
Can a Car’s License Plates Be Hacked?
Basically, yes. Watch this great video from Seytonic.
Read More
Spying with Google Home
This video is from Seytonic covers the latest in security news: including on spying can be done with Google Home.
Read More
What Makes Israel So Good at Hacking?
- Frank
- November 21, 2022
- 8200
- apt
- army cyber
- ccna
- ceh
- cyber security
- cyber unit
- Cybersecurity
- cyberspacial
- cyberspatial
- duqu
- gauss
- government hacking
- hacking
- havatzalot
- infosec
- israel cyber
- israel hacking
- israeli cyber
- israeli hacking
- military cyber
- military hacker
- nation state hacker
- olympic games
- OSCP
- stuxnet
- talpiot
- unit 81
- unit 8200
- zero day
Ever wonder what makes Israel so good at hacking? How does a small country like Israel consistently produce some of the world’s best hackers and cybersecurity practitioners? What does it take to make it to elite military cyber units like Unit 8200 and Unit 81? The secret is people, not technology.
Read More
Google Pixel Lockscreen Bypass – ThreatWire
A UEFI Flaw in Lenovo gets fixed, Google Pixels Suffer a Lockscreen Bypass, and Billions In Bitcoin Get Seized by the US Government! All that coming up now on ThreatWire.
Read More
How to Stop Hackers With This!
Seytonic shows you how to defend yourself. Outline/Timestamps: 0:00 Intro 0:16 Stop Hackers With This 3:36 Clipboard Hijacking Malware Evolves 6:55 Silkroad Hacker Identified 9:28 Linode 10:07 Outro
Read More
KeePass Spoofed by RomCom RAT – ThreatWire
#threatwire #hak5 ThreatWire by Shannon Morse is a weekly news journalism show covering cybersecurity topics for network admins, information security professionals, and consumers.
Read More
How to Turn Packet Captures Into Network Maps Instantly With Teleseer (Demo Tutorial)
- Frank
- November 7, 2022
- building a cyber startup
- cyber security
- cyber security business
- cyber security company
- cyber security founder
- cyber security startup
- cyber startup
- Cybersecurity
- cybersecurity training for beginners
- cyberspacial
- cyberspatial
- founding a cyber startup
- hacking
- infosec
- kali linux
- network mapping
- penetration testing
- pentesting
- ricky tan
- Silicon Valley
- starting a cyber security business
- Startup
- tech startup
- teleseer
- what is cyber security
- ycombinator
Cyber defenders spend hundreds of hours each year trying to see their network and security data together. Network mapping is manual and tedious. You have to read through gigabytes of command-line output, logs, and scan results just to stitch everything together on a whiteboard. There aren’t any good tools out there to grok your network […]
Read More
WiFi Coconut: Setup & Recon w/ Wireshark
On this episode, Alex Lynd walks through setting up the WiFi Coconut for gathering reconnaissance on the entire 2.4GHz band, and demonstrates how to analyze a packet capture through Wireshark.
Read More

RTX4090 is a Password Cracking BEAST
Looks like GPUs are useful for more than just AI training and gaming. Check out this latest round up of cyber security news from Hak5.
Read More