x2Dgg_UjTzknationsquid-the-disastrous-fall-of-aolNationSquid | The Disastrous Fall of AOLIn the mid-1990s, a new company, in a whole new medium of communicating known as the internet, was rapidly rising and on its way to becoming the most powerful entity in the world: America Online.
miTpJmMt7uofireship-the-dating-app-that-doxxed-72000-womenFireship | The Dating App That Doxxed 72,000 Women...In today's video, we'll find out how the tea app was compromised and look at all the hilarious stuff developers have been building with the hacked data.
bVes3ZbWTf8mental-outlaw-the-mcdonalds-ai-security-breachMental Outlaw | The McDonald's AI Security BreachIn this video I discuss how mchire.com (The online job application service for McDonald's, powered by Paradox AI) was hacked through an insecure testing account that allowed security researchers to access the personal data of more than 64 million McDonald's job applicants.
PXTsuda6cvIthiojoe-microsofts-secret-antivirus-toolsThioJoe | Microsoft's Secret Antivirus ToolsThe Safety Scanner has to be downloaded, and the Malicious Removal Tool also, though you can also search for the MRT executable on a system which has been Internet connected and Windows Update has ran at least once on.
Rpl3-8F6RPUmental-outlaw-linux-malware-coming-to-a-desktop-near-youMental Outlaw | Linux Malware, Coming to a Desktop Near YouIn this video I discuss how the rising popularity of Linux may lead to more malware campaigns in open source repositories (like the one that took place last week in the AUR) and how the community can protect itself from these kinds of attacks.
I1rzcZWTIjofern-how-a-teenager-hacked-the-pentagonFern | How a Teenager Hacked the PentagonThis is the tragic story of Jonathan James - a legendary teenage hacker, who broke into NASA and the Pentagon.
HZiBxVkmIJ0techlinked-microsoft-patched-it-it-didnt-workTechLinked | Microsoft Patched It. It Didn’t Work...Trusting AI to code on something that's so important is probably the dumbest shit ever...
CqKZhYsjw6Ma-developer-lost-500000-of-crypto-while-coding-in-cursorA Developer Lost $500,000 of Crypto While Coding in CursorA blockchain developer lost $500,000 of cryptocurrency due to a malicious extension in the Cursor IDE.
QMMRelIafo4seytonic-how-123456-helped-hack-mcdonaldsSeytonic | How '123456' Helped Hack McDonald'sMeanwhile the McDonald's android app has pretty much all the Android security features to ensure it doesn't work on any non-Google-approved OS.
2bMYyzO8SnMmagnatesmedia-the-scariest-business-in-the-worldMagnatesMedia | The Scariest Business In The WorldLet's take a journey into the zero-day exploit market. This ultra secret underground market is where hackers in their basement make millions of dollars from terrorists, dictators and even your own government.
tiPgThES2rsseytonic-bruteforcing-any-google-accounts-phone-numberSeytonic | Bruteforcing any Google Account's Phone Number$5k bounty for that from a multi trillion dollar company is the most criminal thing I've seen in a long time...
d_oLziAyN_ocoffeezilla-i-got-this-celebrity-scammer-to-confessCoffeezilla | I Got This Celebrity Scammer to ConfessToday we're exposing a celebrity scammer. Caitlyn Jenner, Jason Derulo, Bobbi Althoff, Floyd Mayweather, Adin Ross, Iggy Azalea are just some of the names he's targeted. Now he wants to "confess" and explain how he did it.
hE55JVTCwuIlow-level-go-malware-can-wipe-your-driveLow Level | Go Malware Can Wipe Your Drive!Go is one of those languages that forces you to put a lot of trust in other people's code. How do we balance this trust with skepticism? Let's talk about it.
hFgdISy8hnIseytonic-trumps-signal-clone-app-was-hacked-in-15-minutesSeytonic | Trump's Signal Clone App was Hacked in 15 MinutesOutsourcing to Israel, how brilliant. Next time they should pick Russia or China, the result will be the same just cheaper...
6A5DmiD_4pMre-design-the-4chan-hack-explainedRe: Design | The 4Chan Hack ExplainedYou missed the big giant elephant in the room. 4chan's PDF preview function of postscript and ghostscript used some Go thingy that lead to hackers getting RCE, there they obviously esclated priv to dump everything...
bhTYbg4BkGEupper-echelon-the-downfall-of-4chan-a-catastrophic-hackUpper Echelon | The Downfall of 4Chan: A Catastrophic Hack4Chan (the notorious online message board) has been hacked, and currently taken offline. After a rival community gained deep access to the website files, and published the source code online... the site is now struggling to get back on its feet with a long road ahead of it when it foes.
