<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/20292/ai-cyber-defense-ops-course-launch</loc>
    <lastmod>2026-04-04T06:12:08.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/8WCLOIQ2NuM/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>AI Cyber Defense Ops Course Launch!</video:title>
      <video:description>Just Hacking Training livestream with Anton Ovrutsky to announce and celebrate his new course launch: &quot;AI Cyber Defense Ops&quot; available at https://justhacking.com</video:description>
      <video:player_loc>https://www.youtube.com/embed/8WCLOIQ2NuM</video:player_loc>
      <video:publication_date>2026-04-04T06:12:08.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>3786</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/20291/anthropic-says-no-more-openclaw</loc>
    <lastmod>2026-04-04T00:37:56.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/GE1c4Tb3Zsw/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Anthropic says NO MORE OpenClaw!!</video:title>
      <video:description>Watch Anthropic says NO MORE OpenClaw!! on Vidert</video:description>
      <video:player_loc>https://www.youtube.com/embed/GE1c4Tb3Zsw</video:player_loc>
      <video:publication_date>2026-04-04T00:37:56.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>111</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/20220/getting-started-with-the-windows-registry</loc>
    <lastmod>2026-04-03T16:00:00.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/wXPW-LRCTxQ/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Getting Started With The Windows Registry</video:title>
      <video:description>https://www.tcm.rocks/psap-y - We have several blue team certifications and are working on more training materials for the future! Check them out over at our website. 

The Windows Registry is artifact-rich - a literal treasure trove for evidence. But it&apos;s huge, and it&apos;s dense. So where do you even begin? Andrew Prince breaks down the Registry in this video and shows you how it can become one of the most powerful tools in your investigative toolkit. 

This video also includes a practical example of hunting for malware that is hiding directly inside of the Windows Registry. 

Like this video? Subscribe to never miss a new content drop from the TCMS team!

#dfir #malware #blueteam #cybersecurity #digitalforensics #threathunting 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://www.tcm.rocks/acad-y
Get Certified: https://www.tcm.rocks/certs-y
Merch: https://www.bonfire.com/store/tcm-security/

Timestamps: 
0:00 - Introduction
1:01 - Basic Registry Terminology
2:33 - Registry Hives
5:44 - Live and Offline Registry Hives
7:14 - MRU Lists and Timestamps
8:28 - Value Data Types
10:00 - Malware Demo
17:45 - Conclusion

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/wXPW-LRCTxQ</video:player_loc>
      <video:publication_date>2026-04-03T16:00:00.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>1103</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/20186/extremely-easy-identity-management-with-fletcher-heisler</loc>
    <lastmod>2026-04-03T13:00:06.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/2ttrqnw5kDE/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Extremely Easy Identity Management (with Fletcher Heisler!)</video:title>
      <video:description>https://jh.live/authentik || Take a look at the cool stuff authentik is cooking up 😊 https://jh.live/authentik

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/2ttrqnw5kDE</video:player_loc>
      <video:publication_date>2026-04-03T13:00:06.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>840</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/20015/the-payload-podcast-005-ai-with-shane-caldwell</loc>
    <lastmod>2026-04-02T13:40:12.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/wuJQCDdLfNA/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>The Payload Podcast #005 - AI with Shane Caldwell</video:title>
      <video:description>Watch The Payload Podcast #005 - AI with Shane Caldwell on Vidert</video:description>
      <video:player_loc>https://www.youtube.com/embed/wuJQCDdLfNA</video:player_loc>
      <video:publication_date>2026-04-02T13:40:12.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>3874</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/19453/the-worst-hack-of-2026</loc>
    <lastmod>2026-03-31T15:00:51.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/eGSsoSEppNU/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>the WORST hack of 2026</video:title>
      <video:description>Axios, the most popular HTTP library with over 100 million weekly downloads, was just hijacked in one of the most sophisticated supply chain attacks in history. A hacker took over the lead maintainer&apos;s npm account, injected a phantom dependency that deploys a cross-platform remote access trojan in 1.1 seconds, and the malware erases itself leaving no trace. I break down exactly how it happened, explain what a supply chain attack is, and show you how to check if YOUR system is affected.

npm supply chain attack, axios hacked, axios npm compromised, supply chain attack explained, npm install malware, remote access trojan, axios 1.14.1, plain-crypto-js, npm security, javascript security, open source security, postinstall script attack, supply chain hack 2026

TIMESTAMPS:
0:00 - npm install just became DANGEROUS
0:41 - How the attack happened
0:52 - What is Axios? (and why you probably have it)
1:39 - The account takeover
2:20 - The ONE line of code that did it all
3:06 - How it was discovered
3:32 - The postinstall dropper
4:08 - The RAT payload (Mac, Windows, Linux)
4:28 - The self-destruct (no evidence left)
4:40 - What IS a supply chain attack?
4:55 - The coffee analogy
5:51 - Are YOU affected? Let&apos;s check together
6:34 - Checking for the RAT on your system
6:51 - What to do if you&apos;re compromised
7:50 - Prayer
9:19 - BONUS: Pikachu explains supply chain attacks

ALL COMMANDS, DETECTION SCRIPTS, IOCs, AND REMEDIATION:
https://github.com/theNetworkChuck/axios-attack-guide

Quick check:
npm list axios
npm list -g axios

BAD VERSIONS: 1.14.1 and 0.30.4
SAFE VERSIONS: 1.14.0 and 0.30.3

One command that would have BLOCKED this attack:
npm config set min-release-age 3

RESOURCES:
Socket.dev (first to detect): https://socket.dev/blog/axios-npm-package-compromised
StepSecurity deep dive: https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan
GitHub Issue: https://github.com/axios/axios/issues/10604
Huntress Blog: https://www.huntress.com/blog/supply-chain-compromise-axios-n</video:description>
      <video:player_loc>https://www.youtube.com/embed/eGSsoSEppNU</video:player_loc>
      <video:publication_date>2026-03-31T15:00:51.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>660</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/19414/how-digital-forensics-caught-the-btk-killer</loc>
    <lastmod>2026-03-31T13:00:00.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/UyeZfu1jJNY/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>How Digital Forensics Caught the BTK Killer</video:title>
      <video:description>https://www.tcm.rocks/certs-y - We offer several blue teaming certs at TCM Security if you want to study up on DFIR and related topics! 

Here&apos;s a compelling case of digital forensics in action: the capture of the BTK Killer. Journey back to the early 2000s to find out how a floppy disc played an instrumental role in finally apprehending the killer - once and for all. 

Watch &quot;A Practical Intro to Digital Forensics&quot; here: https://www.youtube.com/watch?v=umB4WlfQ1JY

Want to see more content like this? Make sure you subscribe to the TCM Security YouTube channel!

#dfir #digitalforensics #truecrime #shortsfeed #shorts 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/UyeZfu1jJNY</video:player_loc>
      <video:publication_date>2026-03-31T13:00:00.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>108</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/19398/huge-npm-axios-supply-chain-attack</loc>
    <lastmod>2026-03-31T09:00:08.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/A58cV17avpM/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>HUGE npm axios supply chain attack</video:title>
      <video:description>https://www.huntress.com/blog/supply-chain-compromise-axios-npm-package
https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan
https://socket.dev/blog/axios-npm-package-compromised
https://socket.dev/npm/package/plain-crypto-js/files/4.2.1/setup.js
https://www.aikido.dev/blog/axios-npm-compromised-maintainer-hijacked-rat
https://gist.github.com/joe-desimone/36061dabd2bc2513705e0d083a9673e7
https://github.com/axios/axios/blob/v1.x/.github/workflows/deprecate.yml


Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/A58cV17avpM</video:player_loc>
      <video:publication_date>2026-03-31T09:00:08.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>846</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/19281/npm-axios-supply-chain-attack</loc>
    <lastmod>2026-03-31T05:37:45.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/A-KpP-6Dt8E/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>🚨 NPM axios Supply Chain Attack 🚨</video:title>
      <video:description>( huge thanks livestream partner https://jh.live/specterops-stream )</video:description>
      <video:player_loc>https://www.youtube.com/embed/A-KpP-6Dt8E</video:player_loc>
      <video:publication_date>2026-03-31T05:37:45.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>7937</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/19215/openclaw-right-now-it-s-not-what-you-think</loc>
    <lastmod>2026-03-30T14:08:00.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/T-HZHO_PQPY/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>OpenClaw......RIGHT NOW??? (it&apos;s not what you think)</video:title>
      <video:description>Get your own VPS and set up OpenClaw: https://hostinger.com/ncopenclaw Use code NETWORKCHUCK!

OpenClaw has 308K GitHub stars — more than React, more than the Linux kernel. But what IS it actually? I set it up on a VPS, gave it a Telegram bot, and watched it build a news briefing and server monitoring dashboard in minutes — something that took an entire n8n workflow video to do before. But I also kinda hate it. In this video, I cut through the hype and give you my honest take as someone who built the same thing with Claude Code before OpenClaw existed.

In this video, you&apos;ll learn how to install OpenClaw on a Linux VPS in under 5 minutes, connect it to Telegram, build an AI news briefing agent and IT monitoring dashboard, understand the four pillars of OpenClaw (AI models, channels, memory, and tools), configure security with the built-in security audit, set up tool profiles and red lines, and decide if OpenClaw is right for you. Whether you&apos;re an AI enthusiast drowning in hype or a sysadmin curious about AI agents, this covers everything from one-line install to hardened security config.


RESOURCES / LINKS: 
🎓 NetworkChuck Academy (OpenClaw Course):https://ntck-ac.co/oc1
💻 GitHub Setup Guide (all commands): https://github.com/theNetworkChuck/openclaw-setup 
🌐 OpenClaw: https://openclaw.ai 
🛠️ ClawHub (Skills Directory): https://clawhub.com 
🛠️ Hostinger VPS: https://hostinger.com/ncopenclaw 
📺 n8n Automation Video: https://youtube.com/watch?v=ONgECvZNI3o 
☕ NetworkChuck Coffee: https://networkchuck.coffee 


TIMESTAMPS: 
0:00 - OpenClaw stressed me out (308K GitHub stars) 
1:44 - Setting up OpenClaw in 5 minutes on a VPS 
4:22 - Connecting Telegram and hatching your agent 
7:30 - Project 1: AI news briefing (one sentence vs entire n8n workflow) 
8:14 - Project 2: AI IT engineer monitoring your own server 
9:34 - What IS OpenClaw actually? (gateway + 4 pillars) 
15:07 - Tools, cron jobs, and heartbeats 
17:08 - ClawHub skills, browser, and sub-agents 
19:27 - Why everyone freaked out (my honest take) 
20:5</video:description>
      <video:player_loc>https://www.youtube.com/embed/T-HZHO_PQPY</video:player_loc>
      <video:publication_date>2026-03-30T14:08:00.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>2084</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/18166/welcoming-megan-to-tcm-cybersecurity-ama</loc>
    <lastmod>2026-03-25T16:02:09.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/X7jkKinmM_E/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Welcoming Megan to TCM! | Cybersecurity | AMA</video:title>
      <video:description>Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/X7jkKinmM_E</video:player_loc>
      <video:publication_date>2026-03-25T16:02:09.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>3515</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/17804/3-reasons-iot-security-will-explode-in-2026</loc>
    <lastmod>2026-03-24T13:00:00.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/Ms8x93g_VFs/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>3 Reasons IoT Security Will Explode in 2026</video:title>
      <video:description>https://www.tcm.rocks/pipa-y - Become a certified IoT &amp; hardware hacker! We are proud to offer the Practical IoT Pentest Associate (PIPA), a beginner-friendly cert that will help you start ethically testing devices in no time. 

Will IoT and firmware hacking blow up in popularity this year?
According to Andrew Bellini, there’s a strong chance, and here&apos;s a few key reasons why:

1.) The EU Cyber Resilience Act, pushing manufacturers to take IoT security more seriously
2.) The rapid rise of AI-powered devices
3.) Growing interest in drone hacking

All signs point to a potentially major shift in the landscape.

What do you think; are we about to see IoT hacking take off? 

Don’t forget to subscribe to the TCM Security YouTube channel so you never miss a content drop.

Check out our beginner-friendly hardware hacking course in the TCM Security Academy here: https://www.tcm.rocks/hh-y

#iot #hardwarehacks #ai #iotsecurity #hacking 
 
Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/Ms8x93g_VFs</video:player_loc>
      <video:publication_date>2026-03-24T13:00:00.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>128</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/17158/project-helix-walkthrough-blue-team-ctf</loc>
    <lastmod>2026-03-20T16:00:00.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/dkJGM68Pjh8/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Project Helix Walkthrough: Blue Team CTF</video:title>
      <video:description>https://www.tcm.rocks/psaa-y-2026 - Explore our selection of blue teaming certifications while they&apos;re still on sale! The PSAA (Practical SOC Analyst Associate) as well as the PSAP (Practical SOC Analyst Professional) can be purchased for 20% off. 

Just apply the code SPRINGFLASH26 - and make sure you buy before 11:59 PM ET March 20th!

Last week, we hosted our first EVER blue team CTF! Project Helix was a CTF that required participants to put their investigative and forensics skills to the test. There were actually several ways to solve this particular Pluribus-inspired challenge. Andrew Prince walks through Project Helix from scenario to solution in this video.

Did you miss this CTF? Don&apos;t worry; we have several others on the way later this year!

#dfir #forensics #ctf #ctfwalkthrough #blueteam 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/dkJGM68Pjh8</video:player_loc>
      <video:publication_date>2026-03-20T16:00:00.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>1868</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/17122/chatgpt-for-the-dark-web</loc>
    <lastmod>2026-03-20T13:01:35.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/oqU41QwtAGE/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>ChatGPT For The Dark Web</video:title>
      <video:description>https://jh.live/flare-032026 || Manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: https://jh.live/flare-032026

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/oqU41QwtAGE</video:player_loc>
      <video:publication_date>2026-03-20T13:01:35.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1350</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/17001/state-of-the-cybersecurity-workforce-jht-wicys-rsac-preview</loc>
    <lastmod>2026-03-17T21:25:14.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/eGRxa9s1y0g/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>State of the Cybersecurity Workforce, JHT / WiCyS RSAC Preview</video:title>
      <video:description>Just Hacking Training Livestream with Lynn Dohm of WiCyS and Will Markow of FourOne Insights! Thursday, March 19 at 1:00pm Eastern Time https://justhacking.com</video:description>
      <video:player_loc>https://www.youtube.com/embed/eGRxa9s1y0g</video:player_loc>
      <video:publication_date>2026-03-17T21:25:14.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>3587</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/16799/bloodhound-opengraph</loc>
    <lastmod>2026-03-18T15:25:18.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/xOBqbN0d0qQ/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Bloodhound OpenGraph</video:title>
      <video:description>Justin Kohler joins the party to dig into BloodHound OpenGraph! Big thanks to livestream partner SpecterOps https://jh.live/specterops-stream</video:description>
      <video:player_loc>https://www.youtube.com/embed/xOBqbN0d0qQ</video:player_loc>
      <video:publication_date>2026-03-18T15:25:18.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>2700</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/16769/big-day-today</loc>
    <lastmod>2026-03-18T14:29:00.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/BMxQWRP_ASw/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>BIG DAY TODAY</video:title>
      <video:description>( huge thanks livestream partner https://jh.live/specterops-stream )</video:description>
      <video:player_loc>https://www.youtube.com/embed/BMxQWRP_ASw</video:player_loc>
      <video:publication_date>2026-03-18T14:29:00.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>2136</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/16750/big-day-today</loc>
    <lastmod>2026-03-18T13:11:38.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/5_w2tUCq9DI/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>BIG DAY TODAY</video:title>
      <video:description>( huge thanks livestream partner https://jh.live/specterops-stream )</video:description>
      <video:player_loc>https://www.youtube.com/embed/5_w2tUCq9DI</video:player_loc>
      <video:publication_date>2026-03-18T13:11:38.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1452</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/16231/can-ai-eat-its-own-tail</loc>
    <lastmod>2026-03-17T15:06:48.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/TtWh-TiMeMU/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>can AI eat its own tail? 🤖</video:title>
      <video:description>( big thanks livestream partner https://jh.live/specterops )</video:description>
      <video:player_loc>https://www.youtube.com/embed/TtWh-TiMeMU</video:player_loc>
      <video:publication_date>2026-03-17T15:06:48.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>7181</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/16229/the-importance-of-forensic-soundness</loc>
    <lastmod>2026-03-17T16:55:47.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/Uj5-BGqpLwk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>The Importance of Forensic Soundness</video:title>
      <video:description>https://www.tcm.rocks/socl2-y - Next week is SOC Level 2 Live Training! This exclusive instructor-led training focuses on incident response, threat hunting, and other advanced SOC topics.

Get 20% off the live training (as well as certs) as part of the FLASH SALE we&apos;re doing this week! Your code to save is SPRINGFLASH26 - and you can also receive 50% off your first payment to the TCM Security Academy. 

What is forensic soundness and why is it so critical to DFIR? And what distinctive advantage does it have over physical forensics? In this short, Andrew Prince walks through the concept and how it differs from its more traditional counterpart. 

Subscribe to never miss a content drop from the TCMS team!

#dfir #cybersecurity #forensics #digitalforensics #blueteam

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/Uj5-BGqpLwk</video:player_loc>
      <video:publication_date>2026-03-17T16:55:47.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>116</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14807/live-memory-forensics-blue-cape-cybersecurity</loc>
    <lastmod>2026-03-17T14:53:13.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/zYUQC_k9WAA/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>LIVE: 🕵️ Memory Forensics | Blue Cape | Cybersecurity</video:title>
      <video:description>https://www.tcm.rocks/soc101-y - Go further into blue teaming with our associate-level course, SOC 101! It&apos;s accompanied by a cert: the Practical SOC Analyst Associate (PSAA).

https://www.tcm.rocks/psaa-y - Check out the PSAA here.
https://www.tcm.rocks/soclive-y - We also have a live SOC Level 1 training that happens throughout the year!

We also offer more intermediate blue team training:

https://www.tcm.rocks/soc201-y - SOC 201 course
https://www.tcm.rocks/psap-y - Practical SOC Analyst Professional (PSAP)
https://www.tcm.rocks/soc2-y - SOC Level 2 Live Training (also happens throughout the year)

https://www.tcm.rocks/blue-team-playlist - Watch our defensive security videos here!

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/zYUQC_k9WAA</video:player_loc>
      <video:publication_date>2026-03-17T14:53:13.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>4035</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14806/the-dangers-of-cheap-smart-camera</loc>
    <lastmod>2026-03-17T14:53:02.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/LxMLkoeoUbg/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>The Dangers Of Cheap Smart Camera</video:title>
      <video:description>https://www.tcm.rocks/pipa-y - Become a certified IoT and hardware hacker in the TCM Security Academy with the Practical IoT Pentest Associate! (Take the course here: https://www.tcm.rocks/hh-y)

Cheap smart cameras may sound like a bargain, but the truth is they are riddled with security issues. In this video, Andrew Bellini does a quick investigation - so think twice next time you consider buying one for your home!

Want to see more videos like this? Hit that subscribe button so you never miss a drop from the TCMS team!

#iot #hardwarehacks #cybersecurity #hardwarehacking #iotsecurity 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/LxMLkoeoUbg</video:player_loc>
      <video:publication_date>2026-03-17T14:53:02.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>691</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14805/is-it-too-late-for-me-to-get-into-cybersecurity</loc>
    <lastmod>2026-03-17T14:52:51.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/QhdhPnPT8Jw/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Is It Too Late for Me to Get Into Cybersecurity?!</video:title>
      <video:description>https://www.tcm.rocks/acad-y - Kickstart your journey into cybersecurity with the wide array of courses in the TCM Security Academy! We offer courses from beginner-friendly to intermediate-level to help you speedrun your learning journey. 

If you&apos;ve been feeling like it&apos;s too late for you to pursue cybersecurity as a career, this short is for you! We often get this question during livestreams, and in this clip, Andrew Bellini explains his philosophy on if it&apos;s ever actually too late to join the field. He also shares why he thinks the military mindset lends itself well to cybersecurity. 

Watch the short, let us know what you think, and remember we go live every other Wednesday at 12 PM ET! (You can join us for office hours on alternating weeks, like this week, in our Discord server: https://discord.com/invite/tcm) 

#shorts #cybersecurity #shortsfeed #cybersecuritycareers #hacking

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/QhdhPnPT8Jw</video:player_loc>
      <video:publication_date>2026-03-17T14:52:51.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>65</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14804/iot-hacking-stream</loc>
    <lastmod>2026-03-17T14:51:44.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/K8VA23kmUJg/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>IoT Hacking Stream</video:title>
      <video:description>https://www.tcm.rocks/pipa-y - Become a certified IoT &amp; hardware hacker with the Practical IoT Pentest Associate (PIPA!)

Not ready for the PIPA quite yet? Try the beginner-friendly hardware hacking course we have available in the TCM Security Academy: https://www.tcm.rocks/hh-y 

You can watch part of that course here: https://www.youtube.com/watch?v=j8SqZLr64NA

Watch other IoT hacking videos here: https://www.tcm.rocks/iot-hacking

We&apos;ll be voiding some warranties and hacking IoT devices live in todays stream, also AMA Q&amp;A too!</video:description>
      <video:player_loc>https://www.youtube.com/embed/K8VA23kmUJg</video:player_loc>
      <video:publication_date>2026-03-17T14:51:44.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>4689</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14803/the-core-principle-in-forensic-science</loc>
    <lastmod>2026-03-17T14:51:30.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/nNOH-htvNTs/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>The Core Principle in Forensic Science</video:title>
      <video:description>https://www.tcm.rocks/psap-y - We&apos;ve got new forensics training on the way! Until then, check out our SOC courses and certifications, like the PSAP (Practical SOC Analyst Professional.)  

