMA - Answering Your Questions!
In this special 13Cubed episode, I answer questions collected from the community! *** If you enjoy this video, please consider supporting 13Cubed on Patreon at patreon.com/13cubed. *** #Forensics #DigitalForensics #DFIR #ComputerForensics
https://www.youtube.com/watch?v=duz5BoZUly8
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Free Post Recon Course and Methodology For Bug Bounty Hunters
Signup for Hostinger and get 10% off using code NAHAMSEC 👉🏼 https://hostinger.com/nahamsec LIKE and SUBSCRIBE with NOTIFICATIONS ON if you enjoyed the video! 👍 📚 If you want to learn bug bounty hunting from me: https://bugbounty.nahamsec.training 💻 If you want to practice some of my free labs and challenges: https://app.hackinghub.io 💵 FREE 0 DigitalOcean Credit: https://m.do.co/c/3236319b9d0b 🔗 LINKS: 📖 MY FAVORITE BOOKS: Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities -https://amzn.to/3Re8Pa2 Hacking APIs: Breaking Web Application Programming Interfaces - https://amzn.to/45g4bOr Black Hat GraphQL: Attacking Next Generation APIs - https://amzn.to/455F9l3 🍿 WATCH NEXT: If I Started Bug Bounty Hunting in 2024, I'd Do this - https://youtu.be/z6O6McIDYhU 2023...
https://www.youtube.com/watch?v=RYdTp4a9S34
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

The Robot is Watching You [Not Sci-Fi Anymore]
The robot is watching you, @aliasrobotics7887 discovered. And it's sending all data to remote servers. Alias then put an AI Hacking Agent (CAI) inside the robot. CAI hacked the robot and the cloud infrastructure from within. Read their entire 100-page paper, reporting what they did: https://arxiv.org/pdf/2509.14096
https://www.youtube.com/watch?v=0v1M63zwt7Y
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

IDA Free Reverse Engineering - Step-by-Step EXE Analysis
Step-by-step reverse engineering tutorial with IDA Free covering decompiling, types, enums, function definitions, and naming for EXEs. Sample can be found on unpac.me 7b5b060d9013725413f3f77719d0881035246b281e18005c0040e78a32e1c6cc Full tutorial series on the OALABS Patreon https://www.patreon.com/collection/1259251?view=expanded
https://www.youtube.com/watch?v=u1ZEh3bb6h4
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Hidden Product Activation and Serial Keygen - "Ultimate Calculator 3000" [Rev/Web Challenge]
🚩 Video walkthrough for the "Ultimate Calculator 3000" (rev/web) challenge I created and hosted on my website (https://cryptocat.me) 😺 Players had to locate a hidden validator routine inside the calculator binary, uncover a secondary HTTP service, and obtain the support team's offline validation tool. Reversing the Go binary exposed an HMAC-based serial check, allowing crafted serials to pass verification and reveal the flag 😎 #CTF #Challenge #CryptoCat Check out the accompanying writeup here: https://cryptocat.me/blog/ctf/monthly/cryptocat/1025/ultimate_calculator/ Join discord for source code and early access to future challenges: https://discord.cryptocat.me 🐛CryptoCat CTF Challenges🐞 https://challenge.cryptocat.me - https://discord.gg/qHbAN3wfRK 👷‍♂️Resources🛠 https://cryptocat.me/resources Overview: 0:00...
https://www.youtube.com/watch?v=lRJno96za5A
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

The Easy Way to Analyze Linux Memory
In this episode, we'll take a look at a quick and easy way to find the Intermediate Symbol File (ISF) for the Linux memory image you're analyzing. This method will save you time and help streamline your memory analysis workflow. *** If you enjoy this video, please consider supporting 13Cubed on Patreon at patreon.com/13cubed. *** 📖 Chapters 00:00 - Intro 00:37 - Demo 🛠 Resources Abyss-W4tcher ISFs: https://github.com/Abyss-W4tcher/volatility3-symbols leludo84 ISFs: https://github.com/leludo84/vol3-linux-profiles Volatility-ready URLs: https://raw.githubusercontent.com/Abyss-W4tcher/volatility3-symbols/refs/heads/master/banners/banners.json https://raw.githubusercontent.com/leludo84/vol3-linux-profiles/refs/heads/main/banners-isf.json #Forensics #DigitalForensics #DFIR #ComputerForensics...
https://www.youtube.com/watch?v=W40gdWNdwUI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

The AI Black Box Problem - [Latent Space Exploration]
Latent space exploration. Created from multiple sources using NotebookLM.
https://www.youtube.com/watch?v=HfCUbauGUNs
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

AI Ethics That Work: Privacy, Fairness & Security
How do we build AI security that is ethical, resilient, and trustworthy without turning “ethics” into a checkbox? Host Jason Firch sits down with Tom Vazdar (Chief AI Officer, PurpleSec) and Josh Salvage (CTO, PurpleSec) to unpack the real-world tensions between privacy, fairness, explainability, regulation, human oversight, and adversarial threats. If you're a security leader, engineer, or business decision-maker, this conversation will help you separate PR from practice and design AI systems that respect rights, dignity, and safety—while staying practical for SMBs and enterprises alike. 🔒 Secure Your LLMs With PromptShield™ --------------------------------------------------------------- Sitting between users and your AI models, PromptShield™ detects, blocks, and educates...
https://www.youtube.com/watch?v=lsZ0h4_b5T0
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

AI Security Frameworks: Must-Know Challenges & Solutions For 2025
Uncover the biggest challenges organizations face in implementing AI security frameworks and explore expert solutions to stay ahead in 2025! Join Security Beyond The Checkbox host Jason Firch, alongside PurpleSec's Chief AI Officer Tom Vazdar, and CTO Joshua Selvidge, as they break down the essentials of securing AI systems. From cloud-based deployments to zero trust models, learn how to protect critical infrastructure like hospitals and banks from emerging threats like data poisoning and model manipulation. Discover why frameworks like ISO 42001 and NIST AI RMF are vital for governance, ethics, and robust security. Gain insights into the importance of industry-academia-policy collaboration to strengthen AI security standards. 🔒 Secure Your LLMs With PromptShield™ --------------------------------------------------------------- Sitting...
https://www.youtube.com/watch?v=UJ7FFF33kik
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Shadow AI: The Silent Cybersecurity Threat Businesses Can't Ignore
In this episode of Security Beyond the Checkbox, host Jason Firch sits down with PurpleSec's Chief AI Officer Tom Vazdar, and CTO Joshua Selvidge to unpack Shadow AI, which is the unauthorized use of AI tools like ChatGPT that mirrors the risks of Shadow IT. As SMBs grapple with emerging threats like ransomware and phishing, Shadow AI is exploding due to its easy access and massive productivity gains, but it brings serious dangers if left unchecked. We dive into why employees turn to these tools (often non-maliciously) to boost efficiency, and the real risks: data leaks, intellectual property theft, regulatory violations under GDPR or HIPAA, and reputational harm. Hear real-world examples, including Samsung's ban on ChatGPT after engineers leaked proprietary code, and Air Canada's chatbot...
https://www.youtube.com/watch?v=MLUBbgReax8
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Brother Printers Vulnerabilities Explained - Info Leak, Auth Bypass, Buffer Overflow, SSRF, DoS
🖨 Print Scan Hacks: Multiple vulnerabilities were identified across various Brother devices by Stephen Fewer (@OfficialRapid7) 🔬 In this video, we'll analyse the zero-day research whitepaper and review the 8 vulnerabilities/exploits (CVE-2024-51977 through CVE-2024-51984) that were disclosed. Topics covered include info leak, remote auth bypass, buffer overflow, SSRF, DoS and credential exposure. Write-ups/tutorials aimed at beginners - Hope you enjoy 🙂 #Vulnerability #Research #OffSec 🐛Brother Printer Vulnerability Research🐞 Blog: https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed Whitepaper: https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf Exploits:...
https://www.youtube.com/watch?v=--SaQKmcyiU
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

IDA Free Reverse Engineering - Step-by-Step DLL Analysis
Step-by-step reverse engineering tutorial with IDA Free covering decompiling, types, enums, function definitions, and naming for DLLs. Sample can be found on unpac.me 93f9703cc7339014cd1bc82da0ab8909957112b93fba2430b5ee90a1d424a5ed Full tutorial series on the OALABS Patreon https://www.patreon.com/collection/1259251?view=expanded
https://www.youtube.com/watch?v=tbIjHJ1ygBY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

OWASP Secure Code Inspired Offensive Payloads [For Pentesters]
A compilation of attack vectors and payloads for penetration testing and offensive security, inspired from the OWASP Secure Code Review Guide. I've guided NotebookLM to create this presentation for offensive pentesters.
https://www.youtube.com/watch?v=XqwJusDJXEQ
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Will AI Replace Digital Forensics Experts?
Is AI going to replace digital forensic investigators? In this episode, we'll test a local instance of DeepSeek-R1 in Windows forensics to see how it compares to a human investigator. Let's find out if AI can handle the job! *** If you enjoy this video, please consider supporting 13Cubed on Patreon at patreon.com/13cubed. *** 📖 Chapters 00:00 - Intro 01:23 - The Questions Begin 10:43 - Closing Thoughts 🛠 Resources #Forensics #DigitalForensics #DFIR #ComputerForensics #WindowsForensics #AI #DeepSeek
https://www.youtube.com/watch?v=lvkBtIhvThk
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DC33 - Red Team Village - Recap
Thank you to everyone who attended the village this year at DEF CON! Another huge thank you to our core team, sponsors, volunteers, goons, and DEF CON! Red Team Village Website: https://redteamvillage.io Discord: https://redteamvillage.io/discord Twitter: https://redteamvillage.io/twitter
https://www.youtube.com/watch?v=oP27VgfmfuY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

HTTP Pipelining or Request Smuggling? - No More False Positives
Based on the amazing work of James Kettle from Portswigger. You can find it here: https://portswigger.net/research/how-to-distinguish-http-pipelining-from-request-smuggling. I've guided NotebookLM to create this presentation for offensive pentesters.
https://www.youtube.com/watch?v=SNQlR6jiGeg
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Leaking Passwords via CSS Injection - "Fancy Login Form" [WHY CTF 2025]
🚩 Video walkthrough for the "Fancy Login Form" web challenge featured in the 2025 WHY CTF competition. The challenge involved exploiting a URL-based redirection to take control of a CSS file, then using blind exfiltration to extract each character of the admin's password from the login form field 😎 #CTF #Challenge #WHY2025 Check out the accompanying writeups here: https://cryptocat.me/blog/ctf/2025/#why/ Join my discord server if you have any questions: https://discord.cryptocat.me 🐛What Hackers Yearn (@WHY2025NL) CTF🐞 https://ctf.why2025.org https://why2025.org https://discord.gg/fkn7qW3GRT https://ctftime.org/event/2680 👷‍♂️Resources🛠 https://cryptocat.me/resources Overview: 0:00 Intro 0:46 Fancy Login Form 2:27 Hijacking CSS file 6:10 Blind data exfiltration 9:37...
https://www.youtube.com/watch?v=jUjlj2z5jJk
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Analysing the DOM to find Reflected XSS
Stuck watching YouTube videos about bug bounty hunting rather than a bounty hitting your inbox? In this series I partner with Bugcrowd to bring you everything you need to know to find their most common first bugs. In this video we explore one of the common first vulnerabilities - Reflected Cross-Site Scripting (XSS). Learn the basics of XSS, how to identify and exploit this vulnerability, and see a practical demonstration you can replicate on your own targets. With step-by-step methodology and tips, this episode will guide you through finding and validating the internets most common first bug. This series couldn't happen without the support of our sponsor Bugcrowd, Bugcrowd is the best place to start hacking with a wide range of public and private programs from APIs to Desktop Applications...
https://www.youtube.com/watch?v=CpV3XDqzYyE
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

