Cybersecurity

Security

Uncovering the Latest Cyber Attack Trends: A Global Identity Crisis

Looking for a way to foresee future attacks and protect your data and your organization from cyber threats? In this video, cybersecurity expert Jeff Crume explains the steps you can take to gain that protection and understand where new threats will be coming from in the future.

Read More
AI Generative AI Large Language Models Security

WormGPT is like ChatGPT for Hackers and Cybercrime

This video is from AI Revolution. WormGPT is ChatGPT’s dark twin, designed for cybercrime and making waves in hacker communities. Unlike ethical AIs like Google Bard and ChatGPT – WormGPT has no limits, posing new threats online. In this video we show the dangerous side of AI models and the risks of WormGPT.

Read More
AI Data Driven Hardware

Devvret Rishi on Powering Real-World AI with Declarative AI and Open Source

In this episode, Frank sits down and talks with Devvret Rishi on powering real-world AI projects with declarative ML and the importance of open source. Andy was not able to attend this recording, but will be back next week! Show Notes Go to the episode page on Data Driven for all the meta data. Speaker […]

Read More
Privacy

Is the NSA is BUYING Your Internet History?!

This video is from Seytonic. Sources: https://www.documentcloud.org/documents/24376615-signed_wyden_letter_to_dni_re_nsa_purchase_of_domestic_metadata_and_ftc_order_on_data_brokers_with_attachments https://twitter.com/RonWyden/status/1750645396639199470 https://therecord.media/nsa-purchases-american-personal-data-from-brokers-wyden https://www.wired.com/story/pentagon-data-purchases-wyden-letter/ https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/ https://www.sec.gov/Archives/edgar/data/789019/000119312524011295/d708866d8k.htm https://gur.gov.ua/content/znyshchyly-vorozhu-planietu-detali-kiberataky-proty-tsentru-kosmichnoi-hidrometeorolohii-rf.html https://therecord.media/ukrainian-hackers-hit-russian-scientific-center

Read More
Hardware Security

How to Build a Powerful Home SIEM Lab Without Hassle! (Step by Step Guide)

This video is from Gerald Auger, PhD – Simply Cyber. Welcome to your one-stop guide for building a Free valuable Home SIEM Lab quickly and efficiently! This tutorial will help aspiring SOC analysts get practical experience without having the job yet. Get Ahead in Your Cybersecurity Career: Practical experience is key in the cybersecurity field. […]

Read More
Security

Stuxnet Saboteur Revealed.

This video is from Seytonic. Sources: https://www.volkskrant.nl/kijkverder/v/2024/sabotage-in-iran-een-missie-in-duisternis~v989743/ https://www.darkreading.com/cyberattacks-data-breaches/brief-history-of-ics-tailored-attacks https://www.darkreading.com/ics-ot-security/us-israel-dutch-spy-stuxnet-malware-against-iran https://nltimes.nl/2024/01/08/dutch-man-sabotaged-iranian-nuclear-program-without-dutch-governments-knowledge-report https://www.theregister.com/2024/01/05/breachforums_admin_arrested_again/ https://www.bleepingcomputer.com/news/security/breachforums-admin-jailed-again-for-using-a-vpn-unmonitored-pc/ https://therecord.media/breachforums-administrator-arrested-violating-parole https://www.bloomberg.com/news/articles/2024-01-09/china-says-cracked-apple-s-airdrop-to-identify-message-sources?embedded-checkout=true&leadSource=uverify%20wall https://sfj.beijing.gov.cn/sfj/sfdt/ywdt82/flfw93/436331732/index.html https://www.bleepingcomputer.com/news/security/china-claims-it-cracked-apples-airdrop-to-find-numbers-email-addresses/ https://cyberhoot.com/blog/apple-airdrop-vulnerability/ https://privatedrop.github.io/

Read More