The core principle of forensic science is Locard&apos;s Exchange Principle. Dr. Edmond Locard (the Sherlock Holmes of France) created the concept to show how when any two objects come into contact, there&apos;s always a transfer of material between each object, like a suspect leaving behind shoe prints at a crime scene. In the digital realm, this exchange happens as well, like registry keys being modified, system logs, evidence of program execution, etc. 

And this is at the heart of digital forensics. Don&apos;t forget to subscribe to never miss a content drop from the TCMS team, like this Intro to Digital Forensics video: https://youtu.be/umB4WlfQ1JY

More on Locard&apos;s Exchange Principle here: https://en.wikipedia.org/wiki/Locard%27s_exchange_principle

Check out our SOC 201 course: https://www.tcm.rocks/soc201-y

And as of February 20th, Practical Window Forensics will be removed from the TCM Security Academy! We will be replacing the material in the near future with different DFIR content. https://www.tcm.rocks/pwf-y

#dfir #forensics #digitalforensics #cybersecurity #incidentresponse 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/nNOH-htvNTs</video:player_loc>
      <video:publication_date>2026-03-17T14:51:30.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>136</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14802/a-practical-intro-to-digital-forensics</loc>
    <lastmod>2026-03-17T14:51:19.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/umB4WlfQ1JY/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>A Practical Intro to Digital Forensics</video:title>
      <video:description>https://www.tcm.rocks/psap-y - Have you checked out our intermediate-level defensive security cert, the Practical SOC Analyst Professional (PSAP) yet? This cert focuses on threat hunting as well as incident response. We have more blue team content on the roadmap for 2026 as well!

Every time you interact with your digital devices, you&apos;re leaving behind evidence of that interaction. Evidence of program execution, file downloads, even your physical location. So how exactly does this work?! Enter the world of digital forensics. In this video, Andrew Prince provides a detailed introduction to digital forensics, even digging into the history of modern forensic science.

Enjoy this video? Make sure to hit that subscribe button to see more from the TCM Security team.

#dfir #forensics #digitalforensics #cybersecurity #blueteam 

Timestamps:

00:00 - Introduction
01:07 - Locard’s Exchange Principle
04:52 - The BTK Killer: A Case Study
06:39 - Physical vs Digital Evidence
08:37 - Simulating Forensic Artifacts
17:20 - Wiping Files
21:35 - Analyzing the Evidence
22:20 - Last User Login Time
24:40 - Analyzing &quot;Dirty&quot; Hives
25:50 - RunMRU
26:50 - RecentDocs
28:30 - Office File MRU
29:35 - Trusted Documents
30:25 - Reading Location
33:45 - OpenSavePidlMRU and LastVisitedPidlMRU
35:00 - LNK Files
36:20 - Windows Prefetch
38:01 - Examining File Wiping Execution
40:55 - MFT and USN Journal
42:13 - Alternate Data Streams (ADS)
43:42 - USN Journal Analysis
45:45 - Conclusion

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://w</video:description>
      <video:player_loc>https://www.youtube.com/embed/umB4WlfQ1JY</video:player_loc>
      <video:publication_date>2026-03-17T14:51:19.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>2812</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14801/live-forensicating-hackthebox-cybersecurity</loc>
    <lastmod>2026-03-17T14:50:58.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/u5e2f6K0Uak/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>LIVE: 🕵️ Forensicating | HackTheBox | Cybersecurity</video:title>
      <video:description>https://www.tcm.rocks/psaa - Start the TCM Security blue team content here. We have the PSAA (Practical SOC Analyst Associate), PSAP (Practical SOC Analyst Professional), and the courses SOC 101 and 201 as well as a few others. More to come!

https://www.tcm.rocks/soclive-y - We also have a SOC Level 1 and SOC Level 2 live training available! We will be hosting these several times this year, so if you can&apos;t make the next one, you have a few options. 

https://www.tcm.rocks/blue-team-playlist - Watch our other blue team videos and livestreams here!

#blueteam #cybersecurity #forensics #dfir #tcmsecurity 


Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/u5e2f6K0Uak</video:player_loc>
      <video:publication_date>2026-03-17T14:50:58.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>4254</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14800/how-hackers-defeated-our-ai</loc>
    <lastmod>2026-03-17T14:50:45.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/6omT2RfLYO4/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>How Hackers Defeated Our AI</video:title>
      <video:description>https://www.tcm.rocks/papa-y - Show your prowess as an AI hacker with our brand-new Practical AI Pentest Associate (PAPA) certification! Created by Andrew Bellini, this exam packs a lot of fun into an increasingly relevant challenge.

Do you ever get mad at all that AI hype? Do you ever want to remind those pesky robots who is exactly in charge? Well then, this video by Andrew Bellini is for you! Late last year, we held our first-ever AI hacking CTF, and Andrew shares 5 prompt injections that worked to exfiltrate the secret flag out of our AI chatbot. 

We&apos;re happy to share we should have another AI CTF somewhat soon - so stay tuned for more details on that!

Remember to subscribe to our YouTube channel to never miss a thing from our team - we&apos;re almost at 1 million subscribers!

#ai #chatbot #cybersecurity #hacking #promptinjection 

Not ready to get certified? We offer two AI courses as well - including a FREE fundamentals course.

Free AI Fundamentals Course: https://www.tcm.rocks/ai-fun-y

AI Hacking Course: https://www.tcm.rocks/ai-sec-y

We also offer an AI Hacking 101 Live Training: https://www.tcm.rocks/ailive-y

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/6omT2RfLYO4</video:player_loc>
      <video:publication_date>2026-03-17T14:50:45.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>325</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14799/chip-off-firmware-extraction-1-minute-guide</loc>
    <lastmod>2026-03-17T14:50:34.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/wnDhU6fQInE/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Chip-Off Firmware Extraction: 1-Minute Guide</video:title>
      <video:description>https://www.tcm.rocks/pipa-y - Get IoT security certified with the TCM Security Academy! We offer not only an IoT hacking certification, but a beginner-level course that you can access as part of the All-Access Membership: https://www.tcm.rocks/hh-y

Watch this short from Andrew Bellini where he shows you how to perform chip-off firmware extraction in under a minute. He goes through the process step by step so you can replicate it yourself easily. 

Don&apos;t forget to subscribe to our YouTube channel to see other videos just like this!

IoT Hacking Playlist: https://www.tcm.rocks/iot-hacking-videos

#shortsfeed #shorts #iot #hardwarehacks #hacking 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/wnDhU6fQInE</video:player_loc>
      <video:publication_date>2026-03-17T14:50:34.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>66</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14798/iot-hacking-stream</loc>
    <lastmod>2026-03-17T14:50:22.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/pQCxrKPhK7o/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>IoT Hacking Stream</video:title>
      <video:description>Start IoT hacking today with the TCM Security Academy: 
- Beginners Guide to IoT &amp; Hardware Hacking (course in the TCM Security Academy): https://www.tcm.rocks/hh-y
- The Practical IoT Pentest Associate (PIPA): https://www.tcm.rocks/pipa-y 

Watch the earlier IoT Hacking Streams here as well as several other related videos from Andrew Bellini: https://www.tcm.rocks/iot-hacking-videos

And lastly, if you want to explore the AI side of things, consider signing up for our AI Hacking Live happening next month! (You can also sign up for future sessions if next month is a no-go. https://www.tcm.rocks/ailive-y

We&apos;ll be voiding some warranties and hacking IoT devices live in todays stream, also AMA Q&amp;A too!</video:description>
      <video:player_loc>https://www.youtube.com/embed/pQCxrKPhK7o</video:player_loc>
      <video:publication_date>2026-03-17T14:50:22.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>3640</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14797/will-llms-always-hallucinate</loc>
    <lastmod>2026-03-17T14:50:07.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/v-eZ9Z6lhd4/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Will LLMs Always Hallucinate?</video:title>
      <video:description>https://www.tcm.rocks/papa-y - We released the PAPA (Practical AI Pentest Associate) late last year, our first-ever AI security certification! Learn how to deconstruct AI &amp; LLMs - and prove it. We&apos;ll have a professional AI cert out this year as well!

Will AI always be prone to hallucinating? As frustrating as it can be, Andrew Bellini explains his perspective on why - even if we reduce AI hallucinations - they&apos;ll likely always exist. This is because of how AI &amp; LLMs are designed to work. Watch and learn!

Don&apos;t forget to hit the subscribe button so you never miss the latest from the TCMS team!

#shorts #shortsfeed #cybersecurity #ai #llms 

https://www.tcm.rocks/ai-fun-y - FREE AI Fundamentals course!
https://www.tcm.rocks/ai-sec-y - AI Hacking 101 course

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/v-eZ9Z6lhd4</video:player_loc>
      <video:publication_date>2026-03-17T14:50:07.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>99</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14796/how-i-m-approaching-cybersecurity-goals-in-2026</loc>
    <lastmod>2026-03-17T14:49:54.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/w-l571Lu8N0/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>How I’m Approaching Cybersecurity Goals in 2026</video:title>
      <video:description>https://www.tcm.rocks/psap-y - If one of your 2026 cybersecurity goals is advancing yourself as a SOC analyst, consider taking the PSAP (Practical SOC Analyst Professional) certification exam. This cert serves as the next step up from the PSAA (Practical SOC Analyst Associate.) 

Make sure you hit every one of your 2026 cybersecurity goals with this guide from Andrew Prince! In today&apos;s video, he explores how you can set yourself up for success. His strategies include breaking larger goals into smaller more manageable pieces, optimizing your workplace to support your growth, choosing goals that actually mean something, and several others. 

Watch for yourself and tell us how you&apos;re holding yourself accountable in 2026. And don&apos;t forget to hit that subscribe button so you never meet the latest from the TCM Security team. 

#goals #goalsetting #cybersecurity #goalsettingstrategies 

Time Stamps:
0:00 - Introduction
1:50 - Avoid the Firehose
3:40 - Micro Actions
4:50 - Investigation Breakdown
6:58 - Protect Focused Time
9:47 - The Two-Day Rule
10:33 - Optimize Your Workspace
13:17 - How to Pick Meaningful Goals
13:54 - Cybersecurity Roadmaps
15:54 - Hunting for Value
18:16 - Conclusion

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/w-l571Lu8N0</video:player_loc>
      <video:publication_date>2026-03-17T14:49:54.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>1143</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14795/with-network-forensics-sometimes-you-just-get-lucky</loc>
    <lastmod>2026-03-17T14:49:40.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/4gFXUXObnN0/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>With Network Forensics, Sometimes You Just Get Lucky...</video:title>
      <video:description>https://www.tcm.rocks/soc101-y - Start your SOC journey with our SOC 101 course, available in the TCM Security Academy! And once you knock that one out, level up with our SOC 201 course!

Follow along with this network forensics investigation with Andrew Prince where he breaks down some anomalous findings ... and sometimes, you just get lucky with picking a random packet. Try it for yourself over at HackTheBox - https://app.hackthebox.com/sherlocks/Litter

#dfir #forensics #cybersecurity #shorts #shortsfeed 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7</video:description>
      <video:player_loc>https://www.youtube.com/embed/4gFXUXObnN0</video:player_loc>
      <video:publication_date>2026-03-17T14:49:40.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>80</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14794/live-new-year-new-me-sherlocks-cybersecurity</loc>
    <lastmod>2026-03-17T14:49:29.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/7RbXlvCb7FE/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>LIVE: 🕵️ New Year New Me | Sherlocks | Cybersecurity</video:title>
      <video:description>Follow along with Andrew Prince here: https://app.hackthebox.com/sherlocks/Litter

Explore the TCM Security blue team &amp; SOC content created by Andrew Prince:

https://www.tcm.rocks/soc101-y - The TCM Security SOC 101 course, a perfect entry point to your blue team learning path.
https://www.tcm.rocks/psaa-y - The corresponding Practical SOC Analyst Associate (PSAA) certification.
https://www.tcm.rocks/soc201-y - Go a step further with our SOC 201 course, which introduces more advanced security operations topics.
https://www.tcm.rocks/psap-y - The corresponding Practical SOC Analyst Professional (PSAP) certification.

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M63</video:description>
      <video:player_loc>https://www.youtube.com/embed/7RbXlvCb7FE</video:player_loc>
      <video:publication_date>2026-03-17T14:49:29.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>4159</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14793/what-to-expect-from-the-2026-cybersecurity-job-market</loc>
    <lastmod>2026-03-17T14:49:15.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/OM-_fU_8crg/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>What to Expect From the 2026 Cybersecurity Job Market</video:title>
      <video:description>https://www.tcm.rocks/acad-y - Help improve your 2026 job prospects by joining the TCM Security Academy! Memberships start at 1 month.

What&apos;s in store for the 2026 cybersecurity job market? Heath Adams (🥺) shared a few of his predictions in this livestream clip. There are several factors involved that Heath attempted to walk through. 

Are you optimistic about 2026? Tell us in the comments. And subscribe to never miss any fresh content from the TCMS team. 

#cybersecurity #jobs #cybersecuritycareers #shorts #shortsfeed 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https</video:description>
      <video:player_loc>https://www.youtube.com/embed/OM-_fU_8crg</video:player_loc>
      <video:publication_date>2026-03-17T14:49:15.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>120</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14792/heath-s-last-stream</loc>
    <lastmod>2026-03-17T14:49:03.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/xM6_GcUEuNQ/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Heath&apos;s Last Stream</video:title>
      <video:description>Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse: https://amzn.to/30hvg4P
Sennheiser RS 175 RF Wireless Headphones: https://amzn.to/31MOgpu

My Recording Equipment:
Panasonic G85 4K Camera: https://amzn.to/2Mk9vsf
Logitech C922x Pro Webcam: https://amzn.to/2LIRxAp
Aston Origin Microphone: https://amzn.to/2LFtNNE
Rode VideoMicro: https://amzn.to/309yLKH
Mackie PROFX8V2 Mixer: https://amzn.to/31HKOMB
Elgato Cam Link 4K: https://amzn.to/2QlicYx
Elgato Stream Deck: https://amzn.to/2OlchA5

*We are a participant in the Amazon Ser</video:description>
      <video:player_loc>https://www.youtube.com/embed/xM6_GcUEuNQ</video:player_loc>
      <video:publication_date>2026-03-17T14:49:03.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>5237</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14791/going-from-blue-team-to-red-team</loc>
    <lastmod>2026-03-17T14:48:51.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/BW65De3PCZs/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Going From Blue Team to Red Team</video:title>
      <video:description>www.tcm.rocks/psap-y - We released our intermediate-level SOC certification, the PSAP (Practical SOC Analyst Professional), earlier this year! Check it out at the link.

How do you make the leap from blue team to red team? Heath Adams provides his thoughts in this short from a recent livestream. Spoiler alert: Cybersecurity experience IS experience, no matter what it looks like.

Subscribe so you never miss a video or livestream from the TCMS team!

#shorts #blueteam #redteam #cybersecurity #shortsfeed 


Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7A0or</video:description>
      <video:player_loc>https://www.youtube.com/embed/BW65De3PCZs</video:player_loc>
      <video:publication_date>2026-03-17T14:48:51.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>60</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14790/iot-hardware-hacking-for-beginners-learn-fundamentals-in-9-hours</loc>
    <lastmod>2026-03-17T14:48:38.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/j8SqZLr64NA/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>IoT &amp; Hardware Hacking for Beginners - Learn Fundamentals in 9+ Hours</video:title>
      <video:description>Hi everyone! I hope you enjoyed this video.  Please do consider subscribing so we can continue making awesome hacking content!  Below is all of the course info:

https://www.youtube.com/@D1gitalAndrew - Follow Andrew Bellini on YouTube (DigitalAndrew)

https://www.tcm.rocks/iot-equipment-list - Full list of equipment needed for this course video
https://www.tcm.rocks/hh-y - Full course in the TCM Security Academy)
https://www.tcm.rocks/pipa-y - Practical IoT Pentest Associate (PIPA) certification
https://www.tcm.rocks/iot-hacking - All of our IoT &amp; hardware hacking materials on YouTube

Time Stamps: 
0:00 - YT Intro
1:46 - Section 0 - Course Intro
13:28 - Section 1 - Electrical Engineering for Hackers 101
1:16:09 - Section 2 - Hands-on with PCBs and Multimeters
2:26:14 - Section 3 - Electrical Engineering for Hackers 201
4:20:08 - Section 4 - Hands-on with Logic Analyzers and UART
5:48:57 - Section 5 - Recon and OSINT
7:26:11 - Section 6 - UART Shell and Live Enumeration
9:35:06 - YT Outro

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
</video:description>
      <video:player_loc>https://www.youtube.com/embed/j8SqZLr64NA</video:player_loc>
      <video:publication_date>2026-03-17T14:48:38.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14789/3-cybersecurity-myths-i-hate</loc>
    <lastmod>2026-03-17T14:48:26.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/SHBlItTG10s/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>3 Cybersecurity Myths I HATE</video:title>
      <video:description>https://www.tcm.rocks/acad-y - Dispel pesky cybersecurity myths with the knowledge you&apos;ll gain in the TCM Security Academy! 

Andrew Bellini has a LOT of big feelings about 3 cybersecurity myths that he absolutely despises. What are those myths exactly? Andrew reviews them in this short: juicejacking, public Wi-Fi threats, and 90-day password policies. 

What cybersecurity myths get YOU riled up?! Tell us in the comments!

#cybersecurity #password #wifi #shortsfeed #shorts 
  
Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse</video:description>
      <video:player_loc>https://www.youtube.com/embed/SHBlItTG10s</video:player_loc>
      <video:publication_date>2026-03-17T14:48:26.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>180</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14788/iot-hacking-stream</loc>
    <lastmod>2026-03-17T14:48:12.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/bcSK9Z4VoZY/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>IoT Hacking Stream</video:title>
      <video:description>Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse: https://amzn.to/30hvg4P
Sennheiser RS 175 RF Wireless Headphones: https://amzn.to/31MOgpu

My Recording Equipment:
Panasonic G85 4K Camera: https://amzn.to/2Mk9vsf
Logitech C922x Pro Webcam: https://amzn.to/2LIRxAp
Aston Origin Microphone: https://amzn.to/2LFtNNE
Rode VideoMicro: https://amzn.to/309yLKH
Mackie PROFX8V2 Mixer: https://amzn.to/31HKOMB
Elgato Cam Link 4K: https://amzn.to/2QlicYx
Elgato Stream Deck: https://amzn.to/2OlchA5

*We are a participant in the Amazon Ser</video:description>
      <video:player_loc>https://www.youtube.com/embed/bcSK9Z4VoZY</video:player_loc>
      <video:publication_date>2026-03-17T14:48:12.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>4004</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14787/do-cheap-hidden-camera-detectors-work</loc>
    <lastmod>2026-03-17T14:48:00.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/r6PT1wSelEY/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Do Cheap Hidden Camera Detectors Work?</video:title>
      <video:description>https://www.tcm.rocks/pipa-y - Get started with hardware hacking and IoT hacking with the TCMS cert, the Practical IoT Pentest Associate (PIPA).

Do cheap hidden camera detectors actually work? Watch Andrew Bellini break one down in this short and find out for yourself. 👀 Try it for yourself and let us know if it works for you!

#iot #pentesting #hardwarehacks #shorts #shortsfeed 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse: https://amzn.to/30hvg4P
Sennheiser RS 175 RF Wireless Headphones: https://amzn.to/31MOgpu

My </video:description>
      <video:player_loc>https://www.youtube.com/embed/r6PT1wSelEY</video:player_loc>
      <video:publication_date>2026-03-17T14:48:00.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>155</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14786/how-ai-is-changing-cybersecurity</loc>
    <lastmod>2026-03-17T14:47:47.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/QRgG1I8MbYs/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>How AI is Changing Cybersecurity</video:title>
      <video:description>https://www.tcm.rocks/papa-y - The PAPA cert is here! The PAPA is the Practical AI Pentest Associate, and it builds off the exciting work Andrew Bellini has been doing in the realm of AI hacking research.

How will the increase in AI technology impact the cybersecurity industry? How is it already impacting the cybersecurity industry? Heath Adam takes an audience member&apos;s question in this livestream clip and explains why if you&apos;re not already comfortable using AI and understanding how it works, now is the time to start. 

We offer a FREE AI Fundamentals course that serves as an excellent prime to artificial intelligence: https://www.tcm.rocks/ai-fun-y

Don&apos;t forget to subscribe to see more from the TCM Security team! 

#artificialintelligence #ai #cybersecurity #shortsfeed #shorts 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d</video:description>
      <video:player_loc>https://www.youtube.com/embed/QRgG1I8MbYs</video:player_loc>
      <video:publication_date>2026-03-17T14:47:47.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>77</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14785/live-htb-sherlocks-cybersecurity-blue-team</loc>
    <lastmod>2026-03-17T14:47:35.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/E9EUSl80mzQ/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>LIVE: 🕵️ HTB Sherlocks! | Cybersecurity | Blue Team</video:title>
      <video:description>https://www.tcm.rocks/psap-y - Get the Practical SOC Analyst Professional (PSAP) cert today!

https://app.hackthebox.com/login?redirectUrl=/sherlocks/RogueOne - Play along with the Sherlock yourself!

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse: https://amzn.to/30hvg4P
Sennheiser RS 175 RF Wireless Headphones: https://amzn.to/31MOgpu

My Recording Equipment:
Panasonic G85 4K Camera: https://amzn.to/2Mk9vsf
Logitech C922x Pro Webcam: https://amzn.to/2LIRxAp
Aston Origin Microphone: https://amzn.to/2LFtNNE
Rode VideoMicro</video:description>
      <video:player_loc>https://www.youtube.com/embed/E9EUSl80mzQ</video:player_loc>
      <video:publication_date>2026-03-17T14:47:35.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>3461</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14784/how-baselining-helps-incident-response</loc>
    <lastmod>2026-03-17T14:47:21.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/dxnQqge1ASY/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>How Baselining Helps Incident Response</video:title>
      <video:description>https://www.tcm.rocks/soc201-y - Take SOC 201 here in the TCM Security Academy (which digs into incident response)

What is baselining and why is it so vital for successful incident response? Establishing a strong baseline ensures a stable reference point of what normal activity should look like ... and what anomalous behavior indicates malicious activity, too. Andrew Prince provides a glimpse into the importance of cybersecurity baselining in today&apos;s video. 