0
Upper Echelon | The Downfall of 4Chan: A Catastrophic Hack
LjbNtw14TwIscientist-disappears-under-mysterious-circumstancesScientist Disappears Under Mysterious CircumstancesLet's take a look at the strange disappearance of cybersecurity expert and professor Xiaofeng Wang. In addition, we examine recent hacking cases where the attacker sabotaged their company from within.
812YkCrmksknostalgia-nerd-before-googleNostalgia Nerd | Before GoogleGoogle, Google, Google. It's the place MOST of us go to when we need to search the web, these days.
ZDpo_o7dR8ckitboga-i-built-a-bot-army-that-scams-scammersKitboga | I Built a Bot Army that Scams ScammersFighting scammers with the world's first AI call center to disrupt scams!
0kAw_XJpCcEmental-outlaw-when-an-angry-employee-turns-hackerMental Outlaw | When an Angry Employee Turns HackerIn this video I discuss how a senior software developer who got demoted at his job hacked the systems he was in charge of and deployed deadman switch malware in the companies active directory system that locked people out once he was fired.
oWtR8vqbYX4matt-johansen-this-browser-hack-can-steal-everythingMatt Johansen | This Browser Hack Can Steal EverythingBreaking down this insane Polymorphic Browser Extension hack.
8UL6fEn7qgIdarknet-diaries-the-hacker-who-testified-before-congressDarknet Diaries | The Hacker Who Testified Before CongressJoe Grand - better known by his alias Kingpin - has been hacking everything he could touch since the '80s. Phone phreaking, intercepting pager messages, DOS, Windows, and more.
gi-wuoIDdjwfireship-dark-web-php-dev-ross-ulbricht-released-from-prisonFireship | Dark web PHP Dev Ross Ulbricht Released From PrisonRoss Ulbricht received a presidential pardon for his crimes related to the Silk Road. Let's take a look at the tech stack behind the Silk Road website, which included LAMP stack, PHP, Linux, Tor, and Cryptocurrency.
WLJGZlt5y2Emental-outlaw-tails-os-had-a-critical-security-bugMental Outlaw | Tails OS Had a Critical Security BugIn this video I discuss the Critical Security update that TailsOS had for a currently undisclosed bug that was able to escape the app armor sandbox and install persistent malware to an already compromised Tails system.
vX1b_X2rfakthe-most-immediate-threat-from-ai-spear-phishingThe Most Immediate Threat From AI | Spear PhishingAs the silicon valley driven "AI" development cycle continues at full speed, i wanted to discuss one of the more immediate impacts that can be seen emerging for everyday users, despite the factt hat they may choose to never use or interact with the software themselves.
WyQ7z8BMwwkfern-how-hackers-stole-1000000000-from-banksFern | How Hackers Stole $1,000,000,000 From BanksThis is the story of one of the biggest bank robberies in history, committed by hackers.
Er1nb-4xHdEhow-hackers-take-over-computers-with-reverse-shellsHow Hackers Take Over Computers With Reverse ShellsIn this video I give a demonstration of how reverse shell can be used to take over a Windows 11 machine.
iGdRnuuwtoQodd-owl-every-level-of-internet-explained-in-11-minutesOdd Owl | Every Level Of Internet Explained in 11 MinutesExplore the internet’s layers, from Level 0’s nostalgic Ancient Web to the shadowy depths of Level 4’s Dark Web. Uncover secrets of hidden servers, quantum computing breakthroughs, and the eerie future of AI-driven digital realms - it’s cyberspace like you’ve never imagined!
H6U4AtPfY7schinese-hackers-infiltrated-us-telecom-networksChinese Hackers Infiltrated US Telecom NetworksIn this video I discuss the Salt Typhoon hacking campaign which has affected more than 8 US telecom networks and is allowing Chinese hackers to spy on Americans text messages and phone calls. US authorities recommend using encrypted messaging apps to protect yourself until the issue can be resolved
mYvZV2nInvgchinese-hackers-have-infiltrated-at-least-8-us-telecom-companiesChinese Hackers Have Infiltrated 8 U.S. Telecom CompaniesThe White House said that a broad Chinese hacking operation had infiltrated at least eight American telecommunications companies and that none of them have managed to remove the Chinese hackers from their systems. Nick Schifrin reports.