HTTP/1.1 - The Desync Endgame
Based on the amazing work of James Kettle of @PortSwiggerTV found at https://portswigger.net/research/http1-must-die. I've guided NotebookLM by @Google to create this presentation for offensive pentesters.
https://www.youtube.com/watch?v=zs1rZnZuJ6A
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

On HTTP Request Smuggling - RFC 9110 Style
Based on the RFC 9110, I've guided NotebookLM by @Google to create this presentation for offensive pentesters, specifically on HTTP Methods. RFC 9110: https://www.rfc-editor.org/rfc/rfc9110.html
https://www.youtube.com/watch?v=CvEBA_Sm-mw
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

HTTP Methods for Offensive Pentesting
Based on the RFC 9110, I've guided NotebookLM by @Google to create this presentation for offensive pentesters, specifically on HTTP Methods. RFC 9110: https://www.rfc-editor.org/rfc/rfc9110.html
https://www.youtube.com/watch?v=ZtoPYQD0rXs
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DC33 - Red Team Village x Amazon
Thank you for being one of our platinum sponsors! Additional information about Amazon can be obtained from https://www.aboutamazon.com/ They're Hiring!: https://amazon.jobs/content/en/teams/amazon-security/devices-services Twitter/X: https://x.com/amazon LinkedIn: https://www.linkedin.com/company/amazon/ _________________________________________________________________________ Red Team Village Website: https://redteamvillage.io Discord: https://redteamvillage.io/discord Twitter/X: https://redteamvillage.io/twitter
https://www.youtube.com/watch?v=-KIEqwVejSE
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Behind the Book: Threat Hunting macOS with Jaron Bradley
In this episode, I sit down with Jaron Bradley, author of the upcoming book Threat Hunting macOS. With the recent release of the new 13Cubed training course Investigating macOS Endpoints, this felt like the perfect time to bring Jaron on the channel to discuss his new book — a resource I believe will be an excellent companion to the course. 📘 Order Jaron's Book – Threat Hunting macOS https://themittenmac.com/threat-hunting-book/ 🌐 Visit Jaron's Website – The Mitten Mac https://themittenmac.com/ 🎓 Learn macOS Forensics! https://training.13cubed.com/investigating-macos-endpoints #Forensics #DigitalForensics #DFIR #ComputerForensics #macOSForensics
https://www.youtube.com/watch?v=8Uj2NbWnU6M
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DC33 - Red Team Village x Flare
Thank you for being one of our platinum sponsors! Additional information about Flare can be obtained from https://flare.io/. Twitter/X: https://twitter.com/FlareSystems LinkedIn: https://www.linkedin.com/company/flare-systems-inc Discord: https://discord.gg/qRGBT2TcEV YouTube: https://www.youtube.com/channel/UCU5Nr_7GpdxgxPOhuWuvXVg _________________________________________________________________________ Red Team Village Website: https://redteamvillage.io Discord: https://redteamvillage.io/discord Twitter/X: https://redteamvillage.io/twitter
https://www.youtube.com/watch?v=xapuRA5uEbg
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Still not found your first bug? Try IDORs
Stuck watching YouTube videos about bug bounty hunting rather than your inbox? In this series I partner with Bugcrowd to bring you everything you need to know to find their most common first bugs. In this episode we're talking about the ever popular IDOR, and while yes, I am aware I have made videos on this topic many times, it's still a solid choice for your first bug, difficult to automate and scale, yet easy to understand and test for. Its tediousness means that top hackers often skip them in favour of trickier bugs, making it perfect for newer bug bounty hunters to focus on. This series couldn't happen without the support of our sponsor Bugcrowd, Bugcrowd is the best place to start hacking with a wide range of public and private programs from APIs to Desktop Applications and everything...
https://www.youtube.com/watch?v=8Uva1su3goc
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DC33 - Red Team Village x White Knight Labs
Thank you for being one of our platinum sponsors! Additional information about White Knight Labs can be obtained from https://whiteknightlabs.com. Twitter/X: https://twitter.com/WKL_cyber LinkedIn: https://www.linkedin.com/company/white-knight-labs/ Discord: https://discord.gg/qRGBT2TcEV _________________________________________________________________________ Red Team Village Website: https://redteamvillage.io Discord: https://redteamvillage.io/discord Twitter/X: https://redteamvillage.io/twitter
https://www.youtube.com/watch?v=RULalD2__Lg
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DC33 - Red Team Village x Kindo
Thank you for being one of our platinum sponsors! Additional information about Kindo can be obtained from https://www.kindo.ai/. Twitter/X: https://x.com/kindoai LinkedIn: https://linkedin.com/company/kindo-ai YouTube: https://www.youtube.com/channel/UC9ahwU5unSzp0ytNPcjVg8g _________________________________________________________________________ Red Team Village Website: https://redteamvillage.io Discord: https://redteamvillage.io/discord Twitter/X: https://redteamvillage.io/twitter
https://www.youtube.com/watch?v=PT7zVhbdvpk
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Windows Memory Forensics Challenge
Welcome to a special Windows Memory Forensics Challenge from 13Cubed. This is an excellent opportunity to get some hands-on practice with Windows memory forensics. You'll find the questions below, as well as a link to download the memory sample needed to answer those questions. 🎉 Check out the official training courses from 13Cubed at https://training.13cubed.com! 🛑 CONTEST IS CLOSED 🛑 All winners have been selected. We still encourage you to participate in the lab, as we believe it will serve as an excellent practice opportunity. If you do participate, please consider creating a video or blog-based walkthrough of the process, as it would be a valuable resource for the community! ⚠️ CAUTION ⚠️ This memory sample contains a simulated ransomware for educational purposes....
https://www.youtube.com/watch?v=6JN6iAenEoA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

New Course! Investigating macOS Endpoints
Check out Investigating macOS Endpoints, a comprehensive macOS forensics training course from 13Cubed! Starting with fundamental principles, Investigating macOS Endpoints advances to encompass log analysis, file systems, forensic artifacts, persistence mechanisms, evidence collection, and more! This course offers extensive hands-on practice and a capstone involving the analysis of a compromised system. Tailored for both beginners and seasoned professionals, it serves as an ideal resource for mastering macOS forensics! 🎉 Enroll today at https://training.13cubed.com! #Forensics #DigitalForensics #DFIR #macOSForensics
https://www.youtube.com/watch?v=_D6oHm-371A
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Offensive Security Web Expert (OSWE) Review + Tips/Tricks [OffSec]
Offensive Security Web Expert (OSWE) review, tips/tricks etc. Hopefully this video will be useful for aspiring bug bounty hunters, security researchers, pentesters, CTF players etc who might be interested in taking the Advanced Web Attacks and Exploitation course from Offensive Security (OffSec) 🙂 #OSWE #BugBounty #EthicalHacking #PenTesting #AppSec #WebSec #InfoSec #OffSec ↢OffSec OSWE↣ Web-300 course: https://www.offsec.com/courses/web-300 Web-300 syllabus: https://manage.offsec.com/app/uploads/2023/01/WEB-300-Syllabus-Google-Docs.pdf Web-300 FAQ: https://help.offsec.com/hc/en-us/articles/360046868971-WEB-300-Advanced-Web-Attacks-and-Exploitation-FAQ OSWE exam guide: https://help.offsec.com/hc/en-us/articles/360046869951-WEB-300-Advanced-Web-Attacks-and-Exploitation-OSWE-Exam-Guide OSWE...
https://www.youtube.com/watch?v=IK4t-i5lDEs
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

RTVcron | Introduction to Ghidra and Version Tracking
RTVcron is our monthly live stream where we bring workshops to you! Learn more about cron and RTV at https://redteamvillage.io Mike will demonstrate basic Ghidra functionality such as importing programs, launching tools, and using the standard windows and plugins. Next he will explain the design and use of the Version Tracking tool, and how it can help your workflow understanding functionality while analyzing upgrades to software. Finally, time permitting, he will show beginning usage of the BSim capability and how this can be a game changer for discovering lineage of software en masse. Participants are encouraged to ask questions about the application, as Mike will be demonstrating everything live without a net.
https://www.youtube.com/watch?v=6ou3Qcwuao8
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Vibe Coding in Cursor for Cyber Security
In the past few weeks I've dove headfirst into vibe coding with Cursor, so I wanted to share what I've been working on and some tips and tricks. In this video we'll cover all things vibe coding for hackers: What is it? How is it making waves on Twitter and within the startup and AI influencer communities? More importantly, what does it mean for us bug bounty hunters and hackers? I'll share tips on using AI for coding, how to get started with tools like Cursor, Gemini, and Docker, and even give you a peek at a vibe-coded pet adoption website I worked on. Whether you're a coding newbie or looking to simplify your process, this video has something for you. Enjoy! Links: Awesome .cursorrules: https://github.com/PatrickJS/awesome-cursorrules Spec-drive Vibe Coding (how to write design docs for...
https://www.youtube.com/watch?v=wnVpmSrhNRo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

A New(ish) Way to Detect Process Hollowing
In this episode, we'll briefly explore how process hollowing works. Then, we'll examine the relatively new windows.hollowprocesses plugin for Volatility 3—a more recent alternative to the popular HollowFind plugin from Volatility 2. As you'll see, this new plugin isn't a one-for-one replacement for HollowFind, but it can still be useful. ⚠️ Deprecation Notice The windows.hollowprocesses plugin is being renamed to windows.malware.hollowprocesses in an upcoming Volatility 3 release. The plugin's behavior and output remain unchanged. ❤️ Special thanks to Mike Peterson of https://nullsec.us for research and testing. Download the memory samples here: https://cdn.13cubed.com/downloads/hollow.zip *** If you enjoy this video, please consider supporting 13Cubed on Patreon at patreon.com/13cubed....
https://www.youtube.com/watch?v=x5mGPAG41I4
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Tsuku CTF Web Challenge Walkthroughs (2025)
🚩 Video walkthrough for the 3 web challenges featured in the 2025 Tsuku CTF competition. Challenges include JSON injection, sensitive file disclosure and flawed PRNG implementation, YAML injection with WAF 😎 #CTF #Challenge #Tsuku Check out the accompanying writeups here: https://cryptocat.me/blog/ctf/2025#tsuku Join my discord server if you have any questions: https://discord.cryptocat.me 🐛CIT@CTF🐞 https://tsukuctf.org https://discord.gg/xNgh3a6Ynp 👷‍♂️Resources🛠 https://cryptocat.me/resources Overview: 0:00 Intro 0:08 len_len 2:47 flash 8:28 YAMLwaf 12:23 Conclusion
https://www.youtube.com/watch?v=qGd4d0zmhy8
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