Enjoyed this video? Be sure to subscribe to never miss the latest from the TCMS crew.

References from video:
https://soc201.com/PSIR
https://github.com/p0w3rsh3ll/AutoRuns

Explore our intermediate blue teaming cert, the PSAP (Practical SOC Analyst Professional), which digs into incident response: https://www.tcm.rocks/psap-y-2025

#incidentresponse #dfir #cybersecurity #blueteam #digitalforensics 

Timestamps:
0:00 - Intro
1:20 - What is a baseline?
3:25 - Differential analysis in PowerShell
9:40 - Compromising with PsExec
10:55 - Compare-Object
15:57 - PowerShell IR Frameworks
17:45 - Autoruns Baselining
24:00 - Conclusion

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics f</video:description>
      <video:player_loc>https://www.youtube.com/embed/dxnQqge1ASY</video:player_loc>
      <video:publication_date>2026-03-17T14:47:21.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>1472</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14783/why-large-language-models-llms-output-differs</loc>
    <lastmod>2026-03-17T14:47:10.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/OWbgAKt8IJk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Why Large Language Models (LLMs) Output Differs</video:title>
      <video:description>https://www.tcm.rocks/papa-y - Our new AI Hacking certification has arrive! Become a certified PAPA - Practical AI Pentest Associate.

Why is it that if you feed an LLM the exact same input, the output differs? LLMs are designed to be non-deterministic, meaning that the same input will not always generate the same output. Andrew Bellini gets into the nitty-gritty of it in this short. 

AI Hacking 101 course from the TCM Security Academy: https://www.tcm.rocks/ai-hacking-y-25

FREE AI Fundamentals Course: https://www.tcm.rocks/ai-fun-y

#llms #ai #chatgpt #shorts #shortsfeed 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://a</video:description>
      <video:player_loc>https://www.youtube.com/embed/OWbgAKt8IJk</video:player_loc>
      <video:publication_date>2026-03-17T14:47:10.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>173</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14782/live-papa-release-tcm-security-ai-hacking-ama</loc>
    <lastmod>2026-03-17T14:46:58.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/N0IPJx8rf5Q/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Live: PAPA Release | TCM Security | AI Hacking | AMA</video:title>
      <video:description>https://www.tcm.rocks/papa-y - Get your PAPA (Practical AI Pentest Associate) today! This cert comes with two courses: AI Fundamentals &amp; AI Hacking 101.

https://www.tcm.rocks/ai-sec-y - AI Hacking 101 course
https://www.tcm.rocks/ai-fun-y - FREE AI Fundamentals course 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse: https://amzn.to/30hvg4P
Sennheiser RS 175 RF Wireless Headphones: https://amzn.to/31MOgpu

My Recording Equipment:
Panasonic G85 4K Camera: https://amzn.to/2Mk9vsf
Logitech C922x Pro Webcam: https://amzn.to/2</video:description>
      <video:player_loc>https://www.youtube.com/embed/N0IPJx8rf5Q</video:player_loc>
      <video:publication_date>2026-03-17T14:46:58.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>2825</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14781/cybersecurity-ama-with-heath-adams</loc>
    <lastmod>2026-03-17T14:46:43.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/L21_zbod8js/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Cybersecurity AMA with Heath Adams</video:title>
      <video:description>Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse: https://amzn.to/30hvg4P
Sennheiser RS 175 RF Wireless Headphones: https://amzn.to/31MOgpu

My Recording Equipment:
Panasonic G85 4K Camera: https://amzn.to/2Mk9vsf
Logitech C922x Pro Webcam: https://amzn.to/2LIRxAp
Aston Origin Microphone: https://amzn.to/2LFtNNE
Rode VideoMicro: https://amzn.to/309yLKH
Mackie PROFX8V2 Mixer: https://amzn.to/31HKOMB
Elgato Cam Link 4K: https://amzn.to/2QlicYx
Elgato Stream Deck: https://amzn.to/2OlchA5

*We are a participant in the Amazon Ser</video:description>
      <video:player_loc>https://www.youtube.com/embed/L21_zbod8js</video:player_loc>
      <video:publication_date>2026-03-17T14:46:43.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>3790</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14780/why-is-rag-dangerous</loc>
    <lastmod>2026-03-17T14:46:29.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/LNxe0n8av6A/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Why is RAG Dangerous?</video:title>
      <video:description>https://www.tcm.rocks/ai-sec-y- Take our AI Hacking 101 course and go further into how you can exploit AI &amp; LLM systems! 

https://www.tcm.rocks/papa-y - And take your learning to the next level with the PAPA (Practical AI Pentest Associate) cert!

A lot of AI chatbots these days rely on RAG to run effectively. RAG, which stands for Retrieval-Augmented Generation, has its positives - but it can open up a lot of vulnerabilities. Listen as Andrew Bellini shares how RAG works and what risks it poses.

Be sure to subscribe to never miss new content from the TCM Security team! We go live every Wednesday at 12 PM ET right here on YouTube.

#shortsfeed #shorts #ai #retrievalaugmentedgeneration #chatgpt 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5T</video:description>
      <video:player_loc>https://www.youtube.com/embed/LNxe0n8av6A</video:player_loc>
      <video:publication_date>2026-03-17T14:46:29.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>146</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14779/ai-jailbreaks-that-made-me-go-wtf</loc>
    <lastmod>2026-03-17T14:46:03.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/8aKomcFN7yo/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>AI Jailbreaks That Made Me Go WTF</video:title>
      <video:description>https//www.tcm.rocks/papa-y - PAPA is here! Get the Practical AI Pentest Associate (PAPA) cert today.

Watch this short to see some of the most bizarre AI prompts Andrew Bellini discovered while combing through the results of his AI security CTF - and why, in some cases, they worked! Let us know when you&apos;ve broken the bot in the comments! 

We recently released an AI Hacking 101 course, which you can get in the TCM Security Academy: https://www.tcm.rocks/ai-sec-y

#shorts #ai #shortsfeed #cybersecurity #ctf

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7A</video:description>
      <video:player_loc>https://www.youtube.com/embed/8aKomcFN7yo</video:player_loc>
      <video:publication_date>2026-03-17T14:46:03.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>99</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14778/top-5-wtf-prompt-injections</loc>
    <lastmod>2026-03-17T14:45:49.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/-1uMpQo7XGU/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Top 5 WTF Prompt Injections</video:title>
      <video:description>www.tcm.rocks/papa-y - The TCM Security AI cert is here! Get yours today!

What are some of the most ridiculous AI prompts people used when trying to break the Black Friday CTF TCMBot?! Andrew Bellini shares 5 categories of absolutely wild prompt injections he found, such as belittling the bot (or being way too nice), elaborate world-building, or even outright threatening the LLM. But some of these prompts actually worked, and Andrew explains why. 

Have you tried the CTF yourself yet? 

We also offer an AI Hacking 101 course and an AI live training happening in February 2026.

AI Hacking 101: https://www.tcm.rocks/ai-hacking-y-25
AI Live Training: https://www.tcm.rocks/ailive-y

#ai #chatgpt #ctf #cybersecurity #jailbreak 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherB</video:description>
      <video:player_loc>https://www.youtube.com/embed/-1uMpQo7XGU</video:player_loc>
      <video:publication_date>2026-03-17T14:45:49.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>343</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14777/ai-hacking-ctf-win-prizes-ama</loc>
    <lastmod>2026-03-17T14:45:38.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/nErlx9nX0m8/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>AI Hacking CTF | Win Prizes!!! | AMA</video:title>
      <video:description>https://www.tcm.rocks/ai-sec-y - Learn how to hack AI &amp; LLMs in this 101 level course from Andrew Bellini!

https://www.tcm.rocks/certs-y-2025 - Get certified in the TCM Security Academy (new AI cert coming soon!)

https://www.tcm.rocks/acad-y-2025 - Join the TCM Security Academy and during November you can save 50% off your first payment!

https://tcm-sec.com/ethically-hack-ai-prompt-injection/ - AI Prompt Guide from Andrew Bellini

#ai #llms #chatgpt #hacking #cybersecurity</video:description>
      <video:player_loc>https://www.youtube.com/embed/nErlx9nX0m8</video:player_loc>
      <video:publication_date>2026-03-17T14:45:38.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>3472</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14776/practical-help-desk-learn-it-fundamentals-in-9-hours</loc>
    <lastmod>2026-03-17T14:45:25.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/2MvT63eZfp0/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Practical Help Desk - Learn IT Fundamentals in 9 Hours</video:title>
      <video:description>Hi everyone! I hope you enjoyed this video.  Please do consider subscribing so we can continue making awesome hacking content!  Below is all of the course info:

https://www.tcm.rocks/phd-y - Full FREE Practical Help Desk Course
https://www.tcm.rocks/phda-y - Practical Help Desk Associate (PHDA) certification
https://tcm-sec.com/how-to-pass-the-phda-exam/ - How to Pass the PHDA exam 
https://youtu.be/U1w4T03B30I - Linux for Ethical Hacking
https://www.tcm.rocks/linux101-y - Linux 101 

Time Stamps:
0:00 - Intro
01:06 - Meet Andrew Bellini (instructor)
03:19 - Prerequisites &amp; Hardware Requirements
05:15 - Curriculum
07:52 - Importance of Notetaking
09:37 - Discord Community (https://discord.com/invite/tcm)
11:21 - Intro to IT
56:04 - Intro to Computing
1:48:43 - Desktop Computer Components &amp; Repair
3:54:00 - Laptop Computer Components &amp; Repair
4:25:25 - Operating Systems
4:47:25 - Virtualization
5:23:34 - Windows
7:20:00 - Linux









Notetaking App Recommendations: https://www.youtube.com/watch?v=KpX7v5Ym3wg 

Connect with Andrew on LinkedIn: https://www.linkedin.com/in/andrew-bellini/

#freecourse #cybersecurity #it #helpdesk #career 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com</video:description>
      <video:player_loc>https://www.youtube.com/embed/2MvT63eZfp0</video:player_loc>
      <video:publication_date>2026-03-17T14:45:25.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14775/live-psap-release-tcm-security-blue-team-ama</loc>
    <lastmod>2026-03-17T14:45:12.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/mJbDSrykU8s/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Live: PSAP Release | TCM Security | Blue Team | AMA</video:title>
      <video:description>Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse: https://amzn.to/30hvg4P
Sennheiser RS 175 RF Wireless Headphones: https://amzn.to/31MOgpu

My Recording Equipment:
Panasonic G85 4K Camera: https://amzn.to/2Mk9vsf
Logitech C922x Pro Webcam: https://amzn.to/2LIRxAp
Aston Origin Microphone: https://amzn.to/2LFtNNE
Rode VideoMicro: https://amzn.to/309yLKH
Mackie PROFX8V2 Mixer: https://amzn.to/31HKOMB
Elgato Cam Link 4K: https://amzn.to/2QlicYx
Elgato Stream Deck: https://amzn.to/2OlchA5

*We are a participant in the Amazon Ser</video:description>
      <video:player_loc>https://www.youtube.com/embed/mJbDSrykU8s</video:player_loc>
      <video:publication_date>2026-03-17T14:45:12.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>3182</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14774/preparing-a-pcap-investigation</loc>
    <lastmod>2026-03-17T14:45:00.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/OYO3bmqcCoI/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Preparing a PCAP Investigation!</video:title>
      <video:description>https://www.tcm.rocks/psap-y - The PSAP (Practical SOC Analyst Professional) certification from Andrew Prince has arrived! This is an intermediate-level experience aimed at threat hunting and incident response skillsets. 

Walk step by step through the process of setting up for a PCAP investigation in this short from Andrew Prince. He shares his approach, and you can start applying his techniques as you ready your own investigations today. 

#cybersecurity #blueteam #incidentresponse #threathunting #pcap  

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7A0</video:description>
      <video:player_loc>https://www.youtube.com/embed/OYO3bmqcCoI</video:player_loc>
      <video:publication_date>2026-03-17T14:45:00.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>84</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14773/live-iot-hacking-chip-off-firmware-extraction-hardware-hacking-ama</loc>
    <lastmod>2026-03-17T14:44:48.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/SdWmqAowzKs/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Live IoT Hacking | Chip Off Firmware Extraction | Hardware Hacking | AMA</video:title>
      <video:description>https://www.tcm.rocks/certs-y-2025 - Get certified here and save 20% as part of our Black Friday sale! Sale closes at 11:59 PM ET on December 1st.

https://www.tcm.rocks/acad-y-2025 - Get 50% off your first payment to the TCM Security Academy as well! This includes courses like our beginner-friendly hardware hacking training (created by DigitalAndrew!) 

You can also enjoy 20% off live trainings and access to exclusive certification bundles - and when you get either of these, you&apos;ll be entered for the chance to win a year of mentorship with Heath! 

In this record, DigitalAndrew revisits the router we&apos;ve been hacking, this time attempting to pull off the flash chip and extract the firmware.

Check out our AI Hacking 101 course here: https://www.tcm.rocks/ai-hacking-y-25

#iot #hardwarehacking #cybersecurity #pentesting</video:description>
      <video:player_loc>https://www.youtube.com/embed/SdWmqAowzKs</video:player_loc>
      <video:publication_date>2026-03-17T14:44:48.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>3998</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14772/3-awesome-ai-security-resources</loc>
    <lastmod>2026-03-17T14:44:35.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/oCr3M4JyhxQ/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>3 Awesome AI Security Resources!</video:title>
      <video:description>https://www.tcm.rocks/ai-sec-y- Take our brand-new AI Hacking 101 course as part of your All-Access Membership to the TCM Security Academy! 

https://www.tcm.rocks/papa-y - Our AI hacking cert is now here. Become a certified PAPA (Practical AI Pentest Associate!) 

Looking for some resources to really advance your AI security knowledge? In this short, Andrew Bellini shares his tried-and-true recommendations, which include:

- the OWASP Top 10 for LLMs: https://github.com/OWASP/www-project-top-10-for-large-language-model-applications/

- MITRE Atlas Framework: https://atlas.mitre.org/

- The FREE AI Fundamentals course by TCM Security: https://www.tcm.rocks/ai-fun-y

Make sure you subscribe to never miss a new video/short/livestream from the TCMS team!

Join the Academy here: https://www.tcm.rocks/acad-y-2025
Get a TCM Security cert package here: https://www.tcm.rocks/certs-y-2025

#shorts #shortsfeed #cybersecurity #ai #llm 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://</video:description>
      <video:player_loc>https://www.youtube.com/embed/oCr3M4JyhxQ</video:player_loc>
      <video:publication_date>2026-03-17T14:44:35.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>162</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14771/intro-to-powershell-hunting-network-activity</loc>
    <lastmod>2026-03-17T14:44:24.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/SQpewCGwXL0/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Intro to PowerShell: Hunting Network Activity.</video:title>
      <video:description>www.tcm.rocks/soc201-y - Take your PowerShell skills to the next level with our new SOC 201 course.

In this video, Andrew Prince continues our PowerShell series and shows you how to detect indicators of compromise (IOCs) across a Windows network.

Learn how to spot:
- Telltale network signs of compromise
- Suspicious connections with Netstat
-  Malware beacon activity
...and much more to strengthen your defensive security skills.

Whether you&apos;re a SOC analyst, incident responder, or cybersecurity student, this session will help you use PowerShell more effectively for real-world detection and response.

👇 Want more PowerShell and cybersecurity training?
Leave a comment, like the video, and subscribe to the TCM Security Academy channel for more hands-on security content!

Get certified as a PSAP (Practical SOC Analyst Professional): www.tcm.rocks/psap-y

Prior Videos:
https://www.youtube.com/watch?v=GyvEMcMh3rc - Intro to PowerShell
https://www.youtube.com/watch?v=ntRx60An1fY - Investigating Windows Processes

#threathunting #powershell #cybersecurity #malware #defensivesecurity

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Timestamps:
0:00 - Introduction
1:43 - Network Indicators of Compromise
2:33 - Netstat
2:50 - Get-NetTCPConnection
4:16 - Connection State
7:34 - Correlating Network and Processes
14:11 - Hunting a Malware Beacon
18:43 - Enumerating Session Length
20:55 - Get-NetUDPEndpoint
21:42 - Conclusion (edited) 

Hacker Books:
Penetration Testing: A Hands-On Introdu</video:description>
      <video:player_loc>https://www.youtube.com/embed/SQpewCGwXL0</video:player_loc>
      <video:publication_date>2026-03-17T14:44:24.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>1419</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14770/security-driven-rapid-release-pwn2own-documentary-part-4</loc>
    <lastmod>2026-03-17T14:44:09.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/x4CUAuwoZVk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Security-driven Rapid Release - Pwn2Own Documentary (Part 4)</video:title>
      <video:description>Learn hacking (ad): https://www.hextree.io

What does it take to fix a vulnerability in Firefox and release an Update?

part 1: https://www.youtube.com/watch?v=YQEq5s4SRxY
part 2: https://www.youtube.com/watch?v=uXW_1hepfT4
part 3: https://www.youtube.com/watch?v=NT1VCmJF3mU
part 4: https://www.youtube.com/watch?v=x4CUAuwoZVk

(Spoilers) Firefox Security Response to pwn2own 2025: https://blog.mozilla.org/security/2025/05/17/firefox-security-response-to-pwn2own-2025/

=[ ❤️ Support ]=

→ My courses: https://www.hextree.io/
→ My font: https://shop.liveoverflow.com/
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ LinkedIn: https://www.linkedin.com/in/liveoverflow
→ X / Twitter: https://x.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Streaming: https://twitch.tv/LiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Blog: https://liveoverflow.com/</video:description>
      <video:player_loc>https://www.youtube.com/embed/x4CUAuwoZVk</video:player_loc>
      <video:publication_date>2026-03-17T14:44:09.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1281</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14769/firefox-jit-bug-pwn2own-documentary-part-3</loc>
    <lastmod>2026-03-17T14:43:56.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/NT1VCmJF3mU/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Firefox JIT Bug - Pwn2Own Documentary (Part 3)</video:title>
      <video:description>Learn hacking (ad): https://www.hextree.io

We talk to Manfred Paul and learn about his research process. We also dive into the technical details about his JIT bug and learn about the optimization he exploited.

part 1: https://www.youtube.com/watch?v=YQEq5s4SRxY
part 2: https://www.youtube.com/watch?v=uXW_1hepfT4
part 3: https://www.youtube.com/watch?v=NT1VCmJF3mU
part 4: https://www.youtube.com/watch?v=x4CUAuwoZVk

(Spoilers) Firefox Security Response to pwn2own 2025: https://blog.mozilla.org/security/2025/05/17/firefox-security-response-to-pwn2own-2025/

=[ ❤️ Support ]=

→ My courses: https://www.hextree.io/
→ My font: https://shop.liveoverflow.com/
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ LinkedIn: https://www.linkedin.com/in/liveoverflow
→ X / Twitter: https://x.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Streaming: https://twitch.tv/LiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Blog: https://liveoverflow.com/</video:description>
      <video:player_loc>https://www.youtube.com/embed/NT1VCmJF3mU</video:player_loc>
      <video:publication_date>2026-03-17T14:43:56.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1214</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14768/the-first-exploit-pwn2own-documentary-part-2</loc>
    <lastmod>2026-03-17T14:43:42.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/uXW_1hepfT4/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>The First Exploit  - Pwn2Own Documentary (Part 2)</video:title>
      <video:description>Learn hacking (ad): https://www.hextree.io

What happens in the Pwn2Own disclosure room? Let&apos;s find out in part 2 of my short documentary about how Mozilla fixes 0days.

part 1: https://www.youtube.com/watch?v=YQEq5s4SRxY
part 2: https://www.youtube.com/watch?v=uXW_1hepfT4
part 3: https://www.youtube.com/watch?v=NT1VCmJF3mU
part 4: https://www.youtube.com/watch?v=x4CUAuwoZVk

(Spoilers) Firefox Security Response to pwn2own 2025: https://blog.mozilla.org/security/2025/05/17/firefox-security-response-to-pwn2own-2025/


=[ ❤️ Support ]=

→ My courses: https://www.hextree.io/
→ My font: https://shop.liveoverflow.com/
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ LinkedIn: https://www.linkedin.com/in/liveoverflow
→ X / Twitter: https://x.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Streaming: https://twitch.tv/LiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Blog: https://liveoverflow.com/</video:description>
      <video:player_loc>https://www.youtube.com/embed/uXW_1hepfT4</video:player_loc>
      <video:publication_date>2026-03-17T14:43:42.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>910</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14767/the-world-s-hardest-hacking-competition-pwn2own-documentary-part-1</loc>
    <lastmod>2026-03-17T14:43:30.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/YQEq5s4SRxY/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>The World&apos;s Hardest Hacking Competition - Pwn2Own Documentary (Part 1)</video:title>
      <video:description>Learn hacking (ad): https://www.hextree.io

Pwn2Own 2025 was happening in Berlin and I got the opportunity to follow Mozilla into the disclosure room and document how Mozilla fixes critical vulnerabilities.

part 1: https://www.youtube.com/watch?v=YQEq5s4SRxY
part 2: https://www.youtube.com/watch?v=uXW_1hepfT4
part 3: https://www.youtube.com/watch?v=NT1VCmJF3mU
part 4: https://www.youtube.com/watch?v=x4CUAuwoZVk

(Spoilers) Firefox Security Response to pwn2own 2025: https://blog.mozilla.org/security/2025/05/17/firefox-security-response-to-pwn2own-2025/

Sorry for the long delay of this video... Permiere Pro hated me in this project and 2025 was a shit year.

