hacking

Security

Uncovering the Latest Cyber Attack Trends: A Global Identity Crisis

Looking for a way to foresee future attacks and protect your data and your organization from cyber threats? In this video, cybersecurity expert Jeff Crume explains the steps you can take to gain that protection and understand where new threats will be coming from in the future.

Read More
Privacy

The Great Privacy Awakening

This video is from Jack Rhysider. This is not a drill, but a dire call to action. Your privacy is worth rebelling over. Corporations and governments are greedily stripping away our digital privacy. It’s not just about data; it’s about power, control, and our fundamental rights. It’s time to say ‘No More’ to data breaches, […]

Read More
Cryptocurrency Security

These Teen Crypto Swappers Can Make $100,000 in 10 Mins

This video is from Jack Rhysider. A guy named “Drew” (not his real name) gives us a rare glimpse inside the complicated sim-swapping cypto heists engineered by the teenagers of the dark web. If there’s money to be stolen, these kids can sniff out any personal information to make the grab. Visit https://darknetdiaries.com/episode/112/ for a […]

Read More
Privacy

Is the NSA is BUYING Your Internet History?!

This video is from Seytonic. Sources: https://www.documentcloud.org/documents/24376615-signed_wyden_letter_to_dni_re_nsa_purchase_of_domestic_metadata_and_ftc_order_on_data_brokers_with_attachments https://twitter.com/RonWyden/status/1750645396639199470 https://therecord.media/nsa-purchases-american-personal-data-from-brokers-wyden https://www.wired.com/story/pentagon-data-purchases-wyden-letter/ https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard/ https://www.sec.gov/Archives/edgar/data/789019/000119312524011295/d708866d8k.htm https://gur.gov.ua/content/znyshchyly-vorozhu-planietu-detali-kiberataky-proty-tsentru-kosmichnoi-hidrometeorolohii-rf.html https://therecord.media/ukrainian-hackers-hit-russian-scientific-center

Read More
Security

Stuxnet Saboteur Revealed.

This video is from Seytonic. Sources: https://www.volkskrant.nl/kijkverder/v/2024/sabotage-in-iran-een-missie-in-duisternis~v989743/ https://www.darkreading.com/cyberattacks-data-breaches/brief-history-of-ics-tailored-attacks https://www.darkreading.com/ics-ot-security/us-israel-dutch-spy-stuxnet-malware-against-iran https://nltimes.nl/2024/01/08/dutch-man-sabotaged-iranian-nuclear-program-without-dutch-governments-knowledge-report https://www.theregister.com/2024/01/05/breachforums_admin_arrested_again/ https://www.bleepingcomputer.com/news/security/breachforums-admin-jailed-again-for-using-a-vpn-unmonitored-pc/ https://therecord.media/breachforums-administrator-arrested-violating-parole https://www.bloomberg.com/news/articles/2024-01-09/china-says-cracked-apple-s-airdrop-to-identify-message-sources?embedded-checkout=true&leadSource=uverify%20wall https://sfj.beijing.gov.cn/sfj/sfdt/ywdt82/flfw93/436331732/index.html https://www.bleepingcomputer.com/news/security/china-claims-it-cracked-apples-airdrop-to-find-numbers-email-addresses/ https://cyberhoot.com/blog/apple-airdrop-vulnerability/ https://privatedrop.github.io/

Read More
Linux Raspberry Pi

How to Run Linux on an ESP32

This video is from element14 presents. Can you run Linux on an ESP32? Until recently, you could just answer “no!” But, in fact, you can run Linux on a specific variant of the ESP32-S3 MCU! Based on this, Clem saw an opportunity to build his own Linux-powered SBC in the form factor of the Raspberry […]

Read More