CTF@CIT Web Challenge Walkthroughs (2025)
🚩 Video walkthrough for the 5 web challenges featured in the 2025 CIT@CTF competition. Challenges include SQL injection (SQLi), git repo version history (git-dumper), local file read (with basic filter), flask session cookie tampering + server-side template injection (SSTI) and credential reuse / HTTP method tampering 😎 #CTF #Challenge #CIT Check out the accompanying writeups here: https://cryptocat.me/blog/ctf/2025/#ctf-cit Join my discord server if you have any questions: https://discord.cryptocat.me 🐛CIT@CTF🐞 https://ctf.cyber-cit.club https://discord.gg/GzUAsFvhbk 👷‍♂️Resources🛠 https://cryptocat.me/resources Overview: 0:00 Intro 0:06 Breaking authentication (SQLi) 2:20 Commit & Order: Version Control Unit (git dumping / history) 4:25 How I Parsed your JSON...
https://www.youtube.com/watch?v=ZBdApaw0r0M
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

RTVcron | Systematic Malware: A Rule-Based Approach to Creating Payloads
RTVcron is our monthly live stream where we bring workshops to you! Learn more about cron and RTV at https://redteamvillage.io This month we're joined by Kevin Clark and Skyler Knecht for "Systematic Malware: A Rule-Based Approach to Creating Payloads" Creating evasive payloads in the modern EDR landscape is less about knowing what to do, and more about learning what not to do. Although EDR has moved away from relying on static binary signatures, rule-based detections are still in play. Every step of payload execution is an opportunity to be detected. In this workshop, we showcase step-by-step instructions on how to craft evasive payloads. Kevin Clark Security Consultant at TrustedSec Kevin Clark is a Software Developer turned Penetration Tester at TrustedSec. He focuses on initial access...
https://www.youtube.com/watch?v=-xStGweK9KI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Reverse Engineering Access Tokens Part 2
This tutorial covers Windows Access Tokens, the Logon Session, Token Elevation, AdjustTokenPrivileges and the Windows Access Control Model. This is part of our IDA Pro reverse engineering series. The full series can be found on our patron... https://www.patreon.com/collection/1259251 ----- References Token Viewer (Tool) https://github.com/googleprojectzero/sandbox-attacksurface-analysis-tools LogonSessions (Tool) https://learn.microsoft.com/en-us/sysinternals/downloads/logonsessions Elastic - Introduction to Windows tokens for security practitioners https://www.elastic.co/blog/introduction-to-windows-tokens-for-security-practitioners UAC Overview (old but good) https://www.tiraniddo.dev/2017/05/reading-your-way-around-uac-part-1.html Access Control Model (Microsoft) https://learn.microsoft.com/en-us/windows/win32/secauthz/access-control-components LSA...
https://www.youtube.com/watch?v=Y58eBWyJxDA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Getting Started with Fuji - The Logical Choice for Mac Imaging
In this episode, we'll look at Fuji — a free, open-source tool for performing live, logical forensic acquisitions of Mac computers (Intel or Apple Silicon). You'll see how Fuji leverages built-in macOS tools to generate a DMG and sparseimage, ready for analysis in your forensic tool of choice. This video is an excerpt from the 13Cubed training course "Investigating macOS Endpoints." Visit https://training.13cubed.com to learn more! 🛠 Resources Fuji: https://github.com/Lazza/Fuji
https://www.youtube.com/watch?v=9bEiizjySHA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

How FIN6 Exfiltrates Files Over FTP
Access the FIN6 Exfiltration Lab: https://bit.ly/3XsXFRZ In this final episode of our FIN6 Adversary Emulation mini-series, we demonstrate how to emulate FIN6's exfiltration techniques, focusing on how this financially motivated threat actor collects, stages, archives, and exfiltrates sensitive data from compromised systems. // CYBER RANGES Adversary Emulation Labs ► New to CYBER RANGES? Register for a free account here: https://bit.ly/42VxDu5 ► Access the FIN6 Exfiltration Lab: https://bit.ly/3XsXFRZ ► Adversary Emulation Fundamentals Labs (Free): https://bit.ly/4gQd8SB 🔗 Video Resources & References CTID Adversary Emulation Library: https://github.com/center-for-threat-informed-defense/adversary_emulation_library 🎥 Have an idea for a video? make your submission here: https://forms.gle/VDwwMsuudzQfT9VM6 //...
https://www.youtube.com/watch?v=SbZ7JUII-SQ
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi
I met Jonathan in 2018 at the CCC when he was just 18 years old. Back then he referenced my videos which had a little bit of impact on his life. Now a lot of time has passed and in this interview I want to get to know Jonathan better. How did he get into hacking, founding of the CTF team perfect blue, working as a vulnerability researcher and ultimately transitioning into a new career. From Zero to Zero Day (2018): https://www.youtube.com/watch?v=xp1YDOtWohw Jonathan on Twitter: https://x.com/j0nathanj 00:00:00 - How we met 00:02:16 - Jonathan's early life 00:04:24 - Going to college as a teenager 00:18:52 - Meeting like-minded people in CTF 00:27:29 - Getting first VR internship at Checkpoint 00:32:34 - Creating opportunities through networking 00:43:40 - Working at Microsoft Security Response...
https://www.youtube.com/watch?v=BOLN_B0qnZk
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Automated AI Reverse Engineering with MCP for IDA and Ghidra (Live VIBE RE)
Testing MCP plugins for IDA and Ghidra live with @mrexodia IDA MCP https://github.com/mrexodia/ida-pro-mcp Ghidra MCP (thanks @lauriewired ) https://github.com/LaurieWired/GhidraMCP Malware sample 7b5b060d9013725413f3f77719d0881035246b281e18005c0040e78a32e1c6cc ----- OALABS DISCORD https://discord.gg/6h5Bh5AMDU OALABS PATREON https://www.patreon.com/oalabs Twitch https://www.twitch.tv/oalabslive OALABS GITHUB https://github.com/OALabs UNPACME - AUTOMATED MALWARE UNPACKING https://www.unpac.me/#/ -----
https://www.youtube.com/watch?v=iFxNuk3kxhk
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

RTVcron | Influcence_Ops: Tactical Pretexting
Welcome to RTVcron, our monthly live stream, held on the last Thursday of every month. Each two-hour session features a unique workshop led by a different expert, offering hands-on experience in offensive security tactics and strategies. Follow us: https://redteamvillage.io This month our workshop is provided by Jeff Tomkiewicz! Jeff Tomkiewicz is a Offensive Security Engineer for a Healthcare Fortune 40 organization, where he specializes in network penetration testing, social engineering, and physical penetration testing. With a rich background as a 21-year Air Force veteran, Jeff has served in various capacities, including K9 handler and trainer, Intelligence, and Special Operations. Residing in Colorado Springs, CO, where interests span upon horror films, performing in improv shows,...
https://www.youtube.com/watch?v=vlow4qZSOSE
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Reverse Engineering Access Tokens Part 1
This tutorial walks through the process of reverse engineering malware which uses AdjustTokenPrivileges to enable SeDebugPrivilege. No steps are skipped in the process! This is Module 2.2 of our IDA Pro reverse engineering series. The full series can be found on our patron... https://www.patreon.com/collection/1259251 ----- OALABS DISCORD https://discord.gg/6h5Bh5AMDU OALABS PATREON https://www.patreon.com/oalabs Twitch https://www.twitch.tv/oalabslive OALABS GITHUB https://github.com/OALabs UNPACME - AUTOMATED MALWARE UNPACKING https://www.unpac.me/#/ -----
https://www.youtube.com/watch?v=iT2U3UXhic4
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Python for Pentesters II - 0. Introduction
Part of the Python for Pentesters II course: https://www.youtube.com/playlist?list=PLonlF40eS6nyj9h8wwrOgf1yBGDB2CYT1 Connect with me: X: https://twitter.com/cristivlad25 IG: https://instagram.com/cristivladz
https://www.youtube.com/watch?v=1AAZDkSZePs
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Python for Pentesters II - 11 - Additional Resources and Personal Message
Part of the Python for Pentesters II course: https://www.youtube.com/playlist?list=PLonlF40eS6nyj9h8wwrOgf1yBGDB2CYT1 Connect with me: X: https://twitter.com/cristivlad25 IG: https://instagram.com/cristivladz
https://www.youtube.com/watch?v=zVgV__cRhvo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Python for Pentesters II - 10 - Finding Hidden Wireless Networks with Python
Part of the Python for Pentesters II course: https://www.youtube.com/playlist?list=PLonlF40eS6nyj9h8wwrOgf1yBGDB2CYT1 Connect with me: X: https://twitter.com/cristivlad25 IG: https://instagram.com/cristivladz
https://www.youtube.com/watch?v=0EB5U8dcAVc
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Python for Pentesters II - 9 - Spoofing your MAC Address with Python
Part of the Python for Pentesters II course: https://www.youtube.com/playlist?list=PLonlF40eS6nyj9h8wwrOgf1yBGDB2CYT1 Connect with me: X: https://twitter.com/cristivlad25 IG: https://instagram.com/cristivladz
https://www.youtube.com/watch?v=OtvSfjX6kGY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Python for Pentesters II - 8 - Cracking Hashes with Python and Hashlib
Part of the Python for Pentesters II course: https://www.youtube.com/playlist?list=PLonlF40eS6nyj9h8wwrOgf1yBGDB2CYT1 Connect with me: X: https://twitter.com/cristivlad25 IG: https://instagram.com/cristivladz
https://www.youtube.com/watch?v=EA4JFh8hj9E
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Python for Pentesters II - 7 - Discovering Subdomains with Python
Part of the Python for Pentesters II course: https://www.youtube.com/playlist?list=PLonlF40eS6nyj9h8wwrOgf1yBGDB2CYT1 Connect with me: X: https://twitter.com/cristivlad25 IG: https://instagram.com/cristivladz
https://www.youtube.com/watch?v=X9oyU7kUob8
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Python for Pentesters II - 6 - Attacking Web Forms with requests and BeautifulSoup in Python
Part of the Python for Pentesters II course: https://www.youtube.com/playlist?list=PLonlF40eS6nyj9h8wwrOgf1yBGDB2CYT1 Connect with me: X: https://twitter.com/cristivlad25 IG: https://instagram.com/cristivladz
https://www.youtube.com/watch?v=sYg3dyetcYA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Python for Pentesters II - 5 - The Scapy Module for Network Traffic Sniffing and Manipulation
Part of the Python for Pentesters II course: https://www.youtube.com/playlist?list=PLonlF40eS6nyj9h8wwrOgf1yBGDB2CYT1 Connect with me: X: https://twitter.com/cristivlad25 IG: https://instagram.com/cristivladz
https://www.youtube.com/watch?v=M_5YKbsk4eY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

18 - API Security (low/med/high) - Damn Vulnerable Web Application (DVWA)
18 - API Testing (low/med/high difficulties) video from the Damn Vulnerable Web Application (DVWA) walkthrough/tutorial series. DVWA is an intentionally vulnerable application for you to learn about ethical hacking. I made this series for students on the MSc in cybersecurity course at Queen's University Belfast but hopefully it can help others too! Hope you enjoy 🙂 ↢Damn Vulnerable Web Application (DVWA)↣ https://github.com/digininja/DVWA 👷‍♂️Resources🛠 https://cryptocat.me/resources ↢Chapters↣ Start - 0:00 Low - 0:38 Med - 3:59 High - 7:07 Impossible - 13:19 End - 13:35
https://www.youtube.com/watch?v=c_6RaCekH40
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

