Security

Security

MASSIVE Disney Leak by “Nullbulge” Hacker Group

This video from Eric Parker covers the recent large Disney Data Breach.

Read More
Privacy Security

From Bad to Worse: The Devastating Impact of the AT&T Hack Revealed

This video is from SomeOrdinaryGamers and covers the what we know so far about the AT&T hack. This time we take a look at how one of the largest Internet companies in the country was hacked and had “nearly all” of it’s customers data stolen. How did this happen? Let’s find out!

Read More
Security

The Hidden Danger: How UEFI Malware Can Compromise Your PC

In this video, Mental Outlaw discusses the UEFICanIHazBufferOverFlow bug (CVE-2024-0762) and other UEFI/BIOS malware threats as well as how to avoid them. The crux of the matter is that most people don’t even keep their system’s firmware updated, leaving a gaping window through which exploits can wreak havoc for years after their discovery and patching […]

Read More
AI Ethics Large Language Models Security

What Critical Vulnerabilities Have Hackers Exposed in AI?

This video is from BBC News. As is the case with most other software, artificial intelligence (AI) is vulnerable to hacking. A hacker, who is part of an international effort to draw attention to the shortcomings of the biggest tech companies, is stress-testing, or “jailbreaking,” the language models at Microsoft, ChatGPT and Google, according to […]

Read More
Privacy Security

Discover the Power of OSINT: How to Find Anyone Online for Cybersecurity Purposes

In this videofrom Nielsen Networking, “Find Anyone Online: The Power of OSINT in Cybersecurity!” delve into the world of Open Source Intelligence (OSINT) and its critical role in cybersecurity. See a hands-on tutorial on how to use powerful OSINT tools and techniques like Google Dorks, Shodan, haveibeenpwned.com, Spiderfoot, recon-ng, Maltego, Intelligence-X, and more. Whether you’re […]

Read More
Security Uncategorized

Exposed: ISP Accused of Hacking Customers for Torrenting

In a world increasingly reliant on digital connectivity, the line between safeguarding interests and infringing on freedom becomes blurred. A recent incident in Korea brings this tension into sharp focus, revealing a scenario that reads more like a cyberpunk novel than a news headline. Korea’s largest Internet Service Provider (ISP), KT, stands accused of deploying […]

Read More
Linux Security

From the Surface to the Core: Navigating the Kali Linux Apps Iceberg

This video from CyberFlow covers the hidden gems of Kali Linux.

Read More
Security

The Unraveling of Empire: Empire Darknet Market Admins Arrested

In the shadowy corridors of the internet, where anonymity reigns and the untraceable currency flows like water, the fall of Empire Market has unfolded like a modern-day digital tragedy. The recent arrest of Thomas Pavey and Rahee Hamilton, the alleged architects behind one of the largest darknet markets in history, marks a significant chapter in […]

Read More
Security

Uncovering a Critical 0-Day: How One Researcher Exposed Their ISP

This video is from Low Level Learning. This is truly one of the craziest scenarios I’ve ever seen. An API endpoint left wide open lets you hack anyone’s router. Article: https://samcurry.net/hacking-millions-of-modems Consider the modem—a device so ubiquitous and essential that it fades into the background of our digital lives. It’s our gateway to the vast […]

Read More
Security

How to Boost Your OSINT Game with This Essential Tool

In this video, Cody Bernardy goes over the tool created by @the_wojciech (on Twitter/X). This tool is great for quick aggregation of multiple data sources, allows you to export, etc.

Read More