uk1AjAwZuvUseytonic-mcdonalds-app-bug-unlimited-free-foodSeytonic | McDonald’s App Bug | Unlimited Free FoodBob could have free food but instead he got a friend fired from his job.
pnrjTjuX9Hkblackfiles-the-hacker-who-took-down-north-koreaBlackfiles | The Hacker Who Took Down North KoreaIn 2022, North Korea’s entire internet mysteriously went offline, government sites, email servers, all gone. Intelligence experts suspected a state-sponsored cyberattack.
miTpJmMt7uofireship-the-dating-app-that-doxxed-72000-womenFireship | The Dating App That Doxxed 72,000 Women...In today's video, we'll find out how the tea app was compromised and look at all the hilarious stuff developers have been building with the hacked data.
bVes3ZbWTf8mental-outlaw-the-mcdonalds-ai-security-breachMental Outlaw | The McDonald's AI Security BreachIn this video I discuss how mchire.com (The online job application service for McDonald's, powered by Paradox AI) was hacked through an insecure testing account that allowed security researchers to access the personal data of more than 64 million McDonald's job applicants.
PXTsuda6cvIthiojoe-microsofts-secret-antivirus-toolsThioJoe | Microsoft's Secret Antivirus ToolsThe Safety Scanner has to be downloaded, and the Malicious Removal Tool also, though you can also search for the MRT executable on a system which has been Internet connected and Windows Update has ran at least once on.
Rpl3-8F6RPUmental-outlaw-linux-malware-coming-to-a-desktop-near-youMental Outlaw | Linux Malware, Coming to a Desktop Near YouIn this video I discuss how the rising popularity of Linux may lead to more malware campaigns in open source repositories (like the one that took place last week in the AUR) and how the community can protect itself from these kinds of attacks.
I1rzcZWTIjofern-how-a-teenager-hacked-the-pentagonFern | How a Teenager Hacked the PentagonThis is the tragic story of Jonathan James - a legendary teenage hacker, who broke into NASA and the Pentagon.
HZiBxVkmIJ0techlinked-microsoft-patched-it-it-didnt-workTechLinked | Microsoft Patched It. It Didn’t Work...Trusting AI to code on something that's so important is probably the dumbest shit ever...
CqKZhYsjw6Ma-developer-lost-500000-of-crypto-while-coding-in-cursorA Developer Lost $500,000 of Crypto While Coding in CursorA blockchain developer lost $500,000 of cryptocurrency due to a malicious extension in the Cursor IDE.
QMMRelIafo4seytonic-how-123456-helped-hack-mcdonaldsSeytonic | How '123456' Helped Hack McDonald'sMeanwhile the McDonald's android app has pretty much all the Android security features to ensure it doesn't work on any non-Google-approved OS.
2bMYyzO8SnMmagnatesmedia-the-scariest-business-in-the-worldMagnatesMedia | The Scariest Business In The WorldLet's take a journey into the zero-day exploit market. This ultra secret underground market is where hackers in their basement make millions of dollars from terrorists, dictators and even your own government.
tiPgThES2rsseytonic-bruteforcing-any-google-accounts-phone-numberSeytonic | Bruteforcing any Google Account's Phone Number$5k bounty for that from a multi trillion dollar company is the most criminal thing I've seen in a long time...
d_oLziAyN_ocoffeezilla-i-got-this-celebrity-scammer-to-confessCoffeezilla | I Got This Celebrity Scammer to ConfessToday we're exposing a celebrity scammer. Caitlyn Jenner, Jason Derulo, Bobbi Althoff, Floyd Mayweather, Adin Ross, Iggy Azalea are just some of the names he's targeted. Now he wants to "confess" and explain how he did it.
hE55JVTCwuIlow-level-go-malware-can-wipe-your-driveLow Level | Go Malware Can Wipe Your Drive!Go is one of those languages that forces you to put a lot of trust in other people's code. How do we balance this trust with skepticism? Let's talk about it.
hFgdISy8hnIseytonic-trumps-signal-clone-app-was-hacked-in-15-minutesSeytonic | Trump's Signal Clone App was Hacked in 15 MinutesOutsourcing to Israel, how brilliant. Next time they should pick Russia or China, the result will be the same just cheaper...
6A5DmiD_4pMre-design-the-4chan-hack-explainedRe: Design | The 4Chan Hack ExplainedYou missed the big giant elephant in the room. 4chan's PDF preview function of postscript and ghostscript used some Go thingy that lead to hackers getting RCE, there they obviously esclated priv to dump everything...
bhTYbg4BkGEupper-echelon-the-downfall-of-4chan-a-catastrophic-hackUpper Echelon | The Downfall of 4Chan: A Catastrophic Hack4Chan (the notorious online message board) has been hacked, and currently taken offline. After a rival community gained deep access to the website files, and published the source code online... the site is now struggling to get back on its feet with a long road ahead of it when it foes.
0
Upper Echelon | The Downfall of 4Chan: A Catastrophic Hack
LjbNtw14TwIscientist-disappears-under-mysterious-circumstancesScientist Disappears Under Mysterious CircumstancesLet's take a look at the strange disappearance of cybersecurity expert and professor Xiaofeng Wang. In addition, we examine recent hacking cases where the attacker sabotaged their company from within.
ZDpo_o7dR8ckitboga-i-built-a-bot-army-that-scams-scammersKitboga | I Built a Bot Army that Scams ScammersFighting scammers with the world's first AI call center to disrupt scams!
0kAw_XJpCcEmental-outlaw-when-an-angry-employee-turns-hackerMental Outlaw | When an Angry Employee Turns HackerIn this video I discuss how a senior software developer who got demoted at his job hacked the systems he was in charge of and deployed deadman switch malware in the companies active directory system that locked people out once he was fired.
oWtR8vqbYX4matt-johansen-this-browser-hack-can-steal-everythingMatt Johansen | This Browser Hack Can Steal EverythingBreaking down this insane Polymorphic Browser Extension hack.
8UL6fEn7qgIdarknet-diaries-the-hacker-who-testified-before-congressDarknet Diaries | The Hacker Who Testified Before CongressJoe Grand - better known by his alias Kingpin - has been hacking everything he could touch since the '80s. Phone phreaking, intercepting pager messages, DOS, Windows, and more.
gi-wuoIDdjwfireship-dark-web-php-dev-ross-ulbricht-released-from-prisonFireship | Dark web PHP Dev Ross Ulbricht Released From PrisonRoss Ulbricht received a presidential pardon for his crimes related to the Silk Road. Let's take a look at the tech stack behind the Silk Road website, which included LAMP stack, PHP, Linux, Tor, and Cryptocurrency.
fGQhdzc571wshortary-the-shadow-brokers-the-greatest-hack-in-historyShortary | The Shadow Brokers: The Greatest Hack in HistoryThis is the story of how a mysterious hacking group known as “The Shadow Brokers” brought the NSA to its knees & how they carried out one of the most successful hacking operations in history.
WLJGZlt5y2Emental-outlaw-tails-os-had-a-critical-security-bugMental Outlaw | Tails OS Had a Critical Security BugIn this video I discuss the Critical Security update that TailsOS had for a currently undisclosed bug that was able to escape the app armor sandbox and install persistent malware to an already compromised Tails system.
vX1b_X2rfakthe-most-immediate-threat-from-ai-spear-phishingThe Most Immediate Threat From AI | Spear PhishingAs the silicon valley driven "AI" development cycle continues at full speed, i wanted to discuss one of the more immediate impacts that can be seen emerging for everyday users, despite the factt hat they may choose to never use or interact with the software themselves.
WyQ7z8BMwwkfern-how-hackers-stole-1000000000-from-banksFern | How Hackers Stole $1,000,000,000 From BanksThis is the story of one of the biggest bank robberies in history, committed by hackers.
Er1nb-4xHdEhow-hackers-take-over-computers-with-reverse-shellsHow Hackers Take Over Computers With Reverse ShellsIn this video I give a demonstration of how reverse shell can be used to take over a Windows 11 machine.
H6U4AtPfY7schinese-hackers-infiltrated-us-telecom-networksChinese Hackers Infiltrated US Telecom NetworksIn this video I discuss the Salt Typhoon hacking campaign which has affected more than 8 US telecom networks and is allowing Chinese hackers to spy on Americans text messages and phone calls. US authorities recommend using encrypted messaging apps to protect yourself until the issue can be resolved
mYvZV2nInvgchinese-hackers-have-infiltrated-at-least-8-us-telecom-companiesChinese Hackers Have Infiltrated 8 U.S. Telecom CompaniesThe White House said that a broad Chinese hacking operation had infiltrated at least eight American telecommunications companies and that none of them have managed to remove the Chinese hackers from their systems. Nick Schifrin reports.