The German Hacking Championship
An amazing event for aspiring German hackers is happening right now. I went to the finals in 2024, share a few impressions and tell you about this year's event. Learn hacking: https://www.hextree.io/ (ad) CSCG 2025 runs from 1. March 2025 until 1. May 2025 Rules: https://play.cscg.live/rules Die Hacking Meisterschaft: https://hacking-meisterschaft.de/ NFITS: https://nfits.de/spenden/ European Cybersecurity Challenge: https://ecsc.eu/ 00:00 - Intro DHM 2024 00:52 - CTF Teams vs. CSCG Teams 01:48 - Sponsor Challenges 03:04 - My CSCG History 04:18 - NFITS 05:06 - Die Deutsche Hacking Meisterschaft (DHM) 07:00 - Take the Opportunity! 07:47 - Outro =[ ❤️ Support ]= → My courses: https://www.hextree.io/ → My font: https://shop.liveoverflow.com/ → per Video: https://www.patreon.com/join/liveoverflow →...
https://www.youtube.com/watch?v=f0C3RH7baEw
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

17 - Cryptography (low/med/high) - Damn Vulnerable Web Application (DVWA)
17 - Cryptography (low/med/high difficulties) video from the Damn Vulnerable Web Application (DVWA) walkthrough/tutorial series. DVWA is an intentionally vulnerable application for you to learn about ethical hacking. I made this series for students on the MSc in cybersecurity course at Queen's University Belfast but hopefully it can help others too! Hope you enjoy 🙂 ↢Damn Vulnerable Web Application (DVWA)↣ https://github.com/digininja/DVWA ↢Cryptography↣ https://cryptohack.org @pastiesbin2254 : https://www.youtube.com/watch?v=8Tr2aj6JETg https://www.nccgroup.com/uk/research-blog/cryptopals-exploiting-cbc-padding-oracles @nccgroup : https://www.youtube.com/watch?v=6yHM19rQjDo 👷‍♂️Resources🛠 https://cryptocat.me/resources ↢Chapters↣ Start - 0:00 Low - 0:14 Med...
https://www.youtube.com/watch?v=7WySPRERN0Q
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

RTV Overflow: "Breaching Bare Metal Kubernetes Clusters" with Graham Helton
Graham Helton - Arbiter of (in scope) chaos - "Attackers thrive in complex environments because they're motivated to dive deep into ambiguous technical details. In this workshop I will guide you through those ambiguous technical details by walking through multiple attack scenarios that can be used to fully compromise a bare metal Kubernetes cluster. After each attack, we'll discuss controls that could stop or mitigate each attack, what tools you should carry in your toolbox when performing a Kubernetes assessment, and the security implications (and misconceptions) of Kubernetes. By the end of this workshop, you will be paranoid by the power you possess next time you land a shell in a Kubernetes pod." Web: https://grahamhelton.com/ Twitter/X: @GrahamHelton3 linkedin.com/in/grahamhelton/ ...
https://www.youtube.com/watch?v=iR064xsllqk
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

RTV Overflow "An Operators Guide: Hunting SCCM in the Real World" w/ Zachary Stein & Garrett Foster
Zachary Stein (Security Consultant at SpecterOps) and Garrett Foster (Senior Security Consultant at SpecterOps) - "SCCM abuse has become a popular technique in the offensive security community but can be intimidating to test in production environments due to its complexity. This workshop aims to provide operators not only a safe environment to practice tradecraft but also provide them with the confidence to properly find and assess SCCM during their engagements." Twitter/X: @unsigned_sh0rt Twitter/X: @synzack21 https://www.linkedin.com/in/garrett-foster86/ https://www.linkedin.com/in/zacharydstein/ ________________________________________________________________ The Red Team Village Red Team Village Website: https://redteamvillage.io Discord: https://redteamvillage.io/discord Twitter:...
https://www.youtube.com/watch?v=TmfWYDqEEUo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

RTV Overflow: "Physical Red Teaming for Offensive Cyber Teams" with Ana Aslanishvili & Shawn Abelson
Ana Aslanishvili (Red Teaming Aficionado) and Shawn Abelson (Ex-Head of Physical Red Team @ Meta, Current Consultant/Trainer for PhySec Red Teaming) - "Offensive security is an unfamiliar concept to most physical security practitioners. Yet we still rely on physical security teams to protect our hardware, network, ports, and assets. Physical security professionals are often non-technical, former law enforcement/military, and are focused on protecting people instead of property. This talk will bridge the gap between physical and cyber red teaming, covering the best approaches, common pitfalls, dangers, and benefits of testing physical security programs as part of a red team assessment. From the difficulty of “patching” physical vulnerabilities to examples of red teams gone wrong and how...
https://www.youtube.com/watch?v=FZS32kb5IXk
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Do you know this common Go vulnerability?
When auditing code it's crucial to know about common issues. In this video we explore a Go issue that I was not aware of. Learn hacking on https://www.hextree.io/ (ad) 38c3 CTF - Fajny Jagazyn Wartości Kluczy: https://2024.ctf.link/internal/challenge/fb03748d-7e94-4ca2-8998-a5e0ffcbd761/ Unintended solution: https://msanft.foo/blog/hxp-38c3-web-fajny-jagazyn/ Challenge author writeup: https://hxp.io/blog/114/hxp-38C3-CTF-Fajny-Jagazyn-Wartoci-Kluczy/ VSCode Go debugger client code: https://github.com/golang/vscode-go/blob/39786ea90f18ab98f75d091b9a04367d1b1df82c/extension/src/debugAdapter/goDebug.ts#L1557 00:00 - Intro 00:20 - Go gjson vs json behavior 01:33 - Overview CTF challenge "Fajny Jagazyn Wartości Kluczy" 04:33 - Weird server setup? 05:55 - Arbitrary file read 07:00 - /proc...
https://www.youtube.com/watch?v=wVknDjTgQoo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

RADAR Contact! An Obscure Evidence of Execution Artifact
In this episode, we'll take a look at a rather obscure evidence of execution artifact associated with RADAR, the Resource Exhaustion Detection and Resolution system. *** If you enjoy this video, please consider supporting 13Cubed on Patreon at patreon.com/13cubed. *** 📖 Chapters 00:00 - Intro 01:16 - What You Need to Know 🛠 Resources The Mystery of the HeapLeakDetection Registry Key: https://harelsegev.github.io/posts/the-mystery-of-the-heapleakdetection-registry-key/ HeapLeakDetection Registry Forensics: https://github.com/MHaggis/HeapLeakDetection #Forensics #DigitalForensics #DFIR #ComputerForensics #WindowsForensics
https://www.youtube.com/watch?v=edJa_SLVqOo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Emulating FIN6 - Active Directory Enumeration Made EASY
In this episode of the FIN6 Adversary Emulation series, we focus on Active Directory (AD) enumeration—a critical phase in FIN6's discovery techniques. Understanding how adversaries enumerate Active Directory environments will help you refine your tradecraft or improve your detection and mitigation capabilities if you are a Blue Teamer. In this video, you will learn how FIN6 performs Active Directory enumeration, and how to use native Windows commands like "net" and PowerShell's "Get-AD*" cmdlets for AD Enumeration. You will also learn how to utilize "AdFind.exe" to extract information from an Active Directory Environment. The lab environment used in this demonstration is available for free on CYBER RANGES, allowing you to follow along and practice these techniques in a safe and controlled...
https://www.youtube.com/watch?v=Iwxmscx3XXc
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

A Scammer Tried to Hack Me!
🚨🚔 I was recently offered a video sponsorship opportunity which turned out to be a DocuSign scam! They said they liked my videos but really just wanted to infect me with some malware 😿 Anyway, I thought I'd make a quick educational video to raise awareness. I'll explain what raised my suspicions and how I confirmed that the scammer was trying to hack me! #MalwareAnalysis #CyberSecurity #CyberSecurityAwareness #InfoSec #ScamBaiting #CryptoCat 🦠Malware Analysis🦠 VirusTotal: https://www.virustotal.com/gui/file/8f6f207277a8881e9c2042de4dc3a7c824eaa0334f522d96d412a2dfe5f93820/detection APP.ANY.RUN Analysis: https://app.any.run/tasks/78722395-a017-4ac5-a18c-47464aae63a7 APP.ANY.RUN Safebrowsing: https://app.any.run/browses/6a13f769-5ec1-43e4-bc23-71f076e04e36 DocuSign Scams: https://abnormalsecurity.com/blog/cybercriminals-exploit-docusign 👷‍♂️Resources🛠 https://cryptocat.me/resources Overview: 0:00...
https://www.youtube.com/watch?v=v8ZwlKAjMJA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

