🎯 Fortinet, Palo Alto Networks, and Cisco - Critical Cybersecurity Flaws and Urgent Patches 🚨
https://youtu.be/pPJPTo2v-iA
🔒 Hey everyone! In this episode, we're tackling some alarming cybersecurity news 🚨 impacting major names like Fortinet, Palo Alto Networks, and Cisco.
🚨 Massive Microsoft Security Patch! 118 Vulnerabilities Fixed – Are You Safe? 🔐
youtu.be/w3O_zQST6gM
Microsoft just released a HUGE security update patching 118 vulnerabilities! 😱 In this episode, we break down what you need to know, including two active zero-day exploits.
⚡Unmasking HTML smuggling
https://youtu.be/2MJQpTe9Ddo
🎙️ Welcome to Exploit Pulse, the go-to podcast for cybersecurity enthusiasts, IT pros, and anyone curious about the dark side of the digital world.
Each episode, we dive deep into the latest cyber threats, unravel advanced attack techniques, and decode real-world hacking campaigns.
From phishing schemes like HTML smuggling 🕵️♂️ to sophisticated malware attacks, we break down how these tactics work—and more importantly, how you can protect yourself.
🔐 Stay one step ahead in the cat-and-mouse game of cybersecurity. Subscribe to get insider knowledge, actionable tips, and the pulse of the ever-evolving digital battlefield.
💡 Whether you're a seasoned hacker or just starting out, there's something for everyone. New episodes drop every week—stay informed, stay secure!
🚀 Support the channel and get exclusive content by joining my Patreon: https://patreon.com/StoykoStoykov
#cybersecurity #ExploitPulse #PhishingThreats #HTMLSmuggling #hackingtechniques #digitalsecurity #cyberthreats #infosec #malware #cyberawareness #staysecure #techpodcasts #cybernews #digitaldefense #DataProtection
🔐 AI Hacking Unveiled: The Real Threat Behind the Hype 🤖
https://youtu.be/H-KH5_r1GSo
In this episode, we’re cutting through the Hollywood-style hype about AI and cybersecurity and diving into the real world of AI-powered hacking. Forget killer robots – the true power of AI lies in its subtlety and effectiveness. Joining us is cybersecurity legend Omar Santos, who has authored 27 books and brings us mind-blowing insights into how AI is reshaping offensive security. From automated reconnaissance to AI-crafted exploits, this episode reveals how AI is already weaponized and the massive risks it poses to our digital landscape. 😱
We explore how AI is vectorizing information, conducting reconnaissance on autopilot, and even making it easier for attackers without a technical background to exploit vulnerabilities. The rise of AI isn't just affecting attacks—it's changing the way we build secure systems from the ground up. As Omar puts it, AI has become both our greatest weapon and our biggest challenge in cybersecurity. 💻⚔️
Tune in to learn how we can flip the script—using AI for proactive defense, threat intelligence, and even anticipating attacks before they happen. Are we ready for this paradigm shift? Or are we already too late? 🔍
🔔 If you find this content interesting, don’t forget to like, subscribe, and hit the notification bell to stay updated on the latest cybersecurity insights!
🚀 Support the channel and get exclusive content by joining my Patreon: https://patreon.com/StoykoStoykov
#Cybersecurity #AIHacking #AIThreats #TechFuture
The RAMBO Attack: When Your RAM Turns into a Spy 🎧
https://youtu.be/_NcvR8FLfF0
Ever thought your computer's RAM could be used as a listening device? 🤯
In this episode, we explore the wild world of the RAMBO attack, a vulnerability targeting even the most secure, air-gapped systems.
Inspired by a jaw-dropping video from our favorite tech channel, we dive into the genius behind Dr. Mordechai Guri’s research and how electromagnetic ripples from your RAM could be stealing sensitive data.
From bypassing CPU caches to intercepting cryptographic keys, this deep dive will leave you rethinking your digital security.
Stay tuned for mind-blowing insights and defenses against this cutting-edge threat! 🔐
💥 Zero Click Threat Unveiling the CVE 2024 2017 Wi Fi Vulnerability
https://youtu.be/6kx1RX1LxLk
In this episode, we unravel the chilling reality of the zero-click CVE-2024-2017 vulnerability targeting MediaTek Wi-Fi chips.