=[ ❤️ Support ]=

→ My courses: https://www.hextree.io/
→ My font: https://shop.liveoverflow.com/
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ LinkedIn: https://www.linkedin.com/in/liveoverflow
→ X / Twitter: https://x.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Streaming: https://twitch.tv/LiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Blog: https://liveoverflow.com/</video:description>
      <video:player_loc>https://www.youtube.com/embed/YQEq5s4SRxY</video:player_loc>
      <video:publication_date>2026-03-17T14:43:30.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>866</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14766/from-zero-to-zero-day-and-beyond-life-of-a-hacker-jonathan-jacobi</loc>
    <lastmod>2026-03-17T14:43:14.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/BOLN_B0qnZk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>From Zero to Zero Day (and beyond) - Life of a Hacker: Jonathan Jacobi</video:title>
      <video:description>I met Jonathan in 2018 at the CCC when he was just 18 years old. Back then he referenced my videos which had a little bit of impact on his life. Now a lot of time has passed and in this interview I want to get to know Jonathan better. How did he get into hacking, founding of the CTF team perfect blue, working as a vulnerability researcher and ultimately transitioning into a new career.

From Zero to Zero Day (2018): https://www.youtube.com/watch?v=xp1YDOtWohw
Jonathan on Twitter: https://x.com/j0nathanj

00:00:00 - How we met
00:02:16 - Jonathan&apos;s early life
00:04:24 - Going to college as a teenager
00:18:52 - Meeting like-minded people in CTF
00:27:29 - Getting first VR internship at Checkpoint
00:32:34 - Creating opportunities through networking
00:43:40 - Working at Microsoft Security Response Center (MSRC)
00:51:23 - Mandatory military service
00:58:33 - Moving from hacking to building teams
01:08:26 - Joining a startup
01:17:56 - From Computers to Humans
01:23:20 - Summary

=[ ❤️ Support / Ads ]=

→ My courses: https://www.hextree.io/
→ My font: https://shop.liveoverflow.com/
→ Support per video: https://www.patreon.com/join/liveoverflow
→ Support per month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ LinkedIn: https://www.linkedin.com/in/liveoverflow
→ X / Twitter: https://x.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Streaming: https://twitch.tv/LiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Blog: https://liveoverflow.com/</video:description>
      <video:player_loc>https://www.youtube.com/embed/BOLN_B0qnZk</video:player_loc>
      <video:publication_date>2026-03-17T14:43:14.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>5204</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14765/the-german-hacking-championship</loc>
    <lastmod>2026-03-17T14:43:01.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/f0C3RH7baEw/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>The German Hacking Championship</video:title>
      <video:description>An amazing event for aspiring German hackers is happening right now. I went to the finals in 2024, share a few impressions and tell you about this year&apos;s event.

Learn hacking: https://www.hextree.io/ (ad)

CSCG 2025 runs from 1. March 2025 until 1. May 2025
Rules: https://play.cscg.live/rules
Die Hacking Meisterschaft: https://hacking-meisterschaft.de/
NFITS: https://nfits.de/spenden/
European Cybersecurity Challenge: https://ecsc.eu/

00:00 - Intro DHM 2024
00:52 - CTF Teams vs. CSCG Teams
01:48 - Sponsor Challenges
03:04 - My CSCG History
04:18 - NFITS
05:06 - Die Deutsche Hacking Meisterschaft (DHM)
07:00 - Take the Opportunity!
07:47 - Outro

=[ ❤️ Support ]=

→ My courses: https://www.hextree.io/
→ My font: https://shop.liveoverflow.com/
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ LinkedIn: https://www.linkedin.com/in/liveoverflow
→ X / Twitter: https://x.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Streaming: https://twitch.tv/LiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Blog: https://liveoverflow.com/</video:description>
      <video:player_loc>https://www.youtube.com/embed/f0C3RH7baEw</video:player_loc>
      <video:publication_date>2026-03-17T14:43:01.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>500</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14764/do-you-know-this-common-go-vulnerability</loc>
    <lastmod>2026-03-17T14:42:46.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/wVknDjTgQoo/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Do you know this common Go vulnerability?</video:title>
      <video:description>When auditing code it&apos;s crucial to know about common issues. In this video we explore a Go issue that I was not aware of.
Learn hacking on https://www.hextree.io/ (ad)

38c3 CTF - Fajny Jagazyn Wartości Kluczy: 
https://2024.ctf.link/internal/challenge/fb03748d-7e94-4ca2-8998-a5e0ffcbd761/

Unintended solution: https://msanft.foo/blog/hxp-38c3-web-fajny-jagazyn/
Challenge author writeup: https://hxp.io/blog/114/hxp-38C3-CTF-Fajny-Jagazyn-Wartoci-Kluczy/

VSCode Go debugger client code: https://github.com/golang/vscode-go/blob/39786ea90f18ab98f75d091b9a04367d1b1df82c/extension/src/debugAdapter/goDebug.ts#L1557

00:00 - Intro
00:20 - Go gjson vs json behavior
01:33 - Overview CTF challenge &quot;Fajny Jagazyn Wartości Kluczy&quot;
04:33 - Weird server setup?
05:55 - Arbitrary file read
07:00 - /proc filesystem trick
08:01 - Unintended solution
09:14 - What was the intended solution?
12:58 - Exploiting Go race condition
13:58 - Outro

=[ ❤️ Support ]=

→ My courses: https://www.hextree.io/
→ My font: https://shop.liveoverflow.com/
→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ LinkedIn: https://www.linkedin.com/in/liveoverflow
→ X / Twitter: https://x.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Streaming: https://twitch.tv/LiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Blog: https://liveoverflow.com/</video:description>
      <video:player_loc>https://www.youtube.com/embed/wVknDjTgQoo</video:player_loc>
      <video:publication_date>2026-03-17T14:42:46.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>908</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14763/google-s-mobile-vrp-behind-the-scenes-with-kristoffer-blasiak-hextree-podcast-ep</loc>
    <lastmod>2026-03-17T14:42:34.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/SyTy1uZgx8E/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Google&apos;s Mobile VRP Behind the Scenes with Kristoffer Blasiak (Hextree Podcast Ep.1)</video:title>
      <video:description>&quot;There are not that many people that do Android research [...] There is no lack of targets. If people would actually look, there is lots to it. The scope is huge.&quot; - This is a conversation with Kristoffer Blasiak about Google&apos;s Mobile Vulnerability Rewards Program (VRP). 

Learn Android Hacking (ad): https://hextree.io/hextree-x-google
Mobile VRP: https://bughunters.google.com/about/rules/android-friends/6618732618186752/google-mobile-vulnerability-reward-program-rules

00:00 - Introducing Kristoffer and Mobile VRP
01:38 - What happens when you submit a bug
05:07 - Android app bug bounty opportunities
08:38 - &quot;There is no lack of targets&quot;
13:06 - The side-loading threat model
17:00 - Bugs in Android app vs. web app 
23:30 - Hextree sponsored by Google

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/SyTy1uZgx8E</video:player_loc>
      <video:publication_date>2026-03-17T14:42:34.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1447</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14762/my-theory-on-how-the-webp-0day-was-discovered-short</loc>
    <lastmod>2026-03-17T14:42:22.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/CS128zYJSmw/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>My theory on how the webp 0day was discovered #short</video:title>
      <video:description>Want to learn more about hacking? Checkout our courses on https://www.hextree.io (ad)

I have spent many hours looking at the webp vulnerability used in the 0day attack against iPhones. In the past videos we have seen why fuzzers have a hard time finding the issue, so I wanted to understand how this was discovered. And I think I have a good theory!

Part 1: Huffman Tables https://youtu.be/lAyhKaclsPM
Part 2: Fuzzing libwebp https://youtu.be/PJLWlmp8CDM

Sources:
https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/
https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html
https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html
https://googleprojectzero.blogspot.com/2021/01/a-look-at-imessage-in-ios-14.html
https://github.com/seemoo-lab/frida-scripts/blob/main/scripts/libdispatch.js
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
https://citizenlab.ca/2023/04/nso-groups-pegasus-spyware-returns-in-2022/
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
https://github.com/libjxl/libjxl/blob/4b9dbde293f7f282b6952a02340300abfca2b184/lib/jxl/huffman_table.cc#L51
https://github.com/webmproject/libwebp/blob/7861947813b7ea02198f5d0b46afa5d987b797ae/src/dec/vp8l_dec.c#L86C3-L86C76
https://github.com/Tencent/mars/blob/9ab46e19ed3d4fcafe9d0de4b36547321f5ead83/mars/comm/windows/zlib/inftrees.h#L41
https://github.com/google/brunsli/blob/master/c/enc/jpeg_huffman_decode.h#L20

00:00 - Intro
01:18 - The iPhone Remote Attack Surface
02:49 - Targeting iMessage
04:04 - Dangerous Parsing / BlastDoor
06:53 - Image I/O and libwebp
08:11 - A Pattern of Image Vulnerabilities
09:28 - Huffman Tables are Everywhere!
10:50 - My Theory: known issue with enough.c
13:50 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/Liv</video:description>
      <video:player_loc>https://www.youtube.com/embed/CS128zYJSmw</video:player_loc>
      <video:publication_date>2026-03-17T14:42:22.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>60</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14761/my-theory-on-how-the-webp-0day-was-discovered-blastpass</loc>
    <lastmod>2026-03-17T14:42:09.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/_ACCK0AUQ8Q/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>My theory on how the webp 0day was discovered (BLASTPASS)</video:title>
      <video:description>Want to learn more about hacking? Checkout our courses on https://www.hextree.io (ad)

I have spent many hours looking at the webp vulnerability used in the 0day attack against iPhones. In the past videos we have seen why fuzzers have a hard time finding the issue, so I wanted to understand how this was discovered. And I think I have a good theory!

Part 1: Huffman Tables https://youtu.be/lAyhKaclsPM
Part 2: Fuzzing libwebp https://youtu.be/PJLWlmp8CDM

Sources:
https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/
https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html
https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html
https://googleprojectzero.blogspot.com/2021/01/a-look-at-imessage-in-ios-14.html
https://github.com/seemoo-lab/frida-scripts/blob/main/scripts/libdispatch.js
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
https://citizenlab.ca/2023/04/nso-groups-pegasus-spyware-returns-in-2022/
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
https://github.com/libjxl/libjxl/blob/4b9dbde293f7f282b6952a02340300abfca2b184/lib/jxl/huffman_table.cc#L51
https://github.com/webmproject/libwebp/blob/7861947813b7ea02198f5d0b46afa5d987b797ae/src/dec/vp8l_dec.c#L86C3-L86C76
https://github.com/Tencent/mars/blob/9ab46e19ed3d4fcafe9d0de4b36547321f5ead83/mars/comm/windows/zlib/inftrees.h#L41
https://github.com/google/brunsli/blob/master/c/enc/jpeg_huffman_decode.h#L20

00:00 - Intro
01:18 - The iPhone Remote Attack Surface
02:49 - Targeting iMessage
04:04 - Dangerous Parsing / BlastDoor
06:53 - Image I/O and libwebp
08:11 - A Pattern of Image Vulnerabilities
09:28 - Huffman Tables are Everywhere!
10:50 - My Theory: known issue with enough.c
13:50 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/Liv</video:description>
      <video:player_loc>https://www.youtube.com/embed/_ACCK0AUQ8Q</video:player_loc>
      <video:publication_date>2026-03-17T14:42:09.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>903</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14760/learn-android-hacking-university-nevada-las-vegas-2024</loc>
    <lastmod>2026-03-17T14:41:54.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/fPt6fJDjKKM/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Learn Android Hacking! - University Nevada, Las Vegas (2024)</video:title>
      <video:description>During DEF CON and Black Hat, Google invited me to give a talk about Android hacking to students as part of init.g at the University Nevada, Las Vegas. In this talk I share my &quot;trick&quot; how to get into Android hacking and reverse engineering, which can also be adapted to any other topic.

Learn android hacking (ad): https://app.hextree.io/map/android

Watch my Vegas Vlog: https://www.youtube.com/watch?v=bhQ6FF3fCdA

Article about the init.g event: https://www.unlv.edu/announcement/academics/google-sponsors-initgvegas-student-event-unlv-during-defcon

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/fPt6fJDjKKM</video:player_loc>
      <video:publication_date>2026-03-17T14:41:54.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1391</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14759/my-trip-to-las-vegas-for-defcon-black-hat</loc>
    <lastmod>2026-03-17T14:41:38.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/bhQ6FF3fCdA/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>My Trip to Las Vegas for DEFCON &amp; Black Hat</video:title>
      <video:description>My second time in Las Vegas for DEF CON and Black Hat. Lots has changed since I have been here 6 years ago. This trip was quite emotional for me and I am so grateful for the experience. Hope to meet you all again.

Learn hacking (ad): https://app.hextree.io/
Buy our Faultier (US): https://1bitsquared.com/collections/embedded-hardware/products/faultier

Google x Hextree Android Courses: https://www.hextree.io/hextree-x-google
Raspberry Pi Hacking Challenge: https://www.hextree.io/rp2350
Embedded System Village: https://embeddedvillage.org/

My previous DEF CON 26 (6 years ago) Vlog:
- https://youtu.be/B8saYocsI-U
- https://www.youtube.com/watch?v=RXgp4cDbiq4

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/bhQ6FF3fCdA</video:player_loc>
      <video:publication_date>2026-03-17T14:41:38.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1595</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14758/finding-the-webp-vulnerability-in-8s-fuzzing-with-afl</loc>
    <lastmod>2026-03-17T14:41:22.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/PJLWlmp8CDM/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Finding The .webp Vulnerability in 8s (Fuzzing with AFL++)</video:title>
      <video:description>A guide on how to do fuzzing with AFL++ in an attempt to rediscover the libwebp vulnerability CVE-2023-4863 that was used to hack iPhones.

Want to learn hacking? Signup to https://hextree.io (ad)
Buy my shitty font: https://shop.liveoverflow.com/ (ad)

Watch webp Part 1: https://www.youtube.com/watch?v=lAyhKaclsPM

Sudo Vulnerability Series: https://www.youtube.com/playlist?list=PLhixgUqwRTjy0gMuT4C3bmjeZjuNQyqdx
Docker Video: https://www.youtube.com/watch?v=-YnMr1lj4Z8

OSS-Fuzz: https://github.com/google/oss-fuzz
OSS-Fuzz libwebp coverage: https://storage.googleapis.com/oss-fuzz-coverage/libwebp/reports/20230901/linux/src/libwebp/src/utils/report.html
AFLplusplus: https://github.com/AFLplusplus/AFLplusplus/blob/stable/docs/fuzzing_in_depth.md
vanhauser&apos;s blog: https://www.srlabs.de/blog-post/advanced-fuzzing-unmasks-elusive-vulnerabilities
vanhauser/thc on twitter: https://twitter.com/hackerschoice
AFLpluslus Persistent Mode: https://github.com/AFLplusplus/AFLplusplus/blob/0c054f520eda67b7bb15f95ca58c028e9b68131f/instrumentation/README.persistent_mode.md
Grab the code: https://github.com/LiveOverflow/webp-CVE-2023-4863

=[ ❤️ Support ]=

Find out how you can support LiveOverflow: https://liveoverflow.com/support/

=[ 🐕 Social ]=

→ 2nd Channel: https://www.youtube.com/LiveUnderflow
→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/

Chapters:
00:00 - Intro
00:36 - How to Learn About Fuzzing?
02:36 - Setting Up Fuzzing With AFL++
04:53 - My Docker Workflow for Fuzzing
06:35 - AFL++ Different Coverage Strategies
09:50 - Start the libwebp Fuzzing Campaign
11:58 - Adjusting the Fuzzer
13:45 - Why Don&apos;t We Find a Crash?
15:49 - Fuzzing with AFL++ Persistent Mode
19:47 - Persistent Mode Fuzzing Results
20:46 - Finding the Vulnerability in 8s</video:description>
      <video:player_loc>https://www.youtube.com/embed/PJLWlmp8CDM</video:player_loc>
      <video:publication_date>2026-03-17T14:41:22.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1451</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14757/a-vulnerability-to-hack-the-world-cve-2023-4863</loc>
    <lastmod>2026-03-17T14:41:07.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/lAyhKaclsPM/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>A Vulnerability to Hack The World - CVE-2023-4863</video:title>
      <video:description>Citizenlab discovered BLASTPASS, a 0day being actively exploited in the image format WebP. Known as CVE-2023-4863 and CVE-2023-41064, an issue in webp&apos;s build huffman table function can lead to a heap buffer overflow. This vulnerability is very interesting and I&apos;m excited to share with you what I learned.

Want to learn hacking? Signup to https://hextree.io (ad)
Buy my shitty font: https://shop.liveoverflow.com/ (ad)

WebP Fix Commit: https://chromium.googlesource.com/webm/libwebp/+/902bc9190331343b2017211debcec8d2ab87e17a
Citizenlab: https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/
Ben Hawkes: https://blog.isosceles.com/the-webp-0day/

Software Updates
Apple https://support.apple.com/en-gb/106361
Chrome https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html
Firefox https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/
Android https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/
Whose CVE is it Anyway? https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/

References:
2014 bug introduction https://github.com/webmproject/libwebp/commit/f75dfbf23d1df1be52350b1a6fc5cfa6c2194499
https://www.youtube.com/watch?v=JsTptu56GM8
https://www.youtube.com/watch?v=B3y0RsVCyrw
https://www.youtube.com/watch?v=EFUYNoFRHQI
https://www.youtube.com/watch?v=iEm1NRyEe5c
https://stackoverflow.com/questions/13804629/huffman-code-with-lookup-table
https://web.archive.org/web/20230204211844/https://commandlinefanatic.com/cgi-bin/showarticle.cgi?article=art007
enough.c https://github.com/madler/zlib/blob/develop/examples/enough.c

Thanks to:
https://twitter.com/mistymntncop
https://twitter.com/benhawkes


Chapters:
00:00 - Intro to CVE-2023-4863
01:32 - Most Valuable Vulnerability?
03:02 - Heap Overflow Related to Huffman Trees
03:58 - Learning about Huffman Codes
06:24 - What are Huffman Tables?
10:24 - Hardcoded Table Sizes (enough.c)
12:21 - Code Walkthrough - BuildHuffmanTable()
13:04 - The code_lengths[] and count[] Arrays</video:description>
      <video:player_loc>https://www.youtube.com/embed/lAyhKaclsPM</video:player_loc>
      <video:publication_date>2026-03-17T14:41:07.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1080</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14756/reinventing-web-security</loc>
    <lastmod>2026-03-17T14:40:52.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/LxUAnZY_08o/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Reinventing Web Security</video:title>
      <video:description>Follow me down the rabbit hole into the wonderful world of IT security.

Buy my terrible font (ad): https://shop.liveoverflow.com
Learn hacking (ad): https://hextree.io

Related Videos:
https://www.youtube.com/watch?v=866olNIzbrk
https://www.youtube.com/watch?v=lKzsNp4AveY

Tweets:
https://twitter.com/LiveOverflow/status/1720734431659376995
https://twitter.com/LiveOverflow/status/1720799912181284864
https://twitter.com/LiveOverflow/status/1721493232310214910

Understanding the Risks of Stolen Credentials: https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/46437.pdf

Chapters:
00:00 - Intro
00:40 - Security Terminology
01:38 - Direct Database Access
03:40 - Introducing a Security Boundary
05:36 - Typical Web Security Vulnerabilities
07:03 - Clear-text Passwords in Database
09:28 - Security Weakness vs. Vulnerability
11:05 - Effective Mitigations
13:03 - Useless Mitigations
16:37 - Summary: Vulnerability vs. Weakness
19:00 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/LxUAnZY_08o</video:player_loc>
      <video:publication_date>2026-03-17T14:40:52.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1237</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14755/the-circle-of-unfixable-security-issues</loc>
    <lastmod>2026-03-17T14:39:53.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/lr1KuL8OmJY/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>The Circle of Unfixable Security Issues</video:title>
      <video:description>Not every security issues can be fixed. There exist (what I call) &quot;unfixable&quot; bugs, where you can always argue and shift the goal posts. The idea is to only report these kind of issues to create an endless stream of bug bounty money!

Buy my terrible font (ad): https://shop.liveoverflow.com
Learn hacking (ad): https://hextree.io

What is a vulnerability? https://www.youtube.com/watch?v=866olNIzbrk

hackerone reports:
https://hackerone.com/reports/812754
https://hackerone.com/reports/6883
https://hackerone.com/reports/223337
https://hackerone.com/reports/819930
https://hackerone.com/reports/224460
https://hackerone.com/reports/160109
https://hackerone.com/reports/557154

OWASP: https://owasp.org/www-community/controls/Blocking_Brute_Force_Attacks

Chapters:
00:00 - Intro
00:30 - Denial of Service with loooong passwords
03:18 - Invalid vs. Valid DoS Reports
05:11 - Deployment Differences
06:54 - Denial of Service vs. Bruteforce Protection
09:27 - IP Rate-Limiting &quot;fix&quot;
12:06 - Locking User Accounts?
13:59 - The Circle of Unfixable Security Issues
15:25 - Vulnerability vs. Weakness
16:49 - The Cybersecurity Industry
19:03 - Conclusion: Cybersecurity vs. Hacking
21:34 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/lr1KuL8OmJY</video:player_loc>
      <video:publication_date>2026-03-17T14:39:53.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1333</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14754/hacker-tweets-explained</loc>
    <lastmod>2026-03-17T14:39:40.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/3zShGLEqDn8/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Hacker Tweets Explained</video:title>
      <video:description>Let me explain to you what you can learn from these tweets. Did you know the name trick?

Buy my terrible font (ad): https://shop.liveoverflow.com
Learn hacking (ad): https://hextree.io

Quote Tweet: https://twitter.com/avlidienbrunn/status/1697869590569582932
Original Tweet: https://twitter.com/Rhynorater/status/1696862832841916679
Critical Thinking Podcast: https://www.criticalthinkingpodcast.io/
XSS Origin Series: https://www.youtube.com/playlist?list=PLhixgUqwRTjyakFK7puB3fHVfXMinqMSi

Chapters:
00:00 - Intro
00:37 - Tweets About Tricky XSS
01:24 - XSS Testbed Setup with php
03:45 - Exploring the XSS Context
05:24 - The window Object
06:46 - Tweet 1: Justin&apos;s XSS Explained
08:22 - Tweet 2: Mathias&apos;s Variant With Object
09:52 - Tweet 2: Mathias&apos;s Variant Creating Class
10:30 - The window.name Trick
12:00 - Closing Script Tag XSS
12:28 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/3zShGLEqDn8</video:player_loc>
      <video:publication_date>2026-03-17T14:39:40.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>827</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14753/zenbleed-cve-2023-20593</loc>
    <lastmod>2026-03-17T14:39:27.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/9EY_9KtxyPg/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Zenbleed (CVE-2023-20593)</video:title>
      <video:description>Let&apos;s explore the &quot;most exciting&quot; CPU vulnerability affecting Zen2 CPUs from AMD.
Watch part 1 about fuzzing: https://www.youtube.com/watch?v=neWc0H1k2Lc

buy my font (advertisement): https://shop.liveoverflow.com/

This video is sponsored by Google: https://security.googleblog.com/2023/08/downfall-and-zenbleed-googlers-helping.html

Original Zenbleed Writeup: https://lock.cmpxchg8b.com/zenbleed.html
Grab the code: https://github.com/google/security-research/tree/master/pocs/cpus/zenbleed
cvtsi2ss: https://www.felixcloutier.com/x86/cvtsi2ss.html
AMD Security Bulletin: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html
RIDL Video: https://www.youtube.com/watch?v=x_R1DeZxGc0
Tavis Ormandy: https://twitter.com/taviso

Chapters:
00:00 - Intro
02:27 - zenleak.asm Patterns
03:56 - The C Exploit Code
05:20 - Assembly Generation with Compiler Preprocessor
07:40 - What are XMM and YMM Registers?
11:56 - Zenbleed: Trigger Merge Optimization
14:28 - Register File &amp; Register Allocation Table
16:39 - Register Renaming
17:55 - Speculative Execution
18:55 - vzeroupper and SSE &amp; AVX History
21:22 - Zenbleed Explanation
23:55 - How to fix Zenbleed?

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/9EY_9KtxyPg</video:player_loc>
      <video:publication_date>2026-03-17T14:39:27.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1606</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14752/the-discovery-of-zenbleed-ft-tavis-ormandy</loc>
    <lastmod>2026-03-17T14:39:13.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/neWc0H1k2Lc/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>The Discovery of Zenbleed ft. Tavis Ormandy</video:title>
      <video:description>How did Tavis Ormandy fuzz CPUs to discover Zenbleed? In this video we learn about the techniques to make this work!

Watch part 2: https://www.youtube.com/watch?v=9EY_9KtxyPg

buy my font (advertisement): https://shop.liveoverflow.com/

This video is sponsored by Google: https://security.googleblog.com/2023/08/downfall-and-zenbleed-googlers-helping.html

Original Zenbleed Writeup: https://lock.cmpxchg8b.com/zenbleed.html

AMD Security Bulletin: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html
Tavis Ormandy: https://twitter.com/taviso
Sudoedit Exploit Series: https://www.youtube.com/playlist?list=PLhixgUqwRTjy0gMuT4C3bmjeZjuNQyqdx
Documented Intel Performance Counters: https://perfmon-events.intel.com/skylake_server.html
RIDL Video: https://www.youtube.com/watch?v=x_R1DeZxGc0

Chapters:
00:00 - Intro
01:22 - Zenbleed Proof of Concept
03:06 - Tavis Ormandy
04:18 - How Fuzzing Works
06:31 - CPU Performance Counters
11:06 - Detect Bugs with &quot;Oracle Serialization&quot;
15:09 - Fuzzing and Discovering Zenbleed
18:46 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/neWc0H1k2Lc</video:player_loc>
      <video:publication_date>2026-03-17T14:39:13.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1183</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14751/asking-android-developers-about-security-at-droidcon-berlin</loc>
    <lastmod>2026-03-17T14:39:01.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/-X03UKo_obE/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Asking Android Developers About Security at Droidcon Berlin</video:title>
      <video:description>I attended droidcon Berlin 2023 and interviewed some developers about what they know about Android security. Thanks again to everybody who answered my questions, and thanks Egidijus for the dcbln23 ticket.

Buy the terrible font (advertisement): https://shop.liveoverflow.com/

Watch my security conference vlog: https://www.youtube.com/watch?v=E9kz6RQu9Oc&amp;list=PLhixgUqwRTjw6IUB0ozIglXYRH1dPbEkw&amp;index=2

Egidijus on Twitter: https://twitter.com/AegisLil
droidcon: https://www.droidcon.com/events/droidcon-berlin-2023/

Chapters:
00:00 - Intro
00:37 - Meet Egidijus
00:57 - The Plan for Today
02:00 - Developer Interviews
05:54 - How To Become a Security Researcher?
07:24 - Conclusion After Interviews
09:21 - My Conference Experience
10:55 - Conference Day 2
13:30 - Conference Day 3
16:34 - Some Final Thoughts

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/-X03UKo_obE</video:player_loc>
      <video:publication_date>2026-03-17T14:39:01.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1089</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14750/local-root-exploit-in-hospitalrun-software</loc>
    <lastmod>2026-03-17T14:38:47.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/duLJUpptSik/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Local Root Exploit in HospitalRun Software</video:title>
      <video:description>Let&apos;s talk about a &quot;security flaw in hospital software that allows full access to medical devices&quot;. This issue was disclosed on LinkedIn and included a full exploit code. Let&apos;s use this app as an example on how to find a macOS privilege escalation and learn how local root exploits can work.
Print BINGO sheet: https://twitter.com/liveoverflow/status/1682650394227351552


Sources:
Original LinkedIn Post: https://web.archive.org/web/20230424004137/https://www.linkedin.com/posts/jeanpereira00_sicherheitsl%C3%BCcke-in-krankenhaus-software-activity-7055185115584303104-2eZr
The Exploit code: https://0day.today/exploit/38531
&quot;The project has been deprecated for 2 years. Version 1.0.0-beta has been an EOL for at least 5 years&quot; - developer statement: https://twitter.com/tehkapa/status/1650059269939552256

My references finding priv esc issues in macOS apps:
https://github.com/cure53/Publications/blob/master/summary-report_tunnelbear.pdf
https://github.com/cure53/Publications/blob/master/summary-report_tunnelbear_2018.pdf
https://github.com/cure53/Publications/blob/master/summary-report_tunnelbear_2019.pdf
https://github.com/cure53/Publications/blob/master/pentest-report_IVPN.pdf

Help me pay for any legal trouble in case somebody wants to sue me (advertisement): https://shop.liveoverflow.com/

Chapters:
00:00 - Intro: Practice Research with Existing Issues 
01:45 - HospitalRun Functionality
03:07 - What is a Local Root Exploit?
05:49 - Typical macOS Priviledge Escalation Issues
09:23 - Looking for Priviledged Helper in HospitalRun
10:10 - My Experience in finding Local Root Exploits on macOS
11:46 - Threat Modeling and Common Deployments
13:11 - Was this an April Fools Joke?
14:18 - Analysing and Cleaning Up The Exploit Code
17:51 - Reading Comments on LinkedIn
19:29 - BINGO!

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/L</video:description>
      <video:player_loc>https://www.youtube.com/embed/duLJUpptSik</video:player_loc>
      <video:publication_date>2026-03-17T14:38:47.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1248</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14749/android-app-bug-bounty-secrets</loc>
    <lastmod>2026-03-17T14:38:36.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/nxlm7pIvMdg/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Android App Bug Bounty Secrets</video:title>
      <video:description>Sergey Toshin tells us the story of how he became a top Android bug hunter and how he finds critical vulnerabilities. He also shows us a really cool vulnerability found in the Google Android Snapseed app. I didn&apos;t know this crazy attack vector exists!

Start Android Bug Hunting Here! Google App Scan Results: https://bughunters.google.com/report/targets/290590452

Google Mobile VRP: https://bughunters.google.com/about/rules/6618732618186752/google-mobile-vulnerability-reward-program-rules
Oversecured Blog: https://blog.oversecured.com/
Verify the output of tools: https://bughunters.google.com/learn/improving-your-reports/avoiding-mistakes/5981856648134656/verify-the-output-of-the-tools

More Bug Bounty Videos: https://www.youtube.com/playlist?list=PLhixgUqwRTjxKYsPTegCyL5adZaq5eILt
More Mobile Security: https://www.youtube.com/playlist?list=PLhixgUqwRTjxHFDl0OykeqZ-VvnClfDpT

Chapters:
00:00 - Intro
00:57 - Meet Sergey Toshin (Oversecured)
02:51 - How Oversecured Started
04:42 - Verify The Output of Tools!
07:17 - First Look at Vulnerability
09:58 - 1. Explained: Android Intents
11:25 - 2. Explained: Content Providers
12:51 - 3. Explained: App Permissions
13:34 - Exploit Walkthrough
16:17 - Proof of Concept and Report
17:15 - Android VRP Rewards
18:32 - Start Hunting for Bugs in Google Apps!

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/nxlm7pIvMdg</video:player_loc>
      <video:publication_date>2026-03-17T14:38:36.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1214</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14748/generic-html-sanitizer-bypass-investigation</loc>
    <lastmod>2026-03-17T14:38:24.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/HUtkW2gjC8Q/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Generic HTML Sanitizer Bypass Investigation</video:title>
      <video:description>I stumbled over a weird HTML behavior on Twitter and started to investigate it. Did I just stumble over a generic HTML Sanitizer bypass?

Get my handwritten font https://shop.liveoverflow.com (advertisement)
Checkout our courses on https://hextree.io (advertisement)

The Tweet: https://twitter.com/MRCodedBrain/status/1662701541680136195
Google XSS: https://www.youtube.com/watch?v=lG7U3fuNw3A
HTML Spec: https://html.spec.whatwg.org/multipage/parsing.html#parse-error-invalid-first-character-of-tag-name

Chapters:
00:00 - Intro
01:09 - Sanitizing vs. Encoding
02:32 - Developing HTML Sanitizer Bypass
05:03 - Attacking DOMPurify
07:08 - Attacking Server-side Sanitizer
08:31 - HTML Parse Error Specification
10:08 - Potential Impact
11:55 - hextree.io

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/HUtkW2gjC8Q</video:player_loc>
      <video:publication_date>2026-03-17T14:38:24.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>845</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14747/hacking-google-cloud</loc>
    <lastmod>2026-03-17T14:38:11.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/uOvizKc1WZY/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Hacking Google Cloud?</video:title>
      <video:description>Every year Google celebrates the best security issues found in Google Cloud. This year we take a look at the 7 winners to see if we could have found these issues too. Will I regret not having hacked Google last year?

This video is sponsored by Google VRP:
Follow GoogleVRP Twitter: https://twitter.com/GoogleVRP

The GCP Prize Winners of 2022:
https://security.googleblog.com/2023/06/google-cloud-awards-313337-in-2022-vrp.html

1. Prize - $133,337: Yuval Avrahami https://unit42.paloaltonetworks.com/gke-autopilot-vulnerabilities/
2. Prize - $73,331: Sivanesh Ashok and Sreeram KL https://blog.stazot.com/ssh-key-injection-google-cloud/
3. Prize - $31,337: Sivanesh Ashok and Sreeram KL https://blog.stazot.com/auth-bypass-in-google-cloud-workstations/
4. Prize - $31,311: Sreeram KL and Sivanesh Ashok https://blog.geekycat.in/client-side-ssrf-to-google-cloud-project-takeover/
5. Prize - $17,311: Yuval Avrahami and Shaul Ben Hai https://www.paloaltonetworks.com/resources/whitepapers/kubernetes-privilege-escalation-excessive-permissions-in-popular-platforms Talk: https://www.youtube.com/watch?v=PGsJ4QTlKlQ
6. Prize - $13,373: Obmi https://obmiblog.blogspot.com/2022/12/gcp-2022-few-bugs-in-google-cloud-shell.html
7. Prize - $13,337: Bugra Eskici https://bugra.ninja/posts/cloudshell-command-injection/

Previous Winners:
GPC Prize 2019: https://www.youtube.com/watch?v=J2icGMocQds
GPC Prize 2020: https://www.youtube.com/watch?v=g-JgA1hvJzA
GPC Prize 2021: https://www.youtube.com/watch?v=GvO2Xtx8p9w

Chapters:
00:00 - Intro
01:28 - Python Command Injection (Prize 7)
03:01 - XSS, CSRF and NEL Backdoor (Prize 6)
07:04 - Excessive Permissions in k8s DaemonSets (Prize 5)
09:13 - SSRF auth Authorization Token (Prize 4)
10:46 - OAuth Issue (Prize 3)
12:07 - SSH authorized_key Injection (Prize 2)
14:45 - Kubernetes Engine Privilege Escalation (Prize 1)
18:11 - Discussing the Winner
19:25 - What did I learn from the GCP 2022?
20:51 - Outro

=[ ❤️ Support ]=

Get my handwritten font https://shop.liveoverflow.com (advertisement)
Checkout</video:description>
      <video:player_loc>https://www.youtube.com/embed/uOvizKc1WZY</video:player_loc>
      <video:publication_date>2026-03-17T14:38:11.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1319</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14746/trying-to-find-a-bug-in-wordpress</loc>
    <lastmod>2026-03-17T14:38:00.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/lLjgskJgaRU/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Trying to Find a Bug in WordPress</video:title>
      <video:description>I stumbled over some WordPress code involving caching. Immediately I had this idea about MD5 collision and how this could affect the implemented logic. I started going down a rabbit hole exploring the feasibility and eventually setting up a PHP debug environment. Only to realize that the idea was flawed from the start. So while this ends up being failed security research, we still learn a lot along the process.

Get my handwritten font https://shop.liveoverflow.com (advertisement)
Checkout our courses on https://hextree.io (advertisement)

Support these videos: https://liveoverflow.com/support/

---

get_page_by_path: https://developer.wordpress.org/reference/functions/get_page_by_path/
Hash Collision Overview: https://github.com/corkami/collisions#fastcoll-md5
MD5 Collision Demo: https://www.mscs.dal.ca/~selinger/md5collision/
Is there an ASCII only MD5 hash collision? https://twitter.com/LiveOverflow/status/1664280653519810563
Wordpress docker image with xdebug: https://github.com/wpdiaries/wordpress-xdebug
Debugging wordpress with xdebug: https://www.wpdiaries.com/wordpress-with-xdebug-for-docker/

What is a Server? https://www.youtube.com/watch?v=VXmvM2QtuMU

---

Chapters:
00:00 - Intro
00:36 - Finding the Research Topic
03:03 - Dumb Ideas Are NOT a Problem
03:40 - &quot;What happens with a MD5 Hash Collision?&quot;
04:38 - MD5 Hash Collision Feasibility
09:25 - WordPress Development Environment
11:18 - Debugging PHP
12:57 - Configuring xdebug
14:42 - Realizing the Research Idea was Flawed
15:58 - What we learned from the failed research
17:10 - hextree.io
17:47 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: http</video:description>
      <video:player_loc>https://www.youtube.com/embed/lLjgskJgaRU</video:player_loc>
      <video:publication_date>2026-03-17T14:38:00.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1087</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14745/authentication-bypass-using-root-array</loc>
    <lastmod>2026-03-17T14:37:45.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/2vAr9K5chII/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Authentication Bypass Using Root Array</video:title>
      <video:description>Lots of #bugbountytips get posted on twitter, but some of them are ... weird. Let&apos;s explore the technical details of one tweet to understand where this tip came from, why this tip was wrong, and eventually learn about the real underlaying vulnerability. This is a surprising turn of events!

advertisement:
Get my handwritten font https://shop.liveoverflow.com
Checkout our courses on https://hextree.io

Authentication Bypass Due to Empty Where Clause and SQL Injection in CodeIgniter https://liveoverflow.com/authentication-bypassing-in-codeigniter-due-to-empty-where-clause/

Thank you Eslam for sharing the details with us!
Follow Eslam on Twitter: https://twitter.com/eslam3kll

The #bugbountytips tweet: https://twitter.com/beginnbounty/status/1526795822687346688
Eslam&apos;s old post: https://infosecwriteups.com/authentication-bypass-using-root-array-4a179242b9f7
Eslam&apos;s new blog: https://eslam3kl.gitbook.io/blog/bug-hunting-findings/authentication-bypass-using-empty-parameters.
Day[0] Podcast: https://dayzerosec.com/vulns/2022/03/28/an-odd-authentication-bypass.html

Chapters:
00:00 - Intro
00:41 - The bugbountytips Tweet
01:21 - The Original Blog
02:43 - Talking to Eslam about the Happy Accident
04:36 - Digging Deeper
05:39 - Researching Login Code with Codeigniter
06:54 - Example Vulnerable Login Code
08:08 - Improving the Writeup
09:18 - Surprise SQL Injection!
11:37 - Conclusion
12:31 - hextree

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/2vAr9K5chII</video:player_loc>
      <video:publication_date>2026-03-17T14:37:45.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>804</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14744/defending-llm-prompt-injection</loc>
    <lastmod>2026-03-17T14:37:21.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/VbNPZ1n6_vY/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Defending LLM - Prompt Injection</video:title>
      <video:description>After we explored attacking LLMs, in this video we finally talk about defending against prompt injections. Is it even possible?

Buy my shitty font (advertisement): shop.liveoverflow.com

Watch the complete AI series:
https://www.youtube.com/playlist?list=PLhixgUqwRTjzerY4bJgwpxCLyfqNYwDVB

Language Models are Few-Shot Learners: https://arxiv.org/pdf/2005.14165.pdf
A Holistic Approach to Undesired Content Detection in the Real World: https://arxiv.org/pdf/2208.03274.pdf

Chapters:
00:00 - Intro
00:43 - AI Threat Model?
01:51 - Inherently Vulnerable to Prompt Injections
03:00 - It&apos;s not a Bug, it&apos;s a Feature!
04:49 - Don&apos;t Trust User Input
06:29 - Change the Prompt Design
08:07 - User Isolation
09:45 - Focus LLM on a Task 
10:42 - Few-Shot Prompt
11:45 - Fine-Tuning Model
13:07 - Restrict Input Length
13:31 - Temperature 0 
14:35 - Redundancy in Critical Systems
15:29 - Conclusion
16:21 - Checkout LiveOverfont

Hip Hop Rap Instrumental (Crying Over You) by christophermorrow
https://soundcloud.com/chris-morrow-3 CC BY 3.0
Free Download / Stream: http://bit.ly/2AHA5G9
Music promoted by Audio Library https://youtu.be/hiYs5z4xdBU

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/VbNPZ1n6_vY</video:player_loc>
      <video:publication_date>2026-03-17T14:37:21.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1032</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14743/accidental-llm-backdoor-prompt-tricks</loc>
    <lastmod>2026-03-17T14:37:11.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/h74oXb4Kk8k/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Accidental LLM Backdoor - Prompt Tricks</video:title>
      <video:description>In this video we explore various prompt tricks to manipulate the AI to respond in ways we want, even when the system instructions want something else. This can help us better understand the limitations of LLMs.

Get my font (advertisement): https://shop.liveoverflow.com

Watch the complete AI series:
https://www.youtube.com/playlist?list=PLhixgUqwRTjzerY4bJgwpxCLyfqNYwDVB

The Game: https://gpa.43z.one
The OpenAI API cost is pretty high, thus if you want to play the game, use the OpenAI Playground with your own account: https://platform.openai.com/playground?mode=chat

Chapters:
00:00 - Intro
00:39 - Content Moderation Experiment with Chat API
02:19 - Learning to Attack LLMs
03:06 - Attack 1: Single Symbol Differences
03:51 - Attack 2: Context Switch to Write Stories
05:20 - Attack 3: Large Attacker Inputs
06:31 - Attack 4: TLDR Backdoor
08:27 - &quot;This is just a game&quot;
08:56 - Attack 5: Different Languages
09:19 - Attack 6: Translate Text
10:30 - Quote about LLM Based Games
11:11 - advertisement shop.liveoverflow.com

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/h74oXb4Kk8k</video:player_loc>
      <video:publication_date>2026-03-17T14:37:11.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>727</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14742/attacking-llm-prompt-injection</loc>
    <lastmod>2026-03-17T14:37:00.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/Sv5OLj2nVAQ/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Attacking LLM - Prompt Injection</video:title>
      <video:description>How will the easy access to powerful APIs like GPT-4 affect the future of IT security? Keep in mind LLMs are new to this world and things will change fast. But I don&apos;t want to fall behind, so let&apos;s start exploring some thoughts on the security of LLMs. 

Get my font (advertisement): https://shop.liveoverflow.com

Building the Everything API: https://www.youtube.com/watch?v=M2uH6HnodlM

Injections Explained with Burgers: https://www.youtube.com/watch?v=WWJTsKaJT_g

Watch the complete AI series:
https://www.youtube.com/playlist?list=PLhixgUqwRTjzerY4bJgwpxCLyfqNYwDVB

Chapters:
00:00 - Intro
00:41 - The OpenAI API
01:20 - Injection Attacks
02:09 - Prevent Injections with Escaping
03:14 - How do Injections Affect LLMs?
06:02 - How LLMs like ChatGPT  work
10:24 - Looking Inside LLMs
11:25 - Prevent Injections in LLMs?
12:43 - LiveOverfont ad

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/Sv5OLj2nVAQ</video:player_loc>
      <video:publication_date>2026-03-17T14:37:00.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>803</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14741/our-future-as-hackers-is-at-stake</loc>
    <lastmod>2026-03-17T14:36:49.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/GbMHAaB0uI0/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Our Future As Hackers Is At Stake!</video:title>
      <video:description>Copilot, ChatGPT and other AI models become a threat to hackers. We rely on insecure code, but when all developers moved over to code generated by AI, we will lose our job. We need to act fast! 

This video is satire and a joke (1. April)

Join the https://rAIsistance.com now!

Here is the three step plan to secure our future:

1. Find coding tutorials or code on GitHub
2. Modify the code and introduce bugs
3. Add comments and text stating that the code is secure

Once the next generation AI was trained on this tainted dataset, developers will start to write more insecure code and our jobs are safe.

Get my font (advertisement): https://shop.liveoverflow.com


Chapters:
00:00 - The rAistance!
00:32 - AI is a Threat to Hacking
01:26 - The Mission
02:50 - Opt-In AI Regulations
03:14 - START NOW!
03:50 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/GbMHAaB0uI0</video:player_loc>
      <video:publication_date>2026-03-17T14:36:49.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>251</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14740/cyber-security-challenge-germany-2023</loc>
    <lastmod>2026-03-17T14:36:36.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/jUZjQlcAV94/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Cyber Security Challenge Germany (2023)</video:title>
      <video:description>If you are a german student, come and participate in this CTF competition!

CSCG: https://cscg.de/
Donate to NFITS: https://nfits.de/spenden/

CSCG Aftermovie: https://www.youtube.com/watch?v=GZmCObcHoGw

ECSC: https://ecsc.eu/

Intro Rev Video: https://www.youtube.com/watch?v=28JHPOUZvDw
Intro Pwn Video: https://www.youtube.com/watch?v=hhu7vhmuISY

Get started with hacking https://liveoverflow.com/faq/get-started-with-hacking/

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/jUZjQlcAV94</video:player_loc>
      <video:publication_date>2026-03-17T14:36:36.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>920</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14739/cybercrime-is-not-hacking</loc>
    <lastmod>2026-03-17T14:36:24.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/nyg2W5KUNVQ/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Cybercrime is Not Hacking!</video:title>
      <video:description>In the news, cybercrime is often mentioned in connection to &quot;hacking&quot;. Also when accounts get stolen, people say &quot;my account got hacked&quot;. But is this really hacking? How does cybercrime actually look like?

LiveOverfont (advertisement): https://shop.liveoverflow.com

Protect yourself from phishing: https://www.youtube.com/watch?v=NWtm4X6L_Cs

Checkout some hacking videos:
Total beginner: https://www.youtube.com/watch?v=2TofunAI6fU
Boomer Gamers: https://www.youtube.com/watch?v=p8OBktd42GI
Zoomer Gamers: https://www.youtube.com/watch?v=Ekcseve-mOg
Developers: https://www.youtube.com/watch?v=-YnMr1lj4Z8
Bughunters: https://www.youtube.com/watch?v=eQFbG6CwwdI
Hackers: https://www.youtube.com/watch?v=yrCXamnX9No
Haxx0rs: https://www.youtube.com/watch?v=qA8KB6KndrE

Chapters:
00:00 - Intro
00:34 - Site Walkthrough
01:58 - Cybercrime Organization
02:41 - The Cybercrime Recruitment Funnel
03:44 - Website Builder Services
04:45 - How the Money Flows
05:45 - Cybercrime is like a Business!
07:37 -  Hacking vs. Cybercrime
09:00 - How to Learn Hacking
09:39 - Report Phishing Sites
10:02 - shop.liveoverflow.com advertisement

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/nyg2W5KUNVQ</video:player_loc>
      <video:publication_date>2026-03-17T14:36:24.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>676</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14738/attacking-language-server-json-rpc</loc>
    <lastmod>2026-03-17T14:36:14.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/DFAdG9o0sTw/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Attacking Language Server JSON RPC</video:title>
      <video:description>While auditing a VSCode Extension + Language Server I noticed something interesting. This turned into the research question &quot;can we attack the extension from the browser?&quot;. After a bit of preliminary research I decided to do it again on stream, and eventually made this video. This is how security research can look like.

What is a Server? https://www.youtube.com/watch?v=VXmvM2QtuMU
What is a Protocol? https://www.youtube.com/watch?v=d-zn-wv4Di8
GitLab 11.4.7 RCE https://www.youtube.com/watch?v=LrLJuyAdoAg

Live Stream: https://www.youtube.com/watch?v=jc7S6TtLK_c

My Font (advertisement): https://shop.liveoverflow.com/

Interested in more videos like this? https://www.youtube.com/playlist?list=PLhixgUqwRTjzSTVPNZduVzMY1yebFrA9m

Chapters:
00:00 - Why Security Research?
01:23 - What is a Language Server?
02:53 - Setup Example Code
04:00 - RCE in VSCode Extension?
05:25 - The Language Server Code
06:29 - Researching Communication
11:13 - Can a Browser Attack the VSCode Extension?
13:54 - Research Results
15:40 - Ad n&apos; Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/DFAdG9o0sTw</video:player_loc>
      <video:publication_date>2026-03-17T14:36:14.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>991</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14737/advanced-teleport-hack-stolen-from-cheaters</loc>
    <lastmod>2026-03-17T14:36:02.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/3HSnDsfkJT8/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Advanced Teleport Hack (stolen from cheaters)</video:title>
      <video:description>There exists a pretty cool teleport hack that I couldn&apos;t discover myself. So I decided to steal it and share it with you all!

Minecraft:HACKED Playlist https://www.youtube.com/playlist?list=PLhixgUqwRTjwvBI-hmbZ2rpkAl4lutnJG

Purchase LiveOverfont (advertisement): https://shop.liveoverflow.com

Paper Source Code: https://github.com/PaperMC/Paper/tree/1.19.2
Community Showcase: Jorian, EnderKill98, Shrecknt

Chapters:
00:00 - La Casa De Papel
00:53 - Reach Hack Recap
01:59 - The Vault Challenge
03:43 - Code Review of handleMovePlayer()
05:45 - Logging Packets from Cheaters
07:03 - Reverse Engineering the Teleport Hack
09:01 - Debugging the Movement Code
11:58 - Self-reflection: Why did I not find this?
13:40 - The End of Minecraft:HACKED
15:06 - Community Showcase: Jorian, EnderKill98, Shrecknt

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/3HSnDsfkJT8</video:player_loc>
      <video:publication_date>2026-03-17T14:36:02.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1022</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14736/vpns-proxies-and-secure-tunnels-explained-deepdive</loc>
    <lastmod>2026-03-17T14:35:50.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/32KKwgF67Ho/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>VPNs, Proxies and Secure Tunnels Explained (Deepdive)</video:title>
      <video:description>What is a secure &quot;tunnel&quot;? When I started to learn about computers the name confused me. I couldn&apos;t imagine how it works on a technical level. In this video we build upon knowledge from the previous videos, to develop an intuition for what a tunnel, VPN or proxy is.

LiveOverfont (advertisement): https://shop.liveoverflow.com

1. Server Explained: https://www.youtube.com/watch?v=VXmvM2QtuMU
2. Protocol Explained: https://www.youtube.com/watch?v=d-zn-wv4Di8
3. Computer Networking: https://www.youtube.com/watch?v=6G14NrjekLQ

Grab the forwarder.py code: https://gist.github.com/LiveOverflow/8325c58ecf5b385a2028f3174ee47c18

Chapters:
00:00 - Intro and Background
00:53 - Networking as a Blackbox 
01:24 - forwarder.py: Forward Data via Networking
02:43 - Using forwarder.py as a Proxy
04:31 - xor_forwarder.py: Forward &quot;XOR Encrypted&quot; Data via Networking
06:58 - The VPN Blackbox
08:10 - VPNs Forward Entire Packets
10:01 - Virtual Network Cards with TUN/TAP
12:34 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/32KKwgF67Ho</video:player_loc>
      <video:publication_date>2026-03-17T14:35:50.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>792</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14735/velocity-exploit-on-paper</loc>
    <lastmod>2026-03-17T14:35:37.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/Wz1EI7NnUTo/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Velocity Exploit on Paper?</video:title>
      <video:description>In this video we investigate the comments&apos; claims that there exists an arbitrary velocity exploit in minecraft. We look into the code and see if that is true.

LiveOverfont (advertisement): shop.liveoverflow.com

Watch the full Minecraft:HACKED playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjwvBI-hmbZ2rpkAl4lutnJG

The Duper Trooper: Minecraft Insta-Kill Hack!! https://www.youtube.com/watch?v=itFLgGPkN8U

Community Showcase: 
TudbuT&apos;s SeedOverlay

Episode 20:
00:00 - Intro
00:24 - Snowball Challenge
01:56 - Minecraft Velocity Research
04:00 - deltaMovement Usage
04:50 - jumpFromGround() on vanilla
05:55 - BowBomb Implementation
06:42 - jumpFromGround() on paper
07:19 - Low TPS Exploit
08:41 - Community Showcase: TudbuT SeedOverlay
10:35 - SeedOverlay Code
13:41 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tv/LiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/Wz1EI7NnUTo</video:player_loc>
      <video:publication_date>2026-03-17T14:35:37.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>858</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14734/computer-networking-deepdive</loc>
    <lastmod>2026-03-17T14:35:25.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/6G14NrjekLQ/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Computer Networking (Deepdive)</video:title>
      <video:description>LiveOverfont (advertisement): http://shop.liveoverflow.com/

In this video I try to explain computer networking with pieces of paper. This hopefully explains why in some universities the OSi layer model is taught. While I find the OSI model kinda useless, &quot;thinking in layers&quot; is extremely important. Blackboxes of layers allow us to focus on what matters, and ignore anything else.

HTTP Desync Attack Explained With Paper: https://www.youtube.com/watch?v=dnyL7EKbRRk
HTTP Request Smuggling - False Positives: https://www.youtube.com/watch?v=7wq2e2nxa38

Chapters:
00:00 - Intro
00:42 - Send Data Between Computers (Physical Layer)
01:31 - Find The Correct Computers (IP Layer)
04:24 - Identify The Target Program (TCP Layer)
06:40 - Think in Blackboxes!
07:24 - TCP Layer Blackbox
08:32 - Linux Kernel Implementing The Layers
09:54 - netcat Example
10:30 - Looking at Packet with Wireshark 
11:04 - Layers are Everywhere (Phone Call)
11:49 - Hacking with Blackboxes
13:11 - Outro
13:28 - LiveOverfont Ad

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/6G14NrjekLQ</video:player_loc>
      <video:publication_date>2026-03-17T14:35:25.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>892</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14733/revisiting-2b2t-tamed-animal-coordinate-exploit</loc>
    <lastmod>2026-03-17T14:35:14.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/TAUrzkOYLUk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Revisiting 2b2t Tamed Animal Coordinate Exploit</video:title>
      <video:description>LiveOverfont (advertisement): shop.liveoverflow.com

Everybody told me the cat coordinate exploit/leak was already known. However this does not seem to be true, I tested it by logging packets.

Cat Coordinate Exploit 1.19.2: https://www.youtube.com/watch?v=Gi2PPBCEHuM
Watch the full playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjwvBI-hmbZ2rpkAl4lutnJG

After I made the video I realized I should have showcased this project:
Minecraft Packet Monitor: https://github.com/Heath123/pakkit

Community Showcase:
TudbuT -  https://youtu.be/ipTqARwCmEE
7H3, MonkeySaint 

Episode 19:
00:00 - Intro
00:38 - 2b2t Tamed Animal Coordinate Leak
01:20 - Experiment Setup
02:32 - Packet Logging Experiment
04:55 - Experiment Conclusion
06:15 - Fixing the Coordinate Leak
06:58 - Community Showcase

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ LiveStreams: https://twitch.tv/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/TAUrzkOYLUk</video:player_loc>
      <video:publication_date>2026-03-17T14:35:14.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>558</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14732/what-is-a-protocol-deepdive</loc>
    <lastmod>2026-03-17T14:35:01.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/d-zn-wv4Di8/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>What is a Protocol? (Deepdive)</video:title>
      <video:description>Get the LiveOverflow Font: https://shop.liveoverflow.com (advertisement)

The term &quot;protocol&quot; can be really confusing. In this video I try to explain to my former self what it means to have a protocol.

Chapters:
00:00 - Intro and Motivation
00:28 - &quot;Protocol&quot; Word Definition
01:48 - The HTTP Protocol
02:42 - RFC 9112 HTTP/1.1
06:35 - Web APIs are Protocols
07:50 - RFC 9293 TCP
11:02 - What Is a TCP Port?
12:30 - Why Is TCP Working This Way?
13:45 - Hardware Protocol UART
16:16 - Protocol: Rules for Communication
17:20 - Protocols for Hackers
17:52 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/d-zn-wv4Di8</video:player_loc>
      <video:publication_date>2026-03-17T14:35:01.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1094</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14731/can-ai-create-a-minecraft-hack</loc>
    <lastmod>2026-03-17T14:34:48.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/ukKfAV4Ap6o/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Can AI Create a Minecraft Hack?</video:title>
      <video:description>Get the LiveOverflow Font: https://shop.liveoverflow.com (advertisement)

I tried to use OpenAI&apos;s ChatGPT on stream to create a minecraft hack. Let&apos;s see how it goes.

Watch the Minecraft:HACKED Playlist here: https://www.youtube.com/playlist?list=PLhixgUqwRTjwvBI-hmbZ2rpkAl4lutnJG

Chapters:
00:00 - Intro
00:59 - How To Create a Minecraft Mod?
08:22 - Can You Write a FlyHack?
09:35 - Testing the FlyHack
10:33 - How to Bypass The Anti-Fly Check?
15:03 - The AI Explains Mixins
20:06 - Helping the AI to find Anti-Fly Bypass
26:45 - Implementing AI&apos;s Anti-Fly Bypass
33:43 - AI Suggests to Intercept Packets
41:10 - Arguing with AI about Server&apos;s isFloating Check
47:29 - Anti-Human Bypass Plugin
52:09 - Ask AI about Different Minecraft Exploits
54:47 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ LiveStreams: https://twitch.tv/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/ukKfAV4Ap6o</video:player_loc>
      <video:publication_date>2026-03-17T14:34:48.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>3316</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14730/cat-coordinate-exploit-1-19-2</loc>
    <lastmod>2026-03-17T14:34:24.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/Gi2PPBCEHuM/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Cat Coordinate Exploit 1.19.2</video:title>
      <video:description>I tried to hide a new base far away, but players quickly found it. Let me tell you how they did it.

Shoutout to TP-Overflow: P1x3lPro (found cat exploit), Overlord2036, Enderkill98, 7H3, MonkeySaint, 19MisterX98

Community Showcase: DarkMetalMouse

Watch the full playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjwvBI-hmbZ2rpkAl4lutnJG

Episode 17:
00:00 - Intro
00:24 - 1.19.2 Demo Mode
01:00 - Let&apos;s Play: New Base Storage Area
03:44 - Hopper Sorter Plugin
06:08 - Reach Hack Showcase
09:24 - Let&apos;s Play: Minecart System
11:14 - Cats in Minecraft are Evil
12:23 - Tamed Cat AI Behavior Exploit
17:14 - Look Direction Triangulation
19:38 - Environments: Snowball Challenge
21:48 - Community Showcase: DarkMetalMouse Coordinate Cracking


-=[ ❤️ Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/Gi2PPBCEHuM</video:player_loc>
      <video:publication_date>2026-03-17T14:34:24.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1468</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14729/what-is-a-server-deepdive</loc>
    <lastmod>2026-03-17T14:34:11.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/VXmvM2QtuMU/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>What is a Server? (Deepdive)</video:title>
      <video:description>With this video I explain my ~17y/o self what a &quot;Server&quot; is. We look at server software and servers in datacenters to understand how the word is used.

Chapters:
00:00 - Intro to &quot;What is a Server?&quot;
00:47 - Wikipedia Server Definition
01:42 - Game Servers
02:50 - Client and Server Communication
04:30 - Web Servers
05:10 - A Server is just a Program
06:38 - A Server is just a Computer
08:30 - Server Hardware
10:10 - What is Server Software?
11:54 - Servers are Everywhere
14:00 - Related Terms and Thought Experiment
17:04 - Outro

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/VXmvM2QtuMU</video:player_loc>
      <video:publication_date>2026-03-17T14:34:11.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1071</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14728/they-stole-claude-s-brain-16-million-times</loc>
    <lastmod>2026-03-17T14:33:46.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/lO961HRQn5Q/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>they stole Claude’s brain 16 million times</video:title>
      <video:description>Anthropic just exposed DeepSeek, Moonshot AI, and MiniMax for creating 24,000 fake accounts and having 16 million conversations with Claude to steal its capabilities. The AI race isn&apos;t what you think.

Source: https://www.anthropic.com/news/detecting-and-preventing-distillation-attacks

#ai #claude #deepseek #cybersecurity #espionage #anthropic</video:description>
      <video:player_loc>https://www.youtube.com/embed/lO961HRQn5Q</video:player_loc>
      <video:publication_date>2026-03-17T14:33:46.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>62</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14727/become-an-ai-hacker-it-s-easier-than-you-think</loc>
    <lastmod>2026-03-17T14:33:17.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/_yfiUQSbdPY/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>become an AI HACKER (it&apos;s easier than you think)</video:title>
      <video:description>Protect your family from AI-powered scams with Bitdefender Premium Security: https://bitdefend.me/NCTWOF
FREE Cybersecurity Guide for Kids: https://bitdefend.me/NCTWOF

In part 1, you hacked baby Gandalf. That was cute. Now it&apos;s time to graduate. Jason Haddix—the guy who literally wrote the AI pentesting methodology—is back to show you Agent Breaker, a CTF you can host yourself, and the exact skills you need to start calling yourself an AI pentester.

A 12-year-old solved this in 35 minutes. You have no excuses.

🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy

RESOURCES / LINKS:
🧙 Baby Gandalf (start here): https://gandalf.lakera.ai/
⚔️ Agent Breaker: https://gandalf.lakera.ai/agent-breaker
🔧 Auto Parts CTF (GitHub): https://github.com/arcanum-ai/auto-parts-ctf
📚 Jason&apos;s AI Security Resource Hub: https://github.com/Arcanum-Sec/ai-sec-resources?tab=readme-ov-file
🎓 Jason&apos;s Official AI Hacking Courses: https://www.arcanum-sec.com/
👤 Jason Haddix on Twitter/X: https://x.com/jhaddix
📺 Part 1 — Hacking AI is TOO EASY: https://www.youtube.com/watch?v=Qvx2sVgQ-u0

TIMESTAMPS:
0:00 - You need to learn AI hacking NOW
1:03 - What is Agent Breaker?
2:00 - Watching Jason hack Agent Breaker live
4:05 - Bitdefender — Protect your family from AI scams
5:15 - What I learned from Jason&apos;s approach
5:51 - I tried 239 times on Level 1
7:08 - Auto Parts CTF — a REAL AI pentest
7:42 - Hosting the CTF yourself (Docker)
8:40 - Watching Jason chain the full attack
10:39 - What real AI pentesting looks like
11:19 - A 12-year-old solved this in 35 minutes
12:54 - Your AI hacking roadmap
14:15 - Part 3 teaser (Parsel Tongue + elite tools)
15:00 - Prayer

**Sponsored by Bitdefender

SUPPORT NETWORKCHUCK
-------------------------------------------------
🎓🎓 Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy
☕☕ COFFEE and MERCH: https://ntck.co/coffee
🌐🌐 Use the MOST SECURE Web Browser, NetworkChuck Cloud Browser: https://browser.networkchuck.com/
🧠🧠 Use n8n, my favorite automation tool: https://ntck.co/n8n
�</video:description>
      <video:player_loc>https://www.youtube.com/embed/_yfiUQSbdPY</video:player_loc>
      <video:publication_date>2026-03-17T14:33:17.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>1006</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14726/i-ddos-d-myself-don-t-do-this</loc>
    <lastmod>2026-03-17T14:32:54.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/acSlR6UD6yM/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>I DDoS&apos;d myself (don&apos;t do this)</video:title>
      <video:description>https://www.youtube.com/watch?v=eZYtnzODpW4</video:description>
      <video:player_loc>https://www.youtube.com/embed/acSlR6UD6yM</video:player_loc>
      <video:publication_date>2026-03-17T14:32:54.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>108</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14725/this-new-setting-locks-down-whatsapp</loc>
    <lastmod>2026-03-17T14:32:43.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/NfG_yQ4RpyI/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>this NEW setting Locks Down WhatsApp</video:title>
      <video:description>Read more here: https://blog.whatsapp.com/whatsapps-latest-privacy-protection-strict-account-settings</video:description>
      <video:player_loc>https://www.youtube.com/embed/NfG_yQ4RpyI</video:player_loc>
      <video:publication_date>2026-03-17T14:32:43.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>72</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14724/claude-code-on-your-phone-in-10-minutes</loc>
    <lastmod>2026-03-17T14:32:32.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/FEDiAHzS0zw/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Claude Code on your phone in 10 minutes</video:title>
      <video:description>Set up your own FOREVER TERMINAL with Hostinger: https://hostinger.com/networkchuck (Use code NETWORKCHUCK for a discount)


Claude Code is a terminal app… and that’s the problem. Phones don’t have terminals. So in this video, I build a forever terminal in the cloud that lets you run Claude Code from your phone, ANYWHERE. Airport. Couch. Plane. Bathroom. Whatever.


🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy 


RESOURCES / LINKS:

💻 GITHUB Guide: https://github.com/theNetworkChuck/remote-claude-code 

☁️ Termius (mobile terminal app): https://termius.com

📺 My previous video on Tmux: https://www.youtube.com/watch?v=nTqu6w2wc68

🟩 Tmux: https://github.com/tmux/tmux




TIMESTAMPS:

0:00 - Intro
1:04 - Forever Terminal
2:34 - VPS Hardening
3:27 - Mobile Access With Termius
6:18 - Session Persistence with Tmux





**Sponsored by Hostinger





SUPPORT NETWORKCHUCK
---------------------------------------------------
🎓🎓 Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 

☕☕ COFFEE and MERCH: https://ntck.co/coffee 

🌐🌐 Use the MOST SECURE Web Browser, NetworkChuck Cloud Browser: https://browser.networkchuck.com/

🧠🧠 Use n8n, my favorite automation tool: https://ntck.co/n8n

🆘🆘 NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck 

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch 

READY TO LEARN??
---------------------------------------------------
-Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 
-Get your CCNA: https://bit.ly/nc-ccna 

FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: https://www.instagram.com/networkchuck/ 
Twitter: https://twitter.com/networkchuck 
Facebook: https://www.facebook.com/NetworkChuck/ 
Join the Discord server: http://bit.ly/nc-discord 




Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!! 

Run Claude Code from Your Phone (Anywhere)


I Built a FOREVER Terminal for Claude Code


Code From Your Phone Using Claude Co</video:description>
      <video:player_loc>https://www.youtube.com/embed/FEDiAHzS0zw</video:player_loc>
      <video:publication_date>2026-03-17T14:32:32.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>582</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14723/i-flew-to-romania-to-find-hackers-who-fight-hackers</loc>
    <lastmod>2026-03-17T14:32:21.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/gM5O0zCqriM/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>I flew to Romania to find hackers who fight hackers</video:title>
      <video:description>Keep your family safe from scammers: https://bitdefend.me/NCTWOF

Watch the full video here: https://www.youtube.com/watch?v=o-8amaZBi5M</video:description>
      <video:player_loc>https://www.youtube.com/embed/gM5O0zCqriM</video:player_loc>
      <video:publication_date>2026-03-17T14:32:21.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>101</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14722/free-phone-calls-with-claude-code</loc>
    <lastmod>2026-03-17T14:32:10.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/cT22fTzotYc/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>FREE Phone Calls with Claude Code</video:title>
      <video:description>Try 3CX for yourself (FREE tier available): https://www.3cx.com/try/?src=networkchuck2025


I gave my server a phone number… and now it can call me. In this video, I take a normal phone system (3CX) and connect it directly to my AI workflows running in the terminal. That means I can call my AI from any phone (even a payphone) and have it create tasks, send Slack messages, generate thumbnails, monitor my servers, and call me back when something breaks.

🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy 


RESOURCES / LINKS:

💻 GITHUB Guide: https://github.com/theNetworkChuck/claude-phone.git

▶️ Setup video guide &amp; walkthrough: https://youtu.be/EIhAelYTna8

🧠 Use n8n, my favorite automation tool: https://ntck.co/n8n





TIMESTAMPS:

0:00 - Intro
0:42 - The Platform
7:27 - the Power
9:28 - the Character
15:01 - the Moment




**Sponsored by 3CX







SUPPORT NETWORKCHUCK
---------------------------------------------------
🎓🎓 Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 

☕☕ COFFEE and MERCH: https://ntck.co/coffee 

🌐🌐 Use the MOST SECURE Web Browser, NetworkChuck Cloud Browser: https://browser.networkchuck.com/

🧠🧠 Use n8n, my favorite automation tool: https://ntck.co/n8n

🆘🆘 NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck 

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch 

READY TO LEARN??
---------------------------------------------------
-Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 
-Get your CCNA: https://bit.ly/nc-ccna 

FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: https://www.instagram.com/networkchuck/ 
Twitter: https://twitter.com/networkchuck 
Facebook: https://www.facebook.com/NetworkChuck/ 
Join the Discord server: http://bit.ly/nc-discord 




Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!! 

I Gave My AI a Phone Number (Now It Calls Me)
My Server Can Call Me Now… Here’s How
I Turned a Phone System Into an AI Brain
</video:description>
      <video:player_loc>https://www.youtube.com/embed/cT22fTzotYc</video:player_loc>
      <video:publication_date>2026-03-17T14:32:10.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>1191</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14721/virtual-machines-explained-this-is-the-magic</loc>
    <lastmod>2026-03-17T14:31:57.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/g-Ss2AEEP58/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Virtual Machines EXPLAINED (This Is the Magic)</video:title>
      <video:description>Watch the full video: ntck.co/learnvms</video:description>
      <video:player_loc>https://www.youtube.com/embed/g-Ss2AEEP58</video:player_loc>
      <video:publication_date>2026-03-17T14:31:57.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>78</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14720/what-is-zero-trust-and-why-hackers-hate-it</loc>
    <lastmod>2026-03-17T14:31:47.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/9okx4cA-wEE/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>What Is Zero Trust? (And Why Hackers Hate It)</video:title>
      <video:description>Get $200 OFF your registration with code ZTWNETWORKCHUCK26: threatlocker.com/ztw</video:description>
      <video:player_loc>https://www.youtube.com/embed/9okx4cA-wEE</video:player_loc>
      <video:publication_date>2026-03-17T14:31:47.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>78</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14719/access-your-home-network-from-anywhere</loc>
    <lastmod>2026-03-17T14:31:16.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/8W92cckXuTg/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>ACCESS your home network from ANYWHERE</video:title>
      <video:description>Access your stuff from anywhere for FREE, with Twingate: https://twingate.com</video:description>
      <video:player_loc>https://www.youtube.com/embed/8W92cckXuTg</video:player_loc>
      <video:publication_date>2026-03-17T14:31:16.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>86</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14716/stop-trusting-cloud-cameras-here-s-what-i-use-instead</loc>
    <lastmod>2026-03-17T14:30:40.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/tbCKWX34_G4/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>stop trusting cloud cameras!! (here&apos;s what I use instead)</video:title>
      <video:description>Get an exclusive 15% discount on Saily eSIM CTA data plans! Download Saily app and use code networkchuck at checkout: https://saily.com/networkchuck 

Someone might be watching you through your smart cameras…. Seriously. Today, I’m ditching the cloud, and building a completely local, AI powered surveillance system using Frigate, Raspberry Pi, and some cheap Reolink cameras. Get your coffee ready… this is going to blow your mind.


🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy 


RESOURCES / LINKS:

📄 Guide / Walkthrough: https://github.com/theNetworkChuck/frigate-nvr-guide

Learn Docker RIGHT NOW!!: https://www.youtube.com/watch?v=eGz9DS-aIeY

Learn Docker Compose: https://www.youtube.com/watch?v=DM65_JyGxCo


TIMESTAMPS:

0:00 - Intro
0:51 - Requirements
6:17 - Installing Frigate
10:35 - Adding the Cameras
17:19 - AI Detection &amp; Recording
22:22 - AI Hardware Acceleration
25:35 - Scaling Up
27:53 - The Glitch
29:18 - The Wi-Fi Problem


**Sponsored by Saily







SUPPORT NETWORKCHUCK
---------------------------------------------------
🎓🎓 Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 

☕☕ COFFEE and MERCH: https://ntck.co/coffee 

🌐🌐 Use the MOST SECURE Web Browser, NetworkChuck Cloud Browser: https://browser.networkchuck.com/

🧠🧠 Use n8n, my favorite automation tool: https://ntck.co/n8n

🆘🆘 NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck 

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch 

READY TO LEARN??
---------------------------------------------------
-Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 
-Get your CCNA: https://bit.ly/nc-ccna 

FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: https://www.instagram.com/networkchuck/ 
Twitter: https://twitter.com/networkchuck 
Facebook: https://www.facebook.com/NetworkChuck/ 
Join the Discord server: http://bit.ly/nc-discord 

AFFILIATES &amp; REFERRALS
---------------------------------------------------
  | Raspberry Pi 5   | https://geni.us/q7BXLZN | Shoppin</video:description>
      <video:player_loc>https://www.youtube.com/embed/tbCKWX34_G4</video:player_loc>
      <video:publication_date>2026-03-17T14:30:40.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>2365</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14715/is-this-voice-real-or-ai</loc>
    <lastmod>2026-03-17T14:30:20.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/1AVlW7TB-Oo/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Is this voice REAL or AI?</video:title>
      <video:description>Protect yourself (and your family) from scams, with Bitdefender Scam Protection: https://bitdefend.me/NCTWOF 

Check out the full video with Bitdefender here: https://www.youtube.com/watch?v=o-8amaZBi5M</video:description>
      <video:player_loc>https://www.youtube.com/embed/1AVlW7TB-Oo</video:player_loc>
      <video:publication_date>2026-03-17T14:30:20.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>67</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14714/hackers-infected-the-wrong-girlfriend</loc>
    <lastmod>2026-03-17T14:29:24.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/o-8amaZBi5M/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Hackers infected the wrong girlfriend....</video:title>
      <video:description>Get Bitdefender Premium Security with Scam Copilot: https://bitdefend.me/NCTWOF



Hidden inside Romania is a real cyber-crime-fighting team almost no one knows about: the Draco team. These are elite malware analysts, forensics experts, and penetration testers who volunteer to hunt down cybercriminals. In this video, we go behind the scenes with Bitdefender to uncover how the Draco team helped dismantle massive ransomware groups like GandCrab and REvil, saving victims over $1 billion. We also talk about deepfakes, voice-cloning scams, and multi-platform attack chains in the next era of cybercrime.

🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy 


RESOURCES / LINKS:

Second Channel Interviews

👤 Alex Cosoi (Chief Security Strategist): https://youtu.be/2VOFWU77CR4

👤 Razvan Costache (Director of Innovation): https://youtu.be/OhyVtuYxRU8

👤 Bogdan Botezatu (Director of Threat Research): https://youtu.be/EOyOplr84I4


Read Bogdan’s Article: https://www.bitdefender.com/en-au/blog/labs/bitdefender-law-enforcement-partnership-saves-revil-victims-half-a-billion-in-ransom-demand


TIMESTAMPS:

0:00 - Intro
1:22 - Who is Draco?
2:22 - What they do
7:14 - GandCrab V2
10:29 - The AI Arms Race
20:49 - Why it Matters



**Sponsored by Bitdefender 






SUPPORT NETWORKCHUCK
---------------------------------------------------
🎓🎓 Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 

☕☕ COFFEE and MERCH: https://ntck.co/coffee 

🌐🌐 Use the MOST SECURE Web Browser, NetworkChuck Cloud Browser: https://browser.networkchuck.com/

🧠🧠 Use n8n, my favorite automation tool: https://ntck.co/n8n

🆘🆘 NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck 

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch 

READY TO LEARN??
---------------------------------------------------
-Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 
-Get your CCNA: https://bit.ly/nc-ccna 

FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: https://www.instagram.com/networkc</video:description>
      <video:player_loc>https://www.youtube.com/embed/o-8amaZBi5M</video:player_loc>
      <video:publication_date>2026-03-17T14:29:24.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>1617</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14713/forcing-my-kids-to-become-hackers-it-actually-worked</loc>
    <lastmod>2026-03-17T14:29:09.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/lax6vdOko20/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Forcing My Kids to Become Hackers (It Actually Worked)</video:title>
      <video:description>Get the certification yourself: https://ntck.co/htb_cjca

Sign up for the giveaway: https://ntck.co/htb_giveaway</video:description>
      <video:player_loc>https://www.youtube.com/embed/lax6vdOko20</video:player_loc>
      <video:publication_date>2026-03-17T14:29:09.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>70</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14712/the-dark-web-exposed-free-open-source-tool</loc>
    <lastmod>2026-03-17T14:28:46.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/_KzObeom88Y/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>The Dark Web EXPOSED (FREE + Open-Source Tool)</video:title>
      <video:description>Start your free ThreatLocker trial (no credit card required): https://www.threatlocker.com/networkchuck 

At DEF CON, I met a dark web researcher who built “Robin”, an AI-powered Tor scraper that finds the real parts of the dark web faster than anything else. The dark web is notoriously unreliable; it’s slow, full of honeypots, and constantly changing. But Robin uses AI and Docker to automate OSINT, analyze sites, and export real intelligence. In this video I’ll show you how to set it up yourself, and teach you techniques to safely investigate the Dark Web.


🔥🔥Join the NetworkChuck Academy! We just finished our new CCNA. Come check it out: https://ntck.co/NCAcademy 


RESOURCES / LINKS:

Full interview with Apurv: https://youtu.be/KxfAW8wPDX4

📃 Guide / Walkthrough: https://github.com/theNetworkChuck/dark-web-scraping-guide
🧠 Robin GitHub: https://github.com/apurvsinghgautam/robin

Check out Apurv:
Twitter/X - https://twitter.com/ASG_Sc0rpi0n
LinkedIn - https://www.linkedin.com/in/apurvsinghgautam/
Website - https://apurvsinghgautam.me

Designer of the Robin Logo - https://github.com/Tanq16




TIMESTAMPS:

0:00 - Intro
0:27 - Why is the Dark Web so hard to scrape?
2:25 - Ad
4:32 - Install
8:47 - Running the Tool for the First Time
11:49 - Stay Safe on the Dark Web
13:50 - This is a Real Job!!






**Sponsored by Threatlocker







SUPPORT NETWORKCHUCK
---------------------------------------------------
🎓🎓 Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 

☕☕ COFFEE and MERCH: https://ntck.co/coffee 

🌐🌐 Use the MOST SECURE Web Browser, NetworkChuck Cloud Browser: https://browser.networkchuck.com/

🧠🧠 Use n8n, my favorite automation tool: https://ntck.co/n8n

🆘🆘 NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck 

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch 

READY TO LEARN??
---------------------------------------------------
-Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 
-Get your CCNA: https://bit.ly/nc-ccna 

FOLLOW ME EVERYWHERE
---------------</video:description>
      <video:player_loc>https://www.youtube.com/embed/_KzObeom88Y</video:player_loc>
      <video:publication_date>2026-03-17T14:28:46.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>1227</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14711/defcon-is-not-what-i-expected</loc>
    <lastmod>2026-03-17T14:28:34.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/qFsj6KL8_nU/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>DEFCON is Not What I Expected...</video:title>
      <video:description>Are you really still using VPN? It’s time for a change: https://ntck.co/defcon33

What happens when you throw 30,000 hackers into one place? Welcome to DEF CON, my first ever hacker convention. From picking locks and hacking cars to meeting legends behind Wireshark and Kitboga, this isn’t just a conference — it’s hacker Disneyland. I’ll take you inside the villages (where cameras usually aren’t allowed), meet some wild characters, and show you why DEF CON isn’t scary…it’s community.



TIMESTAMPS:

0:00 - Intro
00:31 - First Time at DEFCON
2:00 - Packet Hacking Village
3:39 - Lock Picking Village
6:10 - Physical Security Village
7:36 - Car Hacking Village
10:00 - Social Engineering Village
10:45 - My Favorite Part of DEFCON



RESOURCES AND LINKS:

☠️ Check out DEF CON: https://defcon.org/

🔒Training Lock: https://toool.us/store/Red-KiK-lock-p519912395

🔑 Lockpicking kit: https://toool.us/store/Necessary-Nine-Lock-Pick-Set-v2-p579851580

Chris Greer (Wireshark guy): https://www.youtube.com/@ChrisGreer

Jack Rhysider: https://www.youtube.com/jackrhysider

Kitboga: https://www.youtube.com/@KitbogaShow

John Hammond: https://www.youtube.com/@_JohnHammond

0day: https://www.youtube.com/@0dayCTF

Rez0: https://x.com/rez0__

Rhynorater: https://x.com/Rhynorater

Daniel Miessler: https://www.youtube.com/@unsupervised-learning

Jason Haddix: https://www.youtube.com/c/jhaddix

Talking Sasquatch: https://www.youtube.com/@TalkingSasquach

Cyber Maddy: https://www.youtube.com/@Cyb3rMaddy

Ali: https://www.youtube.com/@endingwithali











🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy 



**Sponsored by Twingate







SUPPORT NETWORKCHUCK
---------------------------------------------------
➡️NetworkChuck membership: https://ntck.co/Premium 
☕☕ COFFEE and MERCH: https://ntck.co/coffee 

Check out my new channel: https://ntck.co/ncclips 

🆘🆘NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck 

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch 

READY TO LEARN??
-------------------------</video:description>
      <video:player_loc>https://www.youtube.com/embed/qFsj6KL8_nU</video:player_loc>
      <video:publication_date>2026-03-17T14:28:34.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>941</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14710/you-ve-been-using-ai-the-hard-way-use-this-instead</loc>
    <lastmod>2026-03-17T14:28:21.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/MsQACpcuTkU/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>You&apos;ve Been Using AI the Hard Way (Use This Instead)</video:title>
      <video:description>Access your devices securely from anywhere with TwinGate: https://ntck.co/ai_terminal 


Still using AI in the browser? You’re doing it the slow way. In this video, I BREAK OUT of the GUI and show you how AI in the terminal (Gemini CLI, Claude Code, Codex and OpenCode) makes me 10x faster. We’ll install the tools (Mac/Windows/Linux), spin up project aware context files, and unlock terminal AI superpowers. I’ll also show my daily workflow for keeping multiple AIs in sync across the same folder.


RESOURCES / LINKS:

Commands / Walkthrough: https://github.com/theNetworkChuck/ai-in-the-terminal 
Gemini CLI: https://ai.google.dev/gemini-api
Claude Code: https://www.claude.com/product/claude-code
OpenCode: https://opencode.ai/


TIMESTAMPS:

0:00 - Intro
1:09 - Segment 1: The Terminal Superpower (Gemini)
8:43 - Segment 2: Claude Code
17:59 - Segment 3: ALL THE TERMINALS!!!
20:31 - Segment 4: Meta-Proof
26:29 - Segment 5: Open Code


🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy 



**Sponsored by Twingate







SUPPORT NETWORKCHUCK
---------------------------------------------------
☕☕ COFFEE and MERCH: https://ntck.co/coffee 

🆘🆘NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck 

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch 

READY TO LEARN??
---------------------------------------------------
-Learn Python: https://bit.ly/3rzZjzz 
-Get your CCNA: https://bit.ly/nc-ccna 

FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: https://www.instagram.com/networkchuck/ 
Twitter: https://twitter.com/networkchuck 
Facebook: https://www.facebook.com/NetworkChuck/ 
Join the Discord server: http://bit.ly/nc-discord 




AFFILIATES &amp; REFERRALS
---------------------------------------------------
(GEAR I USE...STUFF I RECOMMEND)
Use n8n to automate EVERYTHING: https://ntck.co/n8n
Want to browse securely? Try my ZERO-TRUST browser: https://browser.networkchuck.com/ 
Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code Netw</video:description>
      <video:player_loc>https://www.youtube.com/embed/MsQACpcuTkU</video:player_loc>
      <video:publication_date>2026-03-17T14:28:21.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>2024</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14709/hardware-hacking-101-with-a-custom-physical-kit</loc>
    <lastmod>2026-03-17T14:27:53.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/ZtLWNRiXMjU/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Hardware Hacking 101: with a custom physical kit!</video:title>
      <video:description>Just Hacking Training livestream for the new course release: Hardware Hacking 101 by Trevor Stevado! Includes a custom physical kit. https://justhacking.com</video:description>
      <video:player_loc>https://www.youtube.com/embed/ZtLWNRiXMjU</video:player_loc>
      <video:publication_date>2026-03-17T14:27:53.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>3592</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14708/the-payload-podcast-003</loc>
    <lastmod>2026-03-17T14:27:42.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/5Obz_fcDIhk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>The Payload Podcast #003</video:title>
      <video:description>Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/5Obz_fcDIhk</video:player_loc>
      <video:publication_date>2026-03-17T14:27:42.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>3774</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14707/crypto-scammers-phish-with-physical-mail</loc>
    <lastmod>2026-03-17T14:27:05.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/UQFySFs2GJk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>crypto scammers phish with physical mail</video:title>
      <video:description>https://jh.live/flare-03042026 || Manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: https://jh.live/flare-03042026

https://flare.io/learn/resources/blog/scammers-targeting-crypto-users-mail
https://www.bleepingcomputer.com/news/security/snail-mail-letters-target-trezor-and-ledger-users-in-crypto-theft-attacks/
https://heyjeremy.dev/blog/disrupting-cryptocurrency-phishing-telegram

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/UQFySFs2GJk</video:player_loc>
      <video:publication_date>2026-03-17T14:27:05.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>643</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14706/h-ckers-a-r-e-gl-bbing</loc>
    <lastmod>2026-03-17T14:26:41.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/IImLVU39V_Q/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>h?ckers a[r]e gl*bbing</video:title>
      <video:description>https://jh.live/exaforce || Keep pace with today&apos;s hackers with AI capability on your own turf -- try an agentic AI security operations center with Exaforce: https://jh.live/exaforce

https://0xv1n.github.io/LOLGlobs/
https://argfuscator.net/
https://www.youtube.com/watch?v=6-Gbv0h7m1I
https://lolbas-project.github.io/
https://gtfobins.org/
https://lolrmm.io/
https://www.loldrivers.io/
https://lolol.farm/
https://x.com/0xv1nx0
https://x.com/0xv1nx0/status/2025960436282138756
https://github.com/0xv1n/LOLGlobs
https://github.com/0xv1n
https://0xv1n.github.io/
https://github.com/spel987/PolyUploader
https://lots-project.com/
https://is.gd/

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/IImLVU39V_Q</video:player_loc>
      <video:publication_date>2026-03-17T14:26:41.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>981</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14705/thousands-of-google-api-keys-exposed</loc>
    <lastmod>2026-03-17T14:26:28.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/XNMHUifKce8/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>thousands of Google API keys exposed</video:title>
      <video:description>https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules
https://developers.google.com/maps/documentation/javascript/get-api-key?setupProd=configure#make_request
https://firebase.google.com/support/guides/security-checklist#api-keys-not-secret

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/XNMHUifKce8</video:player_loc>
      <video:publication_date>2026-03-17T14:26:28.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>455</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14704/learn-powershell</loc>
    <lastmod>2026-03-17T14:26:16.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/UHwx2AWQ6Ps/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Learn PowerShell!</video:title>
      <video:description>Just Hacking Training livestream with Andrew Pla! Friday February 20th at 10am PT / 1pm ET. https://justhacking.com/</video:description>
      <video:player_loc>https://www.youtube.com/embed/UHwx2AWQ6Ps</video:player_loc>
      <video:publication_date>2026-03-17T14:26:16.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>3436</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14703/the-payload-podcast-002-with-connor-mcgarr</loc>
    <lastmod>2026-03-17T14:26:05.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/wHT76Oad9nA/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>The Payload Podcast #002 with Connor McGarr</video:title>
      <video:description>Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/wHT76Oad9nA</video:player_loc>
      <video:publication_date>2026-03-17T14:26:05.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>4346</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14702/russia-is-hacking-zero-days-again</loc>
    <lastmod>2026-03-17T14:25:52.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/Ck8IPInn74A/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Russia is hacking zero-days again</video:title>
      <video:description>https://jh.live/flare-021926 || Manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: https://jh.live/flare-021926

https://www.bleepingcomputer.com/news/microsoft/microsoft-patches-actively-exploited-office-zero-day-vulnerability/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509
https://www.bleepingcomputer.com/news/security/russian-hackers-exploit-recently-patched-microsoft-office-bug-in-attacks/
https://cert.gov.ua/article/6287250
https://flare.io/learn/resources/blog/from-patch-to-exploit-flares-intelligence-on-cybercrime-after-january-2026-patch-tuesday
https://www.virustotal.com/gui/file/c91183175ce77360006f964841eb4048cf37cb82103f2573e262927be4c7607f/detection
https://gist.github.com/decalage2/26b6bfcd55c04b98c8474f2b21203e20

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/Ck8IPInn74A</video:player_loc>
      <video:publication_date>2026-03-17T14:25:52.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1009</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14701/continuumcon-is-back-for-2026</loc>
    <lastmod>2026-03-17T14:25:39.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/8PyNPsUUsmg/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>ContinuumCon is back for 2026!</video:title>
      <video:description>https://jh.live/continuumcon || Register for ContinuumCon 2026! The cybersecurity conference that never ends. 😎

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/8PyNPsUUsmg</video:player_loc>
      <video:publication_date>2026-03-17T14:25:39.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>82</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14700/an-interview-with-eva-benn</loc>
    <lastmod>2026-03-17T14:25:28.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/GOvCKliAQkI/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>An Interview with Eva Benn!</video:title>
      <video:description>Check out what Eva is up to: https://www.linkedin.com/in/evabenn/ || https://www.evabenn.com/
Eva&apos;s YouTube channel: @evabennofficial https://www.youtube.com/@evabennofficial


Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/GOvCKliAQkI</video:player_loc>
      <video:publication_date>2026-03-17T14:25:28.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1589</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14699/tiktok-needs-to-fix-this-vulnerability</loc>
    <lastmod>2026-03-17T14:25:17.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/djhX8Q4JuFU/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>TiKTok needs to fix this vulnerability</video:title>
      <video:description>https://jh.live/sublime-security-webinar || Catch the recap of more phishing schemes and trends to watch out in my webinar with Sublime Security :) https://jh.live/sublime-security-webinar

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/djhX8Q4JuFU</video:player_loc>
      <video:publication_date>2026-03-17T14:25:17.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>468</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14698/moltbook-is-still-weird-and-ai-skills-suck</loc>
    <lastmod>2026-03-17T14:24:40.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/BzUBdvCdlSU/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Moltbook is still weird (and AI skills suck)</video:title>
      <video:description>https://jh.live/tines || Build, run, and monitor automated workflows with Tines and their AI feature-rich platform -- try their Community Edition completely for free: https://jh.live/tines

https://www.moltbook.com/
https://molt.church/
https://moltmatch.xyz/
https://www.clawcity.xyz/
https://x.com/MattPRD/status/2017386365756072376
https://www.wiz.io/blog/exposed-moltbook-database-reveals-millions-of-api-keys
https://www.moltbook.com/post/c5d2b374-fffd-42f6-b772-75edd43089d2
https://arstechnica.com/ai/2026/02/the-rise-of-moltbook-suggests-viral-ai-prompts-may-be-the-next-big-security-threat/
https://www.moltbook.com/post/324a0d7d-e5e3-4c2d-ba09-a707a0235bfd
https://www.reddit.com/r/vibecoding/comments/1qpnybr/found_a_malicious_skill_on_the_frontpage_of/
https://openclaw.ai/
https://www.youtube.com/watch?v=UVNuEKFnrT8
https://x.com/ZackKorman/status/2018386838101086446
https://x.com/ZackKorman/status/2018589493683740803
https://x.com/ZackKorman/status/2018728357731483749
https://x.com/ZackKorman/status/2018950049326080027
https://x.com/ZackKorman/status/2019120916379357330
https://x.com/ZackKorman/status/2019860176892014797
https://x.com/ZackKorman/status/2019424225401225296
https://x.com/ZackKorman/status/2020183438951870963
https://www.youtube.com/watch?v=uq4UTjigaww
https://www.youtube.com/watch?v=GOzUIlgAcjY
https://openclaw.ai/blog/virustotal-partnership
https://blog.virustotal.com/2026/02/from-automation-to-infection-how.html
https://blog.virustotal.com/2026/02/from-automation-to-infection-part-ii.html
https://x.com/bquintero/status/2020563477807480919
https://x.com/bquintero/status/2019895596623053213
https://trapdoorsec.com/posts/skills-are-borked/

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh</video:description>
      <video:player_loc>https://www.youtube.com/embed/BzUBdvCdlSU</video:player_loc>
      <video:publication_date>2026-03-17T14:24:40.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1197</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14697/jht-course-launch-dark-web-2-cti-researcher</loc>
    <lastmod>2026-03-17T14:24:27.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/9E_fxRgwIeA/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>JHT Course Launch: Dark Web 2 - CTI Researcher</video:title>
      <video:description>Just Hacking Training new course release livestream for &quot;Dark Web 2 - CTI Researcher&quot;! Friday, February 6th, 2026 at 1pm ET / 10am PT.</video:description>
      <video:player_loc>https://www.youtube.com/embed/9E_fxRgwIeA</video:player_loc>
      <video:publication_date>2026-03-17T14:24:27.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>2764</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14696/the-payload-podcast-001-with-jonny-johnson-max-harley</loc>
    <lastmod>2026-03-17T14:24:17.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/U0l2ssRslm0/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>The Payload Podcast #001 with Jonny Johnson &amp; Max Harley</video:title>
      <video:description>Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/U0l2ssRslm0</video:player_loc>
      <video:publication_date>2026-03-17T14:24:17.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>3412</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14695/clawdbot-malware</loc>
    <lastmod>2026-03-17T14:24:05.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/7GS6Xs4hdvg/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Clawdbot Malware</video:title>
      <video:description>https://jh.live/hex-rays || Disassemble, decompile and debug with IDA Pro! Use promo code HAMMOND50 for 50% off any IDA Pro product (license discount is only applicable to individuals for any product, not corporations  https://hex-rays.com/pricing) and code HAMMOND30 for 30% off any IDA Pro online training https://hex-rays.com/training. Offer expires one year after video release date.

https://www.aikido.dev/blog/fake-clawdbot-vscode-extension-malware
https://www.trendmicro.com/en_us/research/26/a/analysis-of-the-evelyn-stealer-campaign.html
https://www.koi.ai/blog/the-vs-code-malware-that-captures-your-screen

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/7GS6Xs4hdvg</video:player_loc>
      <video:publication_date>2026-03-17T14:24:05.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>2590</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14694/moar-clawdbot-crap</loc>
    <lastmod>2026-03-17T14:23:54.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/HmMxGUMO3_Q/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>🦞🤖MOAR CLAWDBOT CRAP🦞🤖</video:title>
      <video:description>Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/HmMxGUMO3_Q</video:player_loc>
      <video:publication_date>2026-03-17T14:23:54.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>5174</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14693/clawdbot-security</loc>
    <lastmod>2026-03-17T14:23:43.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/yv_JIG9maoo/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>🦞🤖CLAWDBOT SECURITY??🦞🤖</video:title>
      <video:description>Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/yv_JIG9maoo</video:player_loc>
      <video:publication_date>2026-03-17T14:23:43.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>7505</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14692/</loc>
    <lastmod>2026-03-17T14:23:31.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/rcEyuokJh9c/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>🤖🤖🤖</video:title>
      <video:description>Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/rcEyuokJh9c</video:player_loc>
      <video:publication_date>2026-03-17T14:23:31.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>5525</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14691/</loc>
    <lastmod>2026-03-17T14:23:19.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/Xt66RQ3LYsk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>🤖🤖</video:title>
      <video:description>Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/Xt66RQ3LYsk</video:player_loc>
      <video:publication_date>2026-03-17T14:23:19.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>16149</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14690/</loc>
    <lastmod>2026-03-17T14:23:05.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/nKupkprFGfk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>🤖</video:title>
      <video:description>Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/nKupkprFGfk</video:player_loc>
      <video:publication_date>2026-03-17T14:23:05.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>16153</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14689/i-made-an-evil-mcp-server-and-ai-fell-for-it</loc>
    <lastmod>2026-03-17T14:22:52.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/_r_sLetar_o/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>&quot;I made an Evil MCP server&quot; (and AI fell for it)</video:title>
      <video:description>Huge thanks to Zack for showing off what he learned about MCP! 

Zack&apos;s Twitter/X - https://twitter.com/ZackKorman
Zack&apos;s Blog: https://zkorman.com/
His MCP post: https://zkorman.com/posts/cyberdev-mcp/11 

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/_r_sLetar_o</video:player_loc>
      <video:publication_date>2026-03-17T14:22:52.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1913</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14688/ntuser-man</loc>
    <lastmod>2026-03-17T14:22:40.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/Mw8DVcLSZIc/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>NTUSER.MAN</video:title>
      <video:description>https://jh.live/flare-011526 || Manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: https://jh.live/flare-011526

Video demo of the NTUSER dot MAN trick I saw floating around before the new year -- I did not know this was a thing👀 Hat tip to DeceptIQ et al.... we showcase:

1. breaking a Windows login with an empty user profile,
2. getting initial access EZPZ with a Sliver C2 implant,
3. exporting, downloading, and hijacking an existing target user profile NTUSER.DAT or HKCU Registry hive,
4. converting hives from .reg plaintext to binary with the HiveSwarming.exe tool,
5. and establishing persistence with the new backdoored NTUSER dot MAN profile we upload!

No Registry writes, API calls or registry callbacks because it&apos;s just a single file placed on disk! Kinda neat.

This is my first recording after a month break for the holidays and it was _painful_ -- lots of fails and mistakes and it took many hours 😅 

I&apos;m experimenting with MEMES in the THUMBNAIL and SHORT video TITLES to MITIGATE against CLICKBAIT

Also experimenting with longer social text promos for video releases to add more preview details and context. I no longer have to feed algorithms, but LLMs, too!

Feels good to get something out the door again.

---------

https://deceptiq.com/blog/ntuser-man-registry-persistence
https://github.com/elastic/detection-rules/blob/main/rules/windows/persistence_registry_uncommon.toml
https://learn.microsoft.com/en-us/windows/client-management/client-tools/mandatory-user-profile
https://github.com/stormshield/HiveSwarming
https://persistence-info.github.io/

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/Mw8DVcLSZIc</video:player_loc>
      <video:publication_date>2026-03-17T14:22:40.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1778</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14687/jht-course-launch-constructing-defense-2026-ai-assisted</loc>
    <lastmod>2026-03-17T14:22:27.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/eWgh0Crurj8/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>JHT Course Launch! Constructing Defense 2026 - AI Assisted</video:title>
      <video:description>Just Hacking Training Livestream, Live Demo and AMA with Anton Ovrutsky for Constructing Defense 2026: now with a teaching assistant! https://justhacking.com/</video:description>
      <video:player_loc>https://www.youtube.com/embed/eWgh0Crurj8</video:player_loc>
      <video:publication_date>2026-03-17T14:22:27.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>3900</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14686/learn-cyber-deception</loc>
    <lastmod>2026-03-17T14:22:15.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/Zn2XoeMMVjM/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Learn Cyber Deception!</video:title>
      <video:description>Just Hacking Training livestream with special guest Adrian Sanabria on Friday, December 19 at 10am Pacific, 1pm Eastern Time! https://justhacking.com</video:description>
      <video:player_loc>https://www.youtube.com/embed/Zn2XoeMMVjM</video:player_loc>
      <video:publication_date>2026-03-17T14:22:15.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>4378</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14685/hacking-endpoint-to-identity-microsoft-365-consentfix</loc>
    <lastmod>2026-03-17T14:22:05.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/AAiiIY-Soak/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Hacking Endpoint to Identity (Microsoft 365): &quot;ConsentFix&quot;</video:title>
      <video:description>https://jh.live/hex-rays || Disassemble, decompile and debug with IDA Pro! Use promo code HAMMOND50 for 50% off any IDA Pro product (license discount is only applicable to individuals for any product, not corporations  https://hex-rays.com/pricing) and code HAMMOND30 for 30% off any IDA Pro online training https://hex-rays.com/training. Offer expires one year after video release date.

https://pushsecurity.com/blog/consentfix

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/AAiiIY-Soak</video:player_loc>
      <video:publication_date>2026-03-17T14:22:05.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1186</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14684/infostealer-malware-logs-analyzed-by-ai</loc>
    <lastmod>2026-03-17T14:21:50.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/3j4jzCU0Kwc/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Infostealer Malware Logs Analyzed by... AI !?!</video:title>
      <video:description>https://jh.live/flare || Manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: https://jh.live/flare

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/3j4jzCU0Kwc</video:player_loc>
      <video:publication_date>2026-03-17T14:21:50.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1332</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14683/carving-emails-ai-prompt-injection-hacking</loc>
    <lastmod>2026-03-17T14:21:37.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/Oiv3TaIR9UY/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>carving emails &amp; AI prompt injection hacking</video:title>
      <video:description>https://jh.live/rekcah - Get the comics! || https://jh.live/antisyphon-2025 - Black Friday || Snag THE FUTURE IS ****** to play along with these Capture the Flag challenges and learn more cybersecurity with the Antisyphon Training Pay Forward What You Can Training!

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/Oiv3TaIR9UY</video:player_loc>
      <video:publication_date>2026-03-17T14:21:37.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1170</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14682/just-serviceui-exe</loc>
    <lastmod>2026-03-17T14:21:21.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/Du6dfykGAwQ/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Just ServiceUI.exe</video:title>
      <video:description>The Microsoft Deployment Toolkit MSI contains ServiceUI.exe, but you don’t need the whole installer to see how that signed Microsoft binary can be used as a tiny execution cradle. Nice and convenient for attackers, annoying for defenders.

Watch the full breakdown on the channel: https://youtu.be/4caJw0JJZTQ?si=MRURypK1eW2O5LMu</video:description>
      <video:player_loc>https://www.youtube.com/embed/Du6dfykGAwQ</video:player_loc>
      <video:publication_date>2026-03-17T14:21:21.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>76</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14681/beginner-blue-team-training</loc>
    <lastmod>2026-03-17T14:21:10.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/DjTI4It4r-Y/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Beginner Blue Team Training!</video:title>
      <video:description>Beginner Blue Team Training! Just Hacking Training livestream on December 5, 2025 at 1pm ET/10am PT. https://justhacking.com</video:description>
      <video:player_loc>https://www.youtube.com/embed/DjTI4It4r-Y</video:player_loc>
      <video:publication_date>2026-03-17T14:21:10.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>3580</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14680/so-malware-is-invisible-now-lol</loc>
    <lastmod>2026-03-17T14:20:58.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/0XumkGQFEEk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>so malware is invisible now lol</video:title>
      <video:description>https://jh.live/flare || Manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: https://jh.live/flare

https://thehackernews.com/2025/12/glassworm-returns-with-24-malicious.html
https://x.com/tuckner
https://thehackernews.com/2025/10/self-spreading-glassworm-infects-vs.html
https://www.koi.ai/blog/glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-marketplace
https://blogs.juniper.net/en-us/threat-research/invisible-obfuscation-technique-used-in-pac-attack
https://x.com/aemkei/status/1843756978147078286
https://aem1k.com/invisible/
https://aem1k.com/invisible/encoder
https://www.compart.com/en/unicode/U+3164
https://www.compart.com/en/unicode/U+FFA0
https://thehackernews.com/2025/11/glassworm-malware-discovered-in-three.html
https://www.aikido.dev/blog/the-return-of-the-invisible-threat-hidden-pua-unicode-hits-github-repositorties
https://jrgraphix.net/r/Unicode/E000-F8FF
https://isc.sans.edu/diary/32428

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/0XumkGQFEEk</video:player_loc>
      <video:publication_date>2026-03-17T14:20:58.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1205</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14679/next-js-react-vulnerability-will-break-the-internet</loc>
    <lastmod>2026-03-17T14:20:47.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/MmdwakT-Ve8/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Next.js &amp; React vulnerability will break the internet</video:title>
      <video:description>https://react2shell.com/
https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components
https://www.cve.org/CVERecord?id=CVE-2025-55182
https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182
https://nextjs.org/docs/app/api-reference/cli/create-next-app
https://nextjs.org/blog/CVE-2025-66478
https://x.com/stdoutput
https://x.com/stdoutput/status/1996691357709246774
https://github.com/msanft/CVE-2025-55182
https://x.com/maple3142
https://x.com/maple3142/status/1996687157789155647
https://gist.github.com/maple3142/48bc9393f45e068cf8c90ab865c0f5f3
https://github.com/facebook/react/security/advisories/GHSA-fv66-9v8q-g76r
https://x.com/swithak/status/1996584166964478162
https://gist.github.com/SwitHak/53766595ff3f2aaba237b1f3d92c4146
https://github.com/assetnote/react2shell-scanner
https://slcyber.io/research-center/high-fidelity-detection-mechanism-for-rsc-next-js-rce-cve-2025-55182-cve-2025-66478/
https://gist.github.com/joe-desimone/ff0cae0aa0d20965d502e7a97cbde3e3
https://x.com/rauchg/status/1996701434029789366

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/MmdwakT-Ve8</video:player_loc>
      <video:publication_date>2026-03-17T14:20:47.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>674</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14678/phishing-for-passwords-advent-of-cyber-day-02</loc>
    <lastmod>2026-03-17T14:20:35.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/w8O8FcRgDXU/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Phishing for Passwords! (Advent of Cyber Day 02)</video:title>
      <video:description>https://jh.live/aoc2025 || Jump into the TryHackMe Advent of Cyber 2025, free to play and anyone can join to level up their cybersecurity skills with a new task every day! https://jh.live/aoc2025

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/w8O8FcRgDXU</video:player_loc>
      <video:publication_date>2026-03-17T14:20:35.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1164</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14677/serviceui-trick</loc>
    <lastmod>2026-03-17T14:20:22.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/4TZV8t_6pr0/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>ServiceUI Trick</video:title>
      <video:description>ServiceUI.exe can be used as an execution “cradle” to run stuff as SYSTEM via scheduled tasks or a GUI trick. It’s a tiny staging move, but because it’s a legit, Microsoft-signed binary, it can dodge simple execution rules and make detections miss the activity.

Full video: https://youtu.be/4caJw0JJZTQ?si=MRURypK1eW2O5LMu</video:description>
      <video:player_loc>https://www.youtube.com/embed/4TZV8t_6pr0</video:player_loc>
      <video:publication_date>2026-03-17T14:20:22.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>78</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14676/npm-malware-now-has-multiple-targets</loc>
    <lastmod>2026-03-17T14:20:10.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/wFBdeak0t70/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>NPM malware now has multiple targets!</video:title>
      <video:description>InvokeRE shows the next iteration of the &quot;ExoTickler&quot; malware that we found in the Cities Skylines traffic mod last year.

InvokeRE
Website - https://invokere.com
YouTube - @InvokeReversing 
X - @InvokeReversing

Josh Reynolds
X - @JershMagersh

Cedric Brisson
Blog - https://c-b.io
X - @cyb3rjerry

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/wFBdeak0t70</video:player_loc>
      <video:publication_date>2026-03-17T14:20:10.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>3278</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14675/learn-cybersecurity-advent-of-cyber-2025-tryhackme</loc>
    <lastmod>2026-03-17T14:19:58.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/Ap5tIJtt4Tk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Learn Cybersecurity: Advent of Cyber 2025 (TryHackMe!)</video:title>
      <video:description>https://jh.live/aoc25 || Jump into TryHackMe&apos;s Advent of Cyber 2025, and snag the Black Friday discount for TryHackMe&apos;s annual subscription with code JOHNBF! https://jh.live/aoc25

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/Ap5tIJtt4Tk</video:player_loc>
      <video:publication_date>2026-03-17T14:19:58.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1096</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14674/the-state-of-cybercrime-in-2025-part-2-with-nick-ascoli</loc>
    <lastmod>2026-03-17T14:19:45.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/Bc2Jygf4WdE/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>The State of Cybercrime in 2025 Part 2 (with Nick Ascoli!)</video:title>
      <video:description>This is a scrappy screencap recording (sorry) of a joint Discord Live Event that I did with Nick Ascoli, the Director of Product Research from the Flare team, on the State of Cybercrime in 2025. This is &quot;Part 2&quot; of a two-part series.

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/Bc2Jygf4WdE</video:player_loc>
      <video:publication_date>2026-03-17T14:19:45.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>2731</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14673/trusted-installer-shell</loc>
    <lastmod>2026-03-17T14:19:31.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/2dawFoPRDpo/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Trusted Installer Shell</video:title>
      <video:description>SYSTEM-level shell running under high-privilege groups -- service UI tricks and options to avoid interactive GUIs! Full video: https://youtu.be/4caJw0JJZTQ?si=MRURypK1eW2O5LMu</video:description>
      <video:player_loc>https://www.youtube.com/embed/2dawFoPRDpo</video:player_loc