The SECRET to Embedding Metasploit Payloads in VBA Macros
In this episode of the Offensive VBA series, we explore how to integrate PowerShell payloads and stagers into custom VBA macros for initial access. Specifically, we'll demonstrate how to repurpose and format PowerShell stagers generated by Msfvenom and PowerShell-Empire to execute a reverse shell. This video will teach you how to format and embed HTA-based PowerShell payloads inside a VBA macro. // Adversary Emulation Labs New to CYBER RANGES? Register here: https://bit.ly/40dRMsb CYBER RANGES Adversary Emulation Labs (Free): https://bit.ly/4amBPEU 🎥 Have an idea for a video? make your submission here: https://forms.gle/VDwwMsuudzQfT9VM6 // MORE RESOURCES HACKERSPLOIT BLOG ►► https://bit.ly/3qjvSjK HACKERSPLOIT FORUM ►► https://bit.ly/39r2kcY HACKERSPLOIT ACADEMY ►►...
https://www.youtube.com/watch?v=Q1wQuHw5JKI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Offensive VBA 0x4 - Reverse Shell Macro with Powercat
In this episode of the Offensive VBA series, we dive into one of the most powerful techniques for red teamers—creating a reverse shell VBA macro using Powercat. This technique enables stealthy command execution and remote access through malicious macro-enabled Office documents. In this video, you will learn how to build a reverse shell VBA Macro that leverages Powercat allowing you to stealthily execute remote commands in-memory using PowerShell. Powercat: https://github.com/besimorhino/powercat // Adversary Emulation Labs New to CYBER RANGES? Register here: https://bit.ly/40dRMsb CYBER RANGES Adversary Emulation Labs (Free): https://bit.ly/4amBPEU 🎥 Have an idea for a video? make your submission here: https://forms.gle/VDwwMsuudzQfT9VM6 // MORE RESOURCES HACKERSPLOIT BLOG ►►...
https://www.youtube.com/watch?v=0W3Z3Br56XM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Offensive VBA 0x3 - Developing PowerShell Droppers
In this episode of the Offensive VBA series, we take VBA macros to the next level by developing PowerShell droppers designed for red team operations. Learn how to craft stealthy and effective VBA scripts that deliver and execute PowerShell payloads seamlessly. Here's what we'll cover: Writing VBA macros to execute PowerShell scripts, executing payloads directly in memory for stealth, leveraging environment variables to identify system paths dynamically, and techniques to remove traces of macro execution for stealthier operations // Adversary Emulation Labs New to CYBER RANGES? Register here: https://bit.ly/40dRMsb CYBER RANGES Adversary Emulation Labs (Free): https://bit.ly/4amBPEU 🎥 Have an idea for a video? make your submission here: https://forms.gle/VDwwMsuudzQfT9VM6 // MORE...
https://www.youtube.com/watch?v=ot3053UxJOc
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Offensive VBA 0x2 - Program & Command Execution
Welcome to the second episode of the Offensive VBA series, where we explore how to execute programs and system commands using VBA macros—essential skills for red teamers looking to leverage VBA for initial access and automation. In this video, you will learn how to use the Shell function to run external programs and commands and leverage the WScript.Shell object for enhanced control over command execution. You will also learn how to use the Shell Window Style options to ensure stealth during execution. // Adversary Emulation Labs New to CYBER RANGES? Register here: https://bit.ly/40dRMsb CYBER RANGES Adversary Emulation Labs (Free): https://bit.ly/4amBPEU 🎥 Have an idea for a video? make your submission here: https://forms.gle/VDwwMsuudzQfT9VM6 // MORE RESOURCES HACKERSPLOIT BLOG...
https://www.youtube.com/watch?v=ogbrNZ3SCRY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Offensive VBA 0x1 - Your First Macro
Welcome to the first episode of the Offensive VBA series, where we equip red teamers with the skills to leverage VBA for initial access and offensive operations. This video introduces you to Visual Basic for Applications (VBA)—a powerful scripting language integrated into Microsoft Office. Here's what we'll cover: What is VBA?: An overview of how VBA works and integrates with MS Office, A walkthrough of the Integrated Development Environment (IDE) and its features, and How to create and run a basic macro. Core Concepts: - Subroutines, Functions, and their calls. - Variable declaration, data types, and scope. - User input/output with MsgBox and control statements. // Adversary Emulation Labs New to CYBER RANGES? Register here: https://bit.ly/40dRMsb CYBER RANGES Adversary Emulation...
https://www.youtube.com/watch?v=jGy7_NusjuQ
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Emulating FIN6 - Gaining Initial Access (Office Word Macro)
Welcome to the next installment in our adversary emulation series! This video focuses on emulating initial access via a spear-phishing attachment—specifically, a malicious Word document with an embedded macro, just like FIN6 might use. 🚨 Next Up: If you want to manually develop your own VBA macros for initial access, don't worry—we've got you covered in the next video, where we'll dive deeper into crafting custom macros for red team operations. 🎥 Practical Labs: This video uses the CYBER RANGES platform to simulate a realistic attack environment. Try it out and follow along! // Adversary Emulation Labs New to CYBER RANGES? Register here: https://bit.ly/40dRMsb CYBER RANGES Adversary Emulation Labs (Free): https://bit.ly/4amBPEU The lab used in this video: https://app.cyberranges.com/scenario/624cd3877733a30007185a15 🔗...
https://www.youtube.com/watch?v=hUBRnh5dzrI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

USB Ethernet Adapter Malware??? Chinese RJ45-USB Full Analysis - Part 1
Reverse engineering all stages with line by line code analysis. e3f57d5ebc882a0a0ca96f9ba244fe97fb1a02a3297335451b9c5091332fe359 OP https://epcyber.com/blog/f/chinese-rj45-usb-with-flash-memory-exe-recognized-as-malware -- OALABS PATREON https://www.patreon.com/oalabs UNPACME - AUTOMATED MALWARE UNPACKING https://www.unpac.me/#/ OALABS DISCORD https://discord.gg/6h5Bh5AMDU Twitch https://www.twitch.tv/oalabslive OALABS GITHUB https://github.com/OALabs
https://www.youtube.com/watch?v=3IfJSGWIrCo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

FIN6 Adversary Emulation Plan (TTPs & Tooling)
Step into the world of adversary emulation with this in-depth video on the FIN6 Emulation Plan. Learn how to use the Center for Threat-Informed Defense (CTID) Adversary Emulation Library to craft a comprehensive emulation plan that replicates FIN6's sophisticated TTPs. This video will provide you with: An intelligence summary of FIN6, and the FIN6 emulation plan detailing TTPs from initial access to discovery, privilege escalation, and exfiltration. The Adversary Emulation Fundamentals labs used in this video and series are available for free on CYBER RANGES to practice and refine your emulation skills. // Adversary Emulation Labs New to CYBER RANGES? Register here: https://bit.ly/40dRMsb CYBER RANGES Adversary Emulation Labs (Free): https://bit.ly/4amBPEU Lab used in this video: https://app.cyberranges.com/scenario/624cb3bd7733a30007185990 🔗...
https://www.youtube.com/watch?v=qEfk44G4zFM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Developing An Adversary Emulation Plan
Creating an adversary emulation plan is a critical process for red teamers and cybersecurity professionals aiming to improve their organization's threat detection and response capabilities. In this video, we break down the entire process starting with how to select a threat actor relevant to your industry or geolocation, finding and leveraging Cyber Threat Intelligence (CTI) to gather insights on the adversary, and mapping the adversary's TTPs using the MITRE ATT&CK framework. 🔗 Video Resources & References Explore the comprehensive APT Groups and Operations Directory to find details on APT groups by region, their TTPs, and campaigns: https://apt.threattracking.com APTnotes: https://github.com/kbandla/APTnotes APT & CyberCriminal Campaign Collection: https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections //...
https://www.youtube.com/watch?v=1N49x1EWw7s
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

How 3 Hackers Combined Their Skills for Big Bounties! (And how you can do it too)
Join us in this special episode as we sit down with the winners of Bugcrowd's Hacker Showdown Carnival of Chaos virtual event: sw33tLie, bsysop, and godiego! Discover their hacking methodologies, collaboration techniques, and their journey to victory. Learn how they met, their advice for forming your own team, and the coolest exploits they uncovered during the event. If you're interested in bug bounties, team hacking, or just want to meet more hacker friends, this episode is a must-watch! 00:00 Introduction and Special Guests 01:04 Meet the Hackers 02:55 Carnival of Chaos Experience 04:32 Collaboration and Team Dynamics 06:15 Roles and Strategies in Hacking 13:00 Finding the Right Collaborators 15:25 Live Hacking Events vs. Virtual Events 22:30 Coolest Findings and Bug Stories 29:52 Advice...
https://www.youtube.com/watch?v=gUuDyIE44bc
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Introduction To Advanced Persistent Threats (APTs)
This informative video is designed to give you a comprehensive understanding of Advanced Persistent Threats (APTs). In this video, you will learn what APTs are, how they differ from traditional threat actors, and why they pose a significant challenge to organizations worldwide. This video also explores the categorization and naming of APT Groups based on nation-state affiliation, motivations, and the tactics they employ to achieve their objectives. This video also sheds light on the complexities of APT naming conventions used by major cybersecurity vendors, such as CrowdStrike and Mandiant, and the challenges in tracking these elusive groups. 🔗 Don't miss this resource: Access the "APT Groups and Operations" repository here: https://apt.threattracking.com — a comprehensive spreadsheet...
https://www.youtube.com/watch?v=CwSG5sa0Nao
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Be Kind, Rewind... The USN Journal
In this episode, we'll explore groundbreaking research from CyberCX on “rewinding the NTFS USN Journal.” This innovative technique reveals how to uncover the original locations of files recorded in the USN Journal, even after their corresponding NTFS FILE records have been reused by different files. 🛑 If you need a refresher on the prerequisites for this episode, watch these: Introduction to MFTECmd - NTFS MFT and Journal Forensics: https://www.youtube.com/watch?v=_qElVZJqlGY Anatomy of an NTFS FILE Record - Windows File System Forensics: https://www.youtube.com/watch?v=l4IphrAjzeY NTFS FILE Record Reuse: https://www.youtube.com/watch?v=6LpJVx7PrUI *** If you enjoy this video, please consider supporting 13Cubed on Patreon at patreon.com/13cubed. *** 📖 Chapters 00:00 - Intro 05:03...
https://www.youtube.com/watch?v=GDc8TbWiQio
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

403 Bypass and Deserialization in BentoML Library (CVE-2024-2912) - "Summar-AI-ze" [Web Challenge]
🚩 Video walkthrough for the "Summar-AI-ze" (web) challenge I created and hosted on my NEW website (https://cryptocat.me)!! Players were required to bypass a 403 error by using the X-Forwarded-For HTTP header, allowing them to activate an internal feature and grant their account beta access. The "beta" feature was a word summarization tool, running BentoML (LLM) on the backend. Players could identify the library by changing the content-type, triggering an error. Some research would yield CVE-2024-2912; a python pickle deserialization vulnerability, discovered by PinkDraconian 💜 Players could use the supplied PoC to gain code execution and exfiltrate the flag using curl 😎 #CTF #Challenge #CryptoCat Check out the accompanying writeup here: https://cryptocat.me/blog/ctf/monthly/cryptocat/1224/summaraize/ Join...
https://www.youtube.com/watch?v=5NCzDZcx_Dg
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Advent of Cyber Day 24: MQTT & Wireshark
Check out TryHackMe's Advent of Cyber Event: https://tryhackme.com/r/christmas?utm_source=youtube&utm_medium=social&utm_campaign= Join Katie, aka InsiderPhD, on the 24th day of TryHackMe's Advent of Cyber! Today, we're diving into the mysterious world of communication protocols, focusing on the MQTT protocol. Discover how the city of Wereville faces off against Mayor Malware's sabotage of smart lights and HVAC systems. Using Wireshark, Katie demonstrates how to analyze MQTT traffic, understand the publish-subscribe model, and reverse engineer networking protocols. With a blend of British humour and hands-on learning, Katie leads you through the process of identifying malicious commands and securing IoT devices. By the end, you'll learn how to troubleshoot smart devices, monitor network...
https://www.youtube.com/watch?v=ct6393M_Iow
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Introduction To Adversary Emulation
This video introduces you to Adversary Emulation and its role in Red Team operations. Furthermore, this video also explains the differences between Adversary Emulation and Simulation. Adversary emulation in the context of Red Teaming is the process of mimicking/emulating the tactics, techniques, and procedures (TTPs) of a threat actor/adversary to test the effectiveness and efficacy of an organization's defenses. //PLATFORMS BLOG ►► https://bit.ly/3qjvSjK FORUM ►► https://bit.ly/39r2kcY ACADEMY ►► https://bit.ly/39CuORr //SOCIAL NETWORKS TWITTER ►► https://bit.ly/3sNKXfq DISCORD ►► https://bit.ly/3hkIDsK INSTAGRAM ►► https://bit.ly/3sP1Syh LINKEDIN ►► https://bit.ly/360qwlN PATREON ►► https://bit.ly/365iDLK MERCHANDISE ►► https://bit.ly/3c2jDEn //BOOKS Privilege...
https://www.youtube.com/watch?v=CUMhiSdOSkY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Advent of Cyber Day 13: Exploring WebSocket Vulnerabilities with InsiderPhD
Check out TryHackMe's Advent of Cyber Event: https://tryhackme.com/r/christmas?utm_source=youtube&utm_medium=social&utm_campaign= Join me, in today's TryHackMe Advent of Cyber Day 13 walkthrough, where she diving into WebSockets and WebSocket message manipulation vulnerabilities. Learn about WebSocket message manipulation, common security risks such as weak authentication, message tampering. Follow along as I demonstrates how to identify and exploit WebSocket vulnerabilities in a web application. Perfect for anyone interested in web security, bug bounty hunting, and real-time communication protocols. 00:00 Introduction and Welcome 00:26 Story Setup: The Threat in Wareville 01:22 Understanding WebSockets 02:54 WebSocket Vulnerabilities 04:08 WebSocket Message Manipulation 07:33 Practical...
https://www.youtube.com/watch?v=ozgRXn44FF0
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Mastering Persistence: Using an Apache2 Rootkit for Stealth and Defense Evasion
In this video, I demonstrate the process of establishing persistence and evading defenses on Linux through the use of an Apache2 rootkit. The lab used in this video can be accessed for free on the CYBER RANGES platform. The links to the platform and lab are listed below: // CYBER RANGES CYBER RANGES: https://app.cyberranges.com SQL Injection Lab: https://app.cyberranges.com/scenario/67474e64a3907f65136f1a6d //LINKS Apache2 Rootkit: https://github.com/ChristianPapathanasiou/apache-rootkit //PLATFORMS BLOG ►► https://bit.ly/3qjvSjK FORUM ►► https://bit.ly/39r2kcY ACADEMY ►► https://bit.ly/39CuORr //SOCIAL NETWORKS TWITTER ►► https://bit.ly/3sNKXfq DISCORD ►► https://bit.ly/3hkIDsK INSTAGRAM ►► https://bit.ly/3sP1Syh LINKEDIN ►► https://bit.ly/360qwlN PATREON...
https://www.youtube.com/watch?v=Ra2altDvPYI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