Join us as we break down how this buffer overflow exploit could silently compromise your devices—without a single click.
From routers to smart appliances, no gadget is safe. Learn how hackers manipulate network services like wappd, turning your tech against you, and what you can do to protect your digital world.
We’ll dive into real-world examples, discuss the ripple effects, and explore the evolving challenge of cybersecurity in an ever-more-connected world.
🐟 Phishing Attempt via GitHub Email Notifications: How to Stay Protected 🛡️
https://youtu.be/AyECztPbubU
In this episode, we dive into a real-world case of a phishing attack that exploited GitHub's email notification system.
We'll explore how a malicious user sent a deceptive email from GitHub’s legitimate address, tricking recipients into visiting a phishing site to gain unauthorized access to their repositories.
The episode covers key elements of the attack, how it was detected, and steps taken to report the issue to GitHub.
Additionally, we’ll share tips on how to safeguard your account from similar threats 🚨 and how the community can stay vigilant against these evolving tactics.
🎙️ AI & Cybersecurity: Revolutionizing Safety 🚨
https://youtu.be/rnufcGAcJXU
In this episode, we dive deep into the world of AI and how it’s transforming cybersecurity.
From spotting threats at lightning speed to adaptive defenses against cyberattacks, AI is reshaping the digital landscape.
But with this power comes challenges—privacy concerns, ethical usage, and the race to stay ahead of cybercriminals.
We explore how AI is more than just a tool; it’s proactive, continuously learning, and evolving to keep us safe online.
Join us as we unpack the double-edged sword of AI in security, discuss the future of passwords, and ask the big questions about privacy, trust, and responsibility.
Tune in for an engaging discussion on the tech that’s safeguarding our digital lives—and how we can ensure it’s used for good. 💡
Stay curious, stay safe!
⚠️ Critical Vulnerability in Ivanti CSA: CVE-2024-8963 Explained 🔓
https://youtu.be/x4DNB_eN8h4
This episode covers the critical CVE-2024-8963 vulnerability found in Ivanti Cloud Service Appliance (CSA) that has been actively exploited in recent cyberattacks. With a CVSS score of 9.4, this vulnerability allows unauthorized attackers to execute arbitrary commands on the affected appliance. We’ll discuss how the issue was "accidentally resolved" in recent patches, the risks posed to affected users, and the warning issued by Ivanti and the U.S. Cybersecurity and Infrastructure Security Agency (CISA). Tune in to learn more about the urgency of updating to CSA version 5.0 and how organizations can mitigate the threat before the October 2024 deadline.
В това видео ще ви покажа как се прави Command Injection и Crossite Scription. Също така ще видим и как се анализира входящ и изходящ трафик
Ще преминем през две задачи за намиране на различни флагове.
Първа задача: - Command Injection и Reflected Crossite Scription
Втора задача: - Анализиране на входящ и изходящ трафик
https://youtu.be/ASln2vHvC_8
#pentesting #capturetheflag #ethicalhacking #networksecurity #hacker
В това видео ще ви покажа как да използвате Burpsuit Intruder, Hydra, Hashcat и Hashid за хакване на акаунти и осъществяване на достъп до отдалечени системи.
Ще разгледаме как да използвате тези мощни приложения в практически ситуации.
https://youtu.be/5nac-ZQULeQ
#pentesting #capturetheflag #ethicalhacking #networksecurity #burpsuit #hashcat #hydra #hacking
В това видео ще ви покажа как да използвате Arpspoof, Wireshark и Proxychains за мрежово снифиране и хакване.
Ще разгледаме как да използвате тези мощни приложения в практически ситуации.
https://youtu.be/RABWH6t1iDs
#pentesting #arpspoof #proxychains #wireshark #ethicalhacking
В това видео ще ви покажа как стъпка по стъпка как да решите предизвикателството Capture the Flag (CTF) в In N Out.
Ще се потопим в света на проникващите тестове и сигурността на мрежите и ще ви покажа необходимите стъпки и техники, за да успеете в този CTF.
https://youtu.be/kHe2OHOai2s
#cybersecurity #hacking #pentesting #capturetheflag #ethicalhacking #networksecurity
В това видео ще ви покажа как стъпка по стъпка как да решите предизвикателството Capture the Flag (CTF) в The Defense Rest.
