Fireship | Dark web PHP Dev Ross Ulbricht Released From Prison
Ross Ulbricht received a presidential pardon for his crimes related to the Silk Road. Let's take a look at the tech stack behind the Silk Road website, which included LAMP stack, PHP, Linux, Tor, and Cryptocurrency.
HZiBxVkmIJ0techlinked-microsoft-patched-it-it-didnt-workTechLinked | Microsoft Patched It. It Didn’t Work...Trusting AI to code on something that's so important is probably the dumbest shit ever...
CqKZhYsjw6Ma-developer-lost-500000-of-crypto-while-coding-in-cursorA Developer Lost $500,000 of Crypto While Coding in CursorA blockchain developer lost $500,000 of cryptocurrency due to a malicious extension in the Cursor IDE.
QMMRelIafo4seytonic-how-123456-helped-hack-mcdonaldsSeytonic | How '123456' Helped Hack McDonald'sMeanwhile the McDonald's android app has pretty much all the Android security features to ensure it doesn't work on any non-Google-approved OS.
2bMYyzO8SnMmagnatesmedia-the-scariest-business-in-the-worldMagnatesMedia | The Scariest Business In The WorldLet's take a journey into the zero-day exploit market. This ultra secret underground market is where hackers in their basement make millions of dollars from terrorists, dictators and even your own government.
tiPgThES2rsseytonic-bruteforcing-any-google-accounts-phone-numberSeytonic | Bruteforcing any Google Account's Phone Number$5k bounty for that from a multi trillion dollar company is the most criminal thing I've seen in a long time...
d_oLziAyN_ocoffeezilla-i-got-this-celebrity-scammer-to-confessCoffeezilla | I Got This Celebrity Scammer to ConfessToday we're exposing a celebrity scammer. Caitlyn Jenner, Jason Derulo, Bobbi Althoff, Floyd Mayweather, Adin Ross, Iggy Azalea are just some of the names he's targeted. Now he wants to "confess" and explain how he did it.
hE55JVTCwuIlow-level-go-malware-can-wipe-your-driveLow Level | Go Malware Can Wipe Your Drive!Go is one of those languages that forces you to put a lot of trust in other people's code. How do we balance this trust with skepticism? Let's talk about it.
hFgdISy8hnIseytonic-trumps-signal-clone-app-was-hacked-in-15-minutesSeytonic | Trump's Signal Clone App was Hacked in 15 MinutesOutsourcing to Israel, how brilliant. Next time they should pick Russia or China, the result will be the same just cheaper...
6A5DmiD_4pMre-design-the-4chan-hack-explainedRe: Design | The 4Chan Hack ExplainedYou missed the big giant elephant in the room. 4chan's PDF preview function of postscript and ghostscript used some Go thingy that lead to hackers getting RCE, there they obviously esclated priv to dump everything...
bhTYbg4BkGEupper-echelon-the-downfall-of-4chan-a-catastrophic-hackUpper Echelon | The Downfall of 4Chan: A Catastrophic Hack4Chan (the notorious online message board) has been hacked, and currently taken offline. After a rival community gained deep access to the website files, and published the source code online... the site is now struggling to get back on its feet with a long road ahead of it when it foes.
0
Upper Echelon | The Downfall of 4Chan: A Catastrophic Hack
LjbNtw14TwIscientist-disappears-under-mysterious-circumstancesScientist Disappears Under Mysterious CircumstancesLet's take a look at the strange disappearance of cybersecurity expert and professor Xiaofeng Wang. In addition, we examine recent hacking cases where the attacker sabotaged their company from within.
ZDpo_o7dR8ckitboga-i-built-a-bot-army-that-scams-scammersKitboga | I Built a Bot Army that Scams ScammersFighting scammers with the world's first AI call center to disrupt scams!
0kAw_XJpCcEmental-outlaw-when-an-angry-employee-turns-hackerMental Outlaw | When an Angry Employee Turns HackerIn this video I discuss how a senior software developer who got demoted at his job hacked the systems he was in charge of and deployed deadman switch malware in the companies active directory system that locked people out once he was fired.
oWtR8vqbYX4matt-johansen-this-browser-hack-can-steal-everythingMatt Johansen | This Browser Hack Can Steal EverythingBreaking down this insane Polymorphic Browser Extension hack.