XSS via CSPT and DOM Clobbering - "SafeNotes 2.0" [INTIGRITI 1337UP CTF 2024]
🚩 Video walkthrough for the "Safe Notes 2.0" (web) challenge I made for @intigriti's 1337UP LIVE (CTF) competition 2024! The developer of Safe Notes learnt from their mistakes and introduced a variety of security fixes, but unfortunately introduced new vulnerabilities! Players were required to chain DOM Clobbering, client-side path traversal (CSPT) and an Open Redirect in order to achieve XSS and steal the admin's cookie. 😎 #1337UP #1337UPLIVE #CTF #INTIGRITI #HackWithIntigriti Check out the accompanying writeup here: https://cryptocat.me/blog/ctf/2024/intigriti/web/safenotes_2 Check out Safe Notes v1 challenge and walkthrough here: https://challenge-0824.intigriti.io + https://youtu.be/yGRRGUtT9MU 🐛INTIGRITI 1337UPLIVE CTF🐞 https://ctftime.org/event/2134 https://ctf.intigriti.io https://discord.gg/intigriti-870275171938873395 👷‍♂️Resources🛠 https://cryptocat.me/resources Overview: 0:00...
https://www.youtube.com/watch?v=G-KoF8WAoUM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

NTFS FILE Record Reuse
In this continuation of "Anatomy of an NTFS FILE Record," we'll learn how NTFS manages record reuse and distinguishes between in-use and deleted files and directories. If you haven't watched the previous episode, watch it here: https://www.youtube.com/watch?v=l4IphrAjzeY *** If you enjoy this video, please consider supporting 13Cubed on Patreon at patreon.com/13cubed. *** 📖 Chapters 00:00 - Intro 00:31 - NTFS Master File Table (MFT) artiFACTS 01:49 - Analysis #Forensics #DigitalForensics #DFIR #ComputerForensics #WindowsForensics
https://www.youtube.com/watch?v=6LpJVx7PrUI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Basic Stack Buffer Overflow (with parameters) - "Retro2Win" [INTIGRITI 1337UP CTF 2024]
🚩 Video walkthrough for the "Retro2Win" (pwn) challenge I made for @intigriti's 1337UP LIVE (CTF) competition 2024! A classic "ret2win" challenge, the binary included a buffer overflow vulnerability, allowing players to take over the flow of execution and call a "win" function. In this case, the function expected two parameters, requiring values to be popped into the RDI/RSI registers first 😎 #1337UP #1337UPLIVE #CTF #INTIGRITI #HackWithIntigriti Check out the accompanying writeup here: https://cryptocat.me/blog/ctf/2024/intigriti/pwn/retro2win 🐛INTIGRITI 1337UPLIVE CTF🐞 https://ctftime.org/event/2134 https://ctf.intigriti.io https://discord.gg/intigriti-870275171938873395 👷‍♂️Resources🛠 https://cryptocat.me/resources Overview: 0:00 Intro 0:13 Basic file checks 0:50...
https://www.youtube.com/watch?v=Y37KMst1XFU
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

X-Forwarded-For Header Spoofing and XXE - "BioCorp" [INTIGRITI 1337UP CTF 2024]
🚩 Video walkthrough for the "BioCorp" (web) challenge I made for @intigriti's 1337UP LIVE (CTF) competition 2024! Players arrived an a website for an energy corporation, with a hint that they were working on decoupling their backend infrastructure from the public facing website. By analysing the source code, players would find a hidden panel, restricted by IP address. By setting the X-Forwarded-For header, they could spoof the IP and gain access to a nuclear panel. Since the panel read XML data, players would test for XXE and ultimately recover the flag 😎 #1337UP #1337UPLIVE #CTF #INTIGRITI #HackWithIntigriti Check out the accompanying writeup here: https://cryptocat.me/blog/ctf/2024/intigriti/web/biocorp 🐛INTIGRITI 1337UPLIVE CTF🐞 https://ctftime.org/event/2134 https://ctf.intigriti.io https://discord.gg/intigriti-870275171938873395 👷‍♂️Resources🛠 https://cryptocat.me/resources Overview: 0:00...
https://www.youtube.com/watch?v=hyi_JZvXOTU
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Review: This Is How They Tell Me the World Ends (not with a bang but with a bug)
Join me on a brand-new series as I indulge my childhood dream of creating a personal library, focusing on InfoSec books! Kicking things off, we dive into 'This Is How They Tell Me How The World Ends' by Nicole Perlroth. Despite being an ebook enthusiast, I decided it was high time to fill my custom-built bookcase with real books. We'll explore the fascinating histories and personal stories behind bug bounties, zero days, and cyber warfare, all narrated with the flair of a seasoned journalist. From cyber politics to sassy hacker quips - what did happen to that salmon anyway? To how hackers take on the global stage of politics 00:00 Introduction to the Quest for Infosec Books 00:29 Building the Dream Library 00:55 E-Readers vs. Physical Books 02:41 Criteria for Book Selection 04:44 First Book...
https://www.youtube.com/watch?v=OvUmumbiGRI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Understanding the Bugcrowd VRT: An Insider's Guide
Join us at DEF CON as we sit down with Codingo, VP of Operations at Bugcrowd, to look into the Vulnerability Rating Taxonomy (VRT). Learn what makes the VRT unique, how it compares to other vulnerability rating systems like CVSS, and why it's a key part of Bugcrowd's platform. Discover how the VRT evolves, the community's role in its development, and essential tips for hackers advocating for higher priorities on their findings. Whether you're a seasoned Bugcrowd hacker or new to the platform, this interview offers valuable insights and practical advice for improving your skills and understanding of the VRT. 00:00 Introduction to the VRT and Bugcrowd 00:33 Bugcrowd's Unique Offerings for Hackers 01:19 Understanding the VRT: An Interview with Kodinga 02:22 Differences Between VRT and CVSS 03:09...
https://www.youtube.com/watch?v=AIJK_Lw8rKw
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Google's Mobile VRP Behind the Scenes with Kristoffer Blasiak (Hextree Podcast Ep.1)
"There are not that many people that do Android research [...] There is no lack of targets. If people would actually look, there is lots to it. The scope is huge." - This is a conversation with Kristoffer Blasiak about Google's Mobile Vulnerability Rewards Program (VRP). Learn Android Hacking (ad): https://hextree.io/hextree-x-google Mobile VRP: https://bughunters.google.com/about/rules/android-friends/6618732618186752/google-mobile-vulnerability-reward-program-rules 00:00 - Introducing Kristoffer and Mobile VRP 01:38 - What happens when you submit a bug 05:07 - Android app bug bounty opportunities 08:38 - "There is no lack of targets" 13:06 - The side-loading threat model 17:00 - Bugs in Android app vs. web app 23:30 - Hextree sponsored by Google =[ ❤️ Support ]= → per Video:...
https://www.youtube.com/watch?v=SyTy1uZgx8E
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Reverse Engineering LAB Setup Tutorial (updated)
If you are just getting started with reverse engineering this the place to start. In this tutorial we provide an overview the current setup that we currently run, this is also the same setup used in all of our live streams and tutorials. The full notes for this tutorial are unlocked for everyone on our Patreon including links to all of the tools mentioned https://www.patreon.com/posts/101718688 ----- OALABS DISCORD https://discord.gg/6h5Bh5AMDU OALABS PATREON https://www.patreon.com/oalabs Twitch https://www.twitch.tv/oalabslive OALABS GITHUB https://github.com/OALabs UNPACME - AUTOMATED MALWARE UNPACKING https://www.unpac.me/#/ -----
https://www.youtube.com/watch?v=adAr0KBJm4U
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Get Bigger Bounties With Better Reports
At DEFCON a few weeks ago, I sat down with Codingo, VP of operations to talk about the key elements of writing an effective bug report, especially for non-native English speakers and beginners. We also discuss the importance of clarity, accurate replication steps, and the impact of comprehensive report writing on your bug bounty success. Learn from Bugcrowd's framework and community-driven practices to enhance your cybersecurity skills and make a stronger impact with your findings. 00:00 Introduction and Apology 00:37 Sponsor Message: Bugcrowd 01:22 Live from DEF CON 01:53 The Importance of Report Writing 02:17 Key Elements of a Good Report 04:46 Challenges in Report Writing 06:11 The Triage Process 08:21 Support for Non-Native English Speakers 09:17 Common Reasons for Bug Rejection 11:09...
https://www.youtube.com/watch?v=hnU0mRl0WBI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

My theory on how the webp 0day was discovered (BLASTPASS)
Want to learn more about hacking? Checkout our courses on https://www.hextree.io (ad) I have spent many hours looking at the webp vulnerability used in the 0day attack against iPhones. In the past videos we have seen why fuzzers have a hard time finding the issue, so I wanted to understand how this was discovered. And I think I have a good theory! Part 1: Huffman Tables https://youtu.be/lAyhKaclsPM Part 2: Fuzzing libwebp https://youtu.be/PJLWlmp8CDM Sources: https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/ https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html https://googleprojectzero.blogspot.com/2021/01/a-look-at-imessage-in-ios-14.html https://github.com/seemoo-lab/frida-scripts/blob/main/scripts/libdispatch.js https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html https://citizenlab.ca/2023/04/nso-groups-pegasus-spyware-returns-in-2022/ https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html https://github.com/libjxl/libjxl/blob/4b9dbde293f7f282b6952a02340300abfca2b184/lib/jxl/huffman_table.cc#L51 https://github.com/webmproject/libwebp/blob/7861947813b7ea02198f5d0b46afa5d987b797ae/src/dec/vp8l_dec.c#L86C3-L86C76 https://github.com/Tencent/mars/blob/9ab46e19ed3d4fcafe9d0de4b36547321f5ead83/mars/comm/windows/zlib/inftrees.h#L41 https://github.com/google/brunsli/blob/master/c/enc/jpeg_huffman_decode.h#L20 00:00...
https://www.youtube.com/watch?v=_ACCK0AUQ8Q
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Learn Android Hacking! - University Nevada, Las Vegas (2024)
During DEF CON and Black Hat, Google invited me to give a talk about Android hacking to students as part of init.g at the University Nevada, Las Vegas. In this talk I share my "trick" how to get into Android hacking and reverse engineering, which can also be adapted to any other topic. Learn android hacking (ad): https://app.hextree.io/map/android Watch my Vegas Vlog: https://www.youtube.com/watch?v=bhQ6FF3fCdA Article about the init.g event: https://www.unlv.edu/announcement/academics/google-sponsors-initgvegas-student-event-unlv-during-defcon =[ ❤️ Support ]= → per Video: https://www.patreon.com/join/liveoverflow → per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join 2nd Channel: https://www.youtube.com/LiveUnderflow =[ 🐕 Social ]= → Twitter: https://twitter.com/LiveOverflow/ →...
https://www.youtube.com/watch?v=fPt6fJDjKKM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DC32 - Red Team Village - Recap
Thank you to everyone who attended the village this year at DEF CON! Another huge thank you to our core team, sponsors, volunteers, goons, and DEF CON! Red Team Village Website: https://redteamvillage.io Discord: https://redteamvillage.io/discord Twitter: https://redteamvillage.io/twitter
https://www.youtube.com/watch?v=xjKxLoz0Dw4
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

My Trip to Las Vegas for DEFCON & Black Hat
My second time in Las Vegas for DEF CON and Black Hat. Lots has changed since I have been here 6 years ago. This trip was quite emotional for me and I am so grateful for the experience. Hope to meet you all again. Learn hacking (ad): https://app.hextree.io/ Buy our Faultier (US): https://1bitsquared.com/collections/embedded-hardware/products/faultier Google x Hextree Android Courses: https://www.hextree.io/hextree-x-google Raspberry Pi Hacking Challenge: https://www.hextree.io/rp2350 Embedded System Village: https://embeddedvillage.org/ My previous DEF CON 26 (6 years ago) Vlog: - https://youtu.be/B8saYocsI-U - https://www.youtube.com/watch?v=RXgp4cDbiq4 =[ ❤️ Support ]= → per Video: https://www.patreon.com/join/liveoverflow → per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join 2nd...
https://www.youtube.com/watch?v=bhQ6FF3fCdA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DC32 - Red Team Village x Amazon
Thank you Amazon for being a platinum sponsor! For more information about Amazon, please visit https://amazon.com. Red Team Village Website: https://redteamvillage.io Discord: https://redteamvillage.io/discord Twitter: https://redteamvillage.io/twitter
https://www.youtube.com/watch?v=ouv0tgFmo8M
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

DC32 - Red Team Village x Kindo
Thank you Kindo for being a platinum sponsor! For more information, please visit https://kindo.ai. Red Team Village Website: https://redteamvillage.io Discord: https://redteamvillage.io/discord Twitter: https://redteamvillage.io/twitter
https://www.youtube.com/watch?v=-1wBcsNVqPo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Planning Red Team Operations | Scope, ROE & Reporting
Hey guys, HackerSploit here back again with another video. This video outlines the process of planning and orchestrating Red Team operations. This video also outlines various Red Team resources, guides, and templates to plan and orchestrate a successful Red Team Operation. //LINKS & RESOURCES REDTEAM.GUIDE: https://redteam.guide/ The slides and written version of this video can be accessed on the HackerSploit Forum: https://forum.hackersploit.org/t/introduction-to-the-mitre-att-ck-framework/9127 //HACKERSPLOIT PLATFORMS BLOG ►► https://bit.ly/3qjvSjK FORUM ►► https://bit.ly/39r2kcY ACADEMY ►► https://bit.ly/39CuORr //SOCIAL NETWORKS TWITTER ►► https://bit.ly/3sNKXfq INSTAGRAM ►► https://bit.ly/3sP1Syh LINKEDIN ►► https://bit.ly/360qwlN PATREON ►► https://bit.ly/365iDLK MERCHANDISE...
https://www.youtube.com/watch?v=usDt-s2sACI
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Mapping APT TTPs With MITRE ATT&CK Navigator
Hey guys, HackerSploit here back again with another video. This video will introduce you to the MITRE ATT&CK Navigator and will illustrate how it can be operationalized for planning and orchestrating Red Team operations. MITRE ATT&CK Framework: https://attack.mitre.org/ MITRE ATT&CK Navigator: https://mitre-attack.github.io/attack-navigator/ //PLATFORMS BLOG ►► https://bit.ly/3qjvSjK FORUM ►► https://bit.ly/39r2kcY ACADEMY ►► https://bit.ly/39CuORr //SOCIAL NETWORKS TWITTER ►► https://bit.ly/3sNKXfq DISCORD ►► https://bit.ly/3hkIDsK INSTAGRAM ►► https://bit.ly/3sP1Syh LINKEDIN ►► https://bit.ly/360qwlN PATREON ►► https://bit.ly/365iDLK MERCHANDISE ►► https://bit.ly/3c2jDEn //BOOKS Privilege Escalation Techniques ►► https://amzn.to/3ylCl33 Docker...
https://www.youtube.com/watch?v=hN_r3JW6xsY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Zombieware
Self-replicating malware, long abandoned by its operators, continues to contribute significant volume and noise to malware feeds. We investigate this trend, which we refer to as Zombieware! Join us on Patreon for Part 2 where we reverse engineer a popular file infector and write an extractor to recover the infected files! https://www.patreon.com/posts/zombieware-part-103656376 Full Zombieware blog post can be found on our UnpacMe blog here: https://blog.unpac.me/2024/04/25/zombieware/ Ladislav Zezula's excellent talk from BSides Prague can be found here: https://www.youtube.com/watch?v=OgXvd-Wce9o ----- OALABS DISCORD https://discord.gg/oalabs OALABS PATREON https://www.patreon.com/oalabs Twitch https://www.twitch.tv/oalabslive OALABS GITHUB https://github.com/OALabs UNPACME - AUTOMATED...
https://www.youtube.com/watch?v=NNLZmB6_aGA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Should I report this vulnerability? Will I get a bounty?
It's really exciting to find your first bug BUT it's crushing when you realise it isn't reportable or comes back as NA from a client. Here are my top tips for identifying if you've found something and double checking before getting caught up in excitement! I still get emails about IDORs being NA because you need a victims cookie and hackers who are angry at bug bounty programs or triagers.
https://www.youtube.com/watch?v=T4EhE5f7fQg
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

How to take notes when you suck at it
This episode of the Bug Bounty course we talk about the importance of developing a personal note taking system that supports both hacking and learning. Emphasizing the differentiation between notes taken during hacking activities and those for learning about vulnerabilities. We look at methods for organizing and accessing your notes whether you are into Notion, Obsidian or Vim or even mind maps we'll look at how to integrate your notes with tools like Burp Suite. Creating your own knowledge base you can refer to every time you hack, tailored to individual needs and preferences and refine your own note-taking strategies for successful hacking and learning. 00:00 Introduction to the Bug Bounty Course 00:14 The Importance of a Personalized Note-Taking System 00:53 Sponsor Shoutout: Bugcrowd 01:45...
https://www.youtube.com/watch?v=uXuMvUPlvd0
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Finding The .webp Vulnerability in 8s (Fuzzing with AFL++)
A guide on how to do fuzzing with AFL++ in an attempt to rediscover the libwebp vulnerability CVE-2023-4863 that was used to hack iPhones. Want to learn hacking? Signup to https://hextree.io (ad) Buy my shitty font: https://shop.liveoverflow.com/ (ad) Watch webp Part 1: https://www.youtube.com/watch?v=lAyhKaclsPM Sudo Vulnerability Series: https://www.youtube.com/playlist?list=PLhixgUqwRTjy0gMuT4C3bmjeZjuNQyqdx Docker Video: https://www.youtube.com/watch?v=-YnMr1lj4Z8 OSS-Fuzz: https://github.com/google/oss-fuzz OSS-Fuzz libwebp coverage: https://storage.googleapis.com/oss-fuzz-coverage/libwebp/reports/20230901/linux/src/libwebp/src/utils/report.html AFLplusplus: https://github.com/AFLplusplus/AFLplusplus/blob/stable/docs/fuzzing_in_depth.md vanhauser's blog: https://www.srlabs.de/blog-post/advanced-fuzzing-unmasks-elusive-vulnerabilities vanhauser/thc...
https://www.youtube.com/watch?v=PJLWlmp8CDM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Introduction to YARA Part 4 - Efficient Rule Development
In this OALABS Patreon tutorial we cover the foundations of writing efficient YARA rules and provide some tips that can help speed up your YARA hunting. The full notes for this tutorial are unlocked for everyone on our Patreon https://www.patreon.com/posts/introduction-to-96638239 ----- OALABS DISCORD https://discord.gg/6h5Bh5AMDU OALABS PATREON https://www.patreon.com/oalabs Twitch https://www.twitch.tv/oalabslive OALABS GITHUB https://github.com/OALabs UNPACME - AUTOMATED MALWARE UNPACKING https://www.unpac.me/#/ -----
https://www.youtube.com/watch?v=xKeF_cPKXt0
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Introduction to YARA Part 3 - Rule Use Cases
In this OALABS Patreon tutorial we cover the three main use cases for YARA rules and how they apply to both BlueTeam/SOC operations and malware analysis. Fun notes have been unlocked for everyone on our Patreon here https://www.patreon.com/posts/introduction-to-96637668 The following are links to UnpacMe specific tutorials for developing each type of rule. Identifying specific malware families (unpacked) https://support.unpac.me/howto/hunting-with-yara/#identifying-specific-malware-families-unpacked Identifying malware on disk or in network traffic (packed) https://support.unpac.me/howto/hunting-with-yara/#identifying-malware-on-disk-or-in-network-traffic-packed Hunting (malware characteristics) https://support.unpac.me/howto/hunting-with-yara/#hunting-malware-characteristics ----- OALABS...
https://www.youtube.com/watch?v=xutDqu_OiH8
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Introduction to YARA Part 2 - Hunting on UnpacMe
In this OALABS Patreon tutorial we demonstrate a simple YARA hunting example using the UnpacMe free YARA scan service: https://www.unpac.me Full notes have been unlocked on our Patreon here https://www.patreon.com/posts/introduction-to-96637337 ----- OALABS DISCORD https://discord.gg/6h5Bh5AMDU OALABS PATREON https://www.patreon.com/oalabs Twitch https://www.twitch.tv/oalabslive OALABS GITHUB https://github.com/OALabs UNPACME - AUTOMATED MALWARE UNPACKING https://www.unpac.me/#/ -----
https://www.youtube.com/watch?v=Xqvlju9ED1c
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Introduction to YARA Part 1 - What is a YARA Rule
In this OALABS Patreon tutorial we cover the basics of YARA, what is it, how is it used, and how to write your first rule. Full notes have been unlocked on our Patreon here https://www.patreon.com/posts/introduction-to-96636471 ----- OALABS DISCORD https://discord.gg/6h5Bh5AMDU OALABS PATREON https://www.patreon.com/oalabs Twitch https://www.twitch.tv/oalabslive OALABS GITHUB https://github.com/OALabs UNPACME - AUTOMATED MALWARE UNPACKING https://www.unpac.me/#/ -----
https://www.youtube.com/watch?v=3BpIhbsDR_I
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Approaching Large Scope Targets Without Feeling Overwhelmed
In this video, we discuss how beginners can tackle large scope targets in bug bounty hunting. These targets offer more flexibility and potential for bug discovery, making them a great starting point for new hackers. However, they can be overwhelming due to their size and diversity. We suggest focusing on one part of the larger scope, which helps you understand the target's application development process without becoming overwhelmed. We also delve into different reconnaissance techniques, including subdomain enumeration, Google Dorking, API enumeration, OSINT, and more. Lastly, we emphasize that while reconnaissance is critical for large scope targets, it is just a stepping stone to actually hacking and finding vulnerabilities. This series couldn't happen without the support of our sponsor...
https://www.youtube.com/watch?v=W4pafFxOOwc
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

OALABS Holiday Variety Show 2023
𝘔𝘦𝘳𝘳𝘺 𝘐𝘋𝘈𝘮𝘢𝘴 𝘢𝘯𝘥 𝘢 𝘏𝘢𝘱𝘱𝘺 𝘉𝘪𝘯𝘫𝘢-𝘠𝘦𝘢𝘳 Join us for our holiday special reverse engineering variety show! - Guess the prompt AI charades - Random RE banter - Suspicious liquids in bottles We've got it all! Merry Christmas everyone we will see you in 2024! ----- OALABS PATREON https://www.patreon.com/oalabs OALABS DISCORD https://discord.gg/6h5Bh5AMDU Twitch https://www.twitch.tv/oalabslive OALABS GITHUB https://github.com/OALabs UNPACME - AUTOMATED MALWARE UNPACKING https://www.unpac.me/#/ -----
https://www.youtube.com/watch?v=XMVhX29AJbQ
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

A Vulnerability to Hack The World - CVE-2023-4863
Citizenlab discovered BLASTPASS, a 0day being actively exploited in the image format WebP. Known as CVE-2023-4863 and CVE-2023-41064, an issue in webp's build huffman table function can lead to a heap buffer overflow. This vulnerability is very interesting and I'm excited to share with you what I learned. Want to learn hacking? Signup to https://hextree.io (ad) Buy my shitty font: https://shop.liveoverflow.com/ (ad) WebP Fix Commit: https://chromium.googlesource.com/webm/libwebp/+/902bc9190331343b2017211debcec8d2ab87e17a Citizenlab: https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/ Ben Hawkes: https://blog.isosceles.com/the-webp-0day/ Software Updates Apple https://support.apple.com/en-gb/106361 Chrome https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html Firefox...
https://www.youtube.com/watch?v=lAyhKaclsPM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Tips For Analyzing Delphi Binaries in IDA (Danabot)
Reverse Engineering Delphi is a nightmare ... or it can be if you don't have the right setup! In this clip we cover some easy tips that can help make some of the analysis a bit easier. Full notes with links for tools are available here: https://research.openanalysis.net/danabot/loader/delphi/2023/12/04/danabot.html Full stream with analysis of the Danabot loader is available on Patreon here: https://www.patreon.com/posts/live-stream-vod-94510766 ----- OALABS PATREON https://www.patreon.com/oalabs OALABS DISCORD https://discord.gg/6h5Bh5AMDU Twitch https://www.twitch.tv/oalabslive OALABS GITHUB https://github.com/OALabs UNPACME - AUTOMATED MALWARE UNPACKING https://www.unpac.me/#/ -----
https://www.youtube.com/watch?v=04RsqP_P9Ss
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

How To Recognize Macro Encrypted Strings in Malware
How to identify when a macro is used to encrypt strings in malware... inferring source from disassembly! ----- OALABS PATREON https://www.patreon.com/oalabs OALABS DISCORD https://discord.gg/6h5Bh5AMDU Twitch https://www.twitch.tv/oalabslive OALABS GITHUB https://github.com/OALabs UNPACME - AUTOMATED MALWARE UNPACKING https://www.unpac.me/#/ -----
https://www.youtube.com/watch?v=fEAGYjhKzJY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Reinventing Web Security
Follow me down the rabbit hole into the wonderful world of IT security. Buy my terrible font (ad): https://shop.liveoverflow.com Learn hacking (ad): https://hextree.io Related Videos: https://www.youtube.com/watch?v=866olNIzbrk https://www.youtube.com/watch?v=lKzsNp4AveY Tweets: https://twitter.com/LiveOverflow/status/1720734431659376995 https://twitter.com/LiveOverflow/status/1720799912181284864 https://twitter.com/LiveOverflow/status/1721493232310214910 Understanding the Risks of Stolen Credentials: https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/46437.pdf Chapters: 00:00 - Intro 00:40 - Security Terminology 01:38 - Direct Database Access 03:40 - Introducing a Security Boundary 05:36 - Typical Web Security Vulnerabilities 07:03 - Clear-text Passwords...
https://www.youtube.com/watch?v=LxUAnZY_08o
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

401 Access Denied Ep88: The RISE of the CISO with Merike Kaeo
This week Joe Carson is joined by Merike Kaeo as they discuss the dynamic role of the CISO within an organization. They dive deeper into the role and how it interacts with different areas of the business, and what specific assets need protection and within what frameworks. An episode not to be missed! Jump-start your cybersecurity career for FREE with Cybrary! Follow us on Social! ~Cybrary Twitter ~Delinea Twitter ~Instagram ~Facebook ~YouTube
https://www.youtube.com/watch?v=FklaFGnBEyQ
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Intruder Alert Ep. 6 | Deconstructing Malware Attacks & Forging a Career in Cybersecurity
In this episode of Intruder Alert, Marcus Hutchins is joined by cybersecurity expert Caitlin Sarian, known for her role as the Global Lead of Cybersecurity Advocacy and Culture at TikTok and her expertise in data protection and privacy compliance. Marcus and Caitlin provide technical insight into the latest US malware attacks and share invaluable advice on breaking into the cybersecurity field. Follow us on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn Jump-start your cybersecurity career for FREE with Cybrary!
https://www.youtube.com/watch?v=2aRgdmTdtK0
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

401 Access Denied: Protecting Society and the Role of CERT with Tonu
In this episode we join host Joe Carson as he discusses state cybersecurity with Tonu Tammer of the Estonian National Cybersecurity Center. Tonu goes into the day-to-day operations of defending a country and its citizens from adversaries, as well as ransomware and DDOS attacks. Come along for an in-depth discussion with a cyber defender with years of experience in this exciting new episode! Jump-start your cybersecurity career for FREE with Cybrary! Follow us on Social! ~Cybrary Twitter ~Delinea Twitter ~Instagram ~Facebook ~YouTube
https://www.youtube.com/watch?v=aYCyFDlK7vg
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Intruder Alert Ep. 5 | Community Uprising: Unravelling the Reddit Blackout
In the latest episode of Intruder Alert, Marcus Hutchins and Cybrary blue teamer, Marc Balingit, delve into the the uproar around Reddit's blackout. They unravel the intricacies of Reddit's contentious API changes, which have cornered third-party apps like Apollo, sparking a sweeping blackout protest across thousands of subreddits. Furthermore, they explore the impact of Twitch's fresh policy adjustments, which are a threat to streamers' ad revenue, and other news impacting online communities. Follow us on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn Jump-start your cybersecurity career for FREE with Cybrary!
https://www.youtube.com/watch?v=8_CEqpKU8AA
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

401 Access Denied: Ep. 85 | Key Takeaways from the Verizon DBIR with Tony Goulding
Join host Joseph Carson and guest Tony Goulding as they break down the annual Verizon breach report. With over 16,000 incidents and more than 5,200 data breaches, there's a lot to look at. Tony and Joe have some great takeaways from this critical annual report and share their expert insights on what's new, what's changed, and what we're not doing so bad at (hint: MFA goes a long way!) Jump-start your cybersecurity career for FREE with Cybrary! Follow us on Social! ~Cybrary Twitter ~Delinea Twitter ~Instagram ~Facebook ~YouTube
https://www.youtube.com/watch?v=luXnfWO_U7I
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

401 Access Denied: Ep. 84 | The Best of RSAC & Cybersecurity Strategies with Bob Burns
RSAC was the place to be for cybersecurity in 2023, and Joe Carson is joined by Bob Burns to talk all about it. From the sessions that really resonated to the incredible human connections and networking, join Joe and Bob to deconstruct this year's most comprehensive conference. Were you at RSAC this year? Join us in the comments to let us know your favorite session! Jump-start your cybersecurity career for FREE with Cybrary! Follow us on Social! ~Cybrary Twitter ~Delinea Twitter ~Instagram ~Facebook ~YouTube
https://www.youtube.com/watch?v=qU40Yg7pfbo
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

The AI Revolution with Diana Kelley | 401 Access Denied Podcast Ep. 83
The AI Revolution with Diana Kelley | 401 Access Denied Podcast Ep. 83 Join Us: https://www.cybrary.it/?utm_source=youtube&utm_medium=video&utm_campaign=the-ai-revolution-with-diana-kelley Everybody's talking about it - the AI revolution is here. But given the rapid evolution in this field, it's hard to keep up with the sweeping effects this technology is causing. Luckily, Joe Carson is joined by longtime AI expert Diana Kelley to shed light on all of these changes. She addresses the many misconceptions and media misrepresentations surrounding AI, breaks down the different forms of this technology, and emphasizes the need for a better understanding of AI's capabilities and limitations. They also discuss the ethical and legal implications that will only become more potent as AI...
https://www.youtube.com/watch?v=ow9JszgoC1M
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Hacking the Government with Bryan Seely | 401 Access Denied Podcast Ep. 82
Hacking the Government with Bryan Seely | 401 Access Denied Podcast Ep. 82 Join Us: https://www.cybrary.it/?utm_source=youtube&utm_medium=video&utm_campaign=hacking-the-government-with-bryan-seely In this eye-opening episode, dive into the captivating world of cybercrime and social engineering with our host, Joe Carson, and special guest Bryan Seely! Bryan, a keynote speaker and cybersecurity expert best known for his Secret Service exposé, discusses his journey from a young computer enthusiast to a renowned public speaker. Join them as they investigate the mindset and techniques used by hackers, such as the use of aliases to deceive and manipulate their targets, as well as the importance of responsible disclosure and changing cybersecurity laws. Follow us for exclusive updates: ~https://twitter.com/cybraryIT ~https://www.instagram.com/cybrary.it/ ~https://www.facebook.com/cybraryit/ Follow...
https://www.youtube.com/watch?v=aagD2SxYUJM
Partager : LinkedIn / Twitter / Facebook / View / View (lite)

Intruder Alert Ep. 4 | Unmasking The New Global Malware Threat On Android Devices
Head to Cybrary.it to open your free account and start learning today! In this episode of Intruder Alert, join host Marcus Hutchins, world-renowned hacker, and red teamer Matt Mullins while they discuss the millions of devices recently infected with malware during production, and whether or not our devices are spying on us. For more information on how to jumpstart your career with the most cutting-edge cybersecurity training, head over to Cybrary.it to create your free account and get started on your learning journey! Make sure to subscribe so that you don't miss the latest new episodes, premiering live every two weeks, and dropping on YouTube On Demand.
https://www.youtube.com/watch?v=wc8T_RcwOkY
Partager : LinkedIn / Twitter / Facebook / View / View (lite)