Security

Security

Expert Hacker Answers Penetration Test Questions | Tech Support | WIRED

Hacker and expert security consultant Jayson E. Street joins WIRED to answer your penetration test questions from Twitter. What does penetration testing entail? What are some of the most underrated physical tools used for pen tests? How can I tell if my home wifi network is compromised? This video is from WIRED.

Read More
Networking Security

Free NMAP Network Scanner Tutorial

This video is from Revolution InfoSec. A full length tutorial which you can use to comprehensively learn how to use NMAP, the open source network scanner. You’ll learn first the fundamentals of the networking you need to know in order for network scanning to make sense.

Read More
Security

How to Learn Open-Source Intelligence (OSINT) in 5 Hours – Full Course – Learn OSINT!

This video is from The Cyber Mentor.

Read More
Career Python Security

Fundamentals of Python for Cybersecurity | Google Cybersecurity Certificate

In this course from Google Career Certificates, you will be introduced to the Python programming language and apply it in a cybersecurity setting to automate tasks. You’ll start by focusing on foundational Python programming concepts, including data types, variables, conditional statements, and iterative statements. You’ll also learn to work with Python effectively by developing functions, […]

Read More
Security

Your Social Accounts Are Never Safe, Even If You Use Great Passwords🎙Ep. 86 The LinkedIn Incident

This video is from Jack Rhysider. In 2012, LinkedIn was the target of a massive data breach. A hacker got in and stole millions of user details. But this wasn’t because of weak user passwords or bad security practices. It all came down to one LinkedIn engineer’s crucial mistake. Visit https://darknetdiaries.com/episode/86 for a list of […]

Read More
Privacy Security

How Do Law Enforcement Agencies Break into iPhones

How do police extract data from seized smartphones when everything seems to be encrypted? Digital forensics companies like Cellebrite or Grayshift provide special unlocking devices which are able to get around many of iOS’ and Android’s security measures.

Read More
AI Large Language Models Security

Universal and Transferable Adversarial Attacks on Aligned Language Models Explained

This video from Gabriel Mongaras talks about attacks against LLMs. With the popularity of LLMs and the rush to implement them, security concerns are often thought of last, if at all. If history is any guide, then this will not end well. Paper found here: https://arxiv.org/abs/2307.15043 Demo here: https://llm-attacks.org/

Read More
Security

What is Continuous Automated Red Teaming (CART)?

While red teaming evaluates an organization’s security stance at a specific time, it can prove costly and time-consuming. Enter Continuous Automated Red Teaming (CART), a game-changing approach that revolutionizes red teaming in cybersecurity. In this video, Sam Hector explains how by operating seamlessly round-the-clock, CART tackles these challenges head-on, delivering dynamic and cost-effective security assessments […]

Read More
Career Security

How to pick the right Cyber Security Training?

This video is from CyberHAC. Cyber … My entire facebook feed is an endless scrolling of ads for Cyber security training, Universities, Certifications, Master Classes, How to spend thousands of dollars on something you can do at home for a couple of hundred study material. 😀

Read More