8UL6fEn7qgIdarknet-diaries-the-hacker-who-testified-before-congressDarknet Diaries | The Hacker Who Testified Before CongressJoe Grand - better known by his alias Kingpin - has been hacking everything he could touch since the '80s. Phone phreaking, intercepting pager messages, DOS, Windows, and more.
WLJGZlt5y2Emental-outlaw-tails-os-had-a-critical-security-bugMental Outlaw | Tails OS Had a Critical Security BugIn this video I discuss the Critical Security update that TailsOS had for a currently undisclosed bug that was able to escape the app armor sandbox and install persistent malware to an already compromised Tails system.
vX1b_X2rfakthe-most-immediate-threat-from-ai-spear-phishingThe Most Immediate Threat From AI | Spear PhishingAs the silicon valley driven "AI" development cycle continues at full speed, i wanted to discuss one of the more immediate impacts that can be seen emerging for everyday users, despite the factt hat they may choose to never use or interact with the software themselves.
WyQ7z8BMwwkfern-how-hackers-stole-1000000000-from-banksFern | How Hackers Stole $1,000,000,000 From BanksThis is the story of one of the biggest bank robberies in history, committed by hackers.
Er1nb-4xHdEhow-hackers-take-over-computers-with-reverse-shellsHow Hackers Take Over Computers With Reverse ShellsIn this video I give a demonstration of how reverse shell can be used to take over a Windows 11 machine.
H6U4AtPfY7schinese-hackers-infiltrated-us-telecom-networksChinese Hackers Infiltrated US Telecom NetworksIn this video I discuss the Salt Typhoon hacking campaign which has affected more than 8 US telecom networks and is allowing Chinese hackers to spy on Americans text messages and phone calls. US authorities recommend using encrypted messaging apps to protect yourself until the issue can be resolved
mYvZV2nInvgchinese-hackers-have-infiltrated-at-least-8-us-telecom-companiesChinese Hackers Have Infiltrated 8 U.S. Telecom CompaniesThe White House said that a broad Chinese hacking operation had infiltrated at least eight American telecommunications companies and that none of them have managed to remove the Chinese hackers from their systems. Nick Schifrin reports.
Lf883rNZjSEfireship-cheaters-are-breaking-the-technical-interview-howFireship | Cheaters are Breaking the Technical Interview... How?With the rise of remote work and AI, the tech world has also seen a rise in cheating on the software engineering technical interview. Let's look into modern techniques people use to cheat during coding interviews and the consequences of when you get caught.
xR5d4Ba4FZgfireship-top-g-andrew-tate-penetrated-by-lgbt-hackersFireship | Top G Andrew Tate Penetrated by LGBT HackersAndrew Tate's Hustler's University, aka The Real World, was recently attacked by an unknown group of hackers. Let's reverse engineer the tech stack and find out how the hack was performed.
2o_IZApln08newsthink-the-hacker-who-ruled-the-criminal-underworldNewsthink | The Hacker Who Ruled the Criminal UnderworldNewsthink is produced and presented by Cindy Pom
6GqYo2x-cNQcybernews-internet-archive-attacked-and-ubisoft-suedCyberNews | Internet Archive Attacked and Ubisoft SuedIn this video, we're bringing you the biggest cybersecurity news.
F7iLfuci75Yfern-how-a-hacker-saved-the-internet-2024Fern | How a Hacker Saved The Internet (2024)A group of hackers tried to gain access to millions of servers around the world - a master key to most of the internet. Last minute a software developer thwarted their plans.
yLRJUI5VYOgscammer-payback-scammer-freaks-out-after-epic-virus-hackScammer Payback | Scammer Freaks Out after Epic Virus Hack!Scammers typically target the elderly and attempt to steal money by several means.
LZkl0_9xFOUfern-the-kids-who-hacked-xbox-2024Fern | The Kids Who Hacked Xbox (2024)A group of teenagers hacked the world’s biggest game developers over the course of several years. This is their story.
HNURbRwj-X4sued-by-the-government-for-using-tor-to-expose-themSued by the Government for Using Tor to Expose ThemPoliticians and journalists not understanding computers and the internet for the billionth time.