Ще ви покажа необходимите стъпки и техники, за да успеете в този #CTF
https://youtu.be/RtNxTK2oCCk
#cybersecurity #hacking #pentesting #capturetheflag #ethicalhacking
В това видео ще ви покажа как стъпка по стъпка да откриете флага в Spray Paint .
Ще ви покажа необходимите стъпки и техники, за да успеете в този #CTF
https://youtu.be/iDS7D0XLv8Q
Моля, харесайте и се абонирайте ако ви харесва.
#cybersecuritytraining #hacking #cybersecuritytips #ethicalhacking #networksecurity
В това видео ще ви покажа как стъпка по стъпка да откриете флага в Scratch and Sniff
Ще ви покажа необходимите стъпки и техники, за да успеете в този #CTF #cybersecurity #hacking
https://youtu.be/u8odQh0Loqk
Моля, харесайте и се абонирайте ако ви хареса.
В това видео ще ви покажа как стъпка по стъпка как да откриете флага в Crackception.
Ще ви покажа необходимите стъпки и техники, за да успеете в този #CTF #cybersecurity #hacking
https://youtu.be/6yLaLkSR8VA
Моля, харесайте и се абонирайте ако ви хареса.
В това видео ще ви покажа как стъпка по стъпка как да откриете флага в Penguin Land.
Ще ви покажа необходимите стъпки и техники, за да успеете в този #CTF #cybersecurity #hacking
https://youtu.be/WEWHqHYhAEY
Моля, харесайте и се абонирайте ако ви хареса.
I do not use big email service providers. I run my own email server. Even if you cannot run your own email server, there are plenty of email providers which do not require you to provide a phone number. But I do not recommend people to use any big or small email service provider but to run own email servers :)
I have lost very close friends, because they called me a terrorist because I didn't want to put this shit in my body.
I am blessed of course because I run my own very small company and had no one to force me to this sh*t. But a lot people around me had to do it because their bosses forced them to do so.
One friend that was very close to me prior those days that called me a terrorist had his wife pregnant and they put this thing in her body while she was around 5th or 6th month and now a few years later the baby she gave birth to do not talk but only screams (which is not normal and should at least be able to say mama and similar long time ago)
I hope in the comming years they will overcome this, because I do not keep bad feelings in my heart, but maaann why the heck would you put this shit in your pregnant wife??
I have been asked "What stops #Bitcoin from inflating beyond 21 million coins and can this limit be changed?"
My response was that Bitcoin's supply limit of 21 million coins is a fundamental feature and is designed to be immutable. Several factors ensure that this limit is not exceeded:
Protocol Rules: Bitcoin's underlying protocol is hard-coded to produce new bitcoins through a process called "mining" at a diminishing rate. This rate halves approximately every four years in an event known as the "halving." This process will continue until approximately the year 2140, at which point the maximum supply of 21 million bitcoins is expected to be reached. Miners cannot create more bitcoins than what is allowed by the protocol.
Consensus Rules: #Bitcoin operates on a decentralized network of nodes that validate and enforce the rules of the protocol. Any attempt to change the supply limit would require broad consensus among the network participants, including miners, developers, users, and other stakeholders. Changing the supply limit is highly unlikely because it would require a hard fork, which is a contentious and risky process that could potentially split the #Bitcoin network.
Community and Economic Incentives: The Bitcoin community strongly values the scarcity and predictability of its supply. Changing the supply limit would undermine the trust and confidence in the cryptocurrency, potentially reducing its value. Additionally, many investors and users are attracted to #Bitcoin precisely because of its capped supply, as it provides a hedge against inflation and currency devaluation.
While it is technically possible to change the Bitcoin protocol to increase or decrease the supply limit through a hard fork, doing so would be a contentious and highly unlikely scenario. It would require overwhelming consensus and is generally considered to be against the principles that underpin Bitcoin's design.
In summary, Bitcoin's supply limit of 21 million coins is a core feature and it is extremely unlikely to change due to the consensus and incentives within the Bitcoin community. This supply limit is one of the key reasons why #Bitcoin is often referred to as "digital gold" and is seen as a store of value.
Do you think I missed something? How would you respond to this question?
Notes by Stoyko Stoykov | export