Videos

Ukraine vs. Russia: Cyberwarfare Goes Mainstream – ThreatWire

Attackers leak alleged Nvidia data, Samsung patches a major encryption flaw, and Ukraine vs Russia: everything we know so far in the cybersecurity battle! All

Videos

HUGE Crypto Theft Happens Again; UEFI Has Vulnerabilities – ThreatWire

Cisco Finds Critical Vulnerabilities in their small business routers, even more vulns for found in UEFI firmware shared by multiple vendors, and another huge crypto

Videos

Best Gifts for Cyber Security AND Hackers (BUY RIGHT NOW!)

Want to know the best gifts for cyber security and hackers? Join this channel to get access to perks: Make sure to subscribe so you

Videos

How Hackers Exploit Log4J to Get a Reverse Shell (Ghidra Log4Shell Demo) | HakByte

On this episode of HakByte, Alex Lynd demonstrates a Log4Shell attack against Ghidra, and shows how a reverse shell can be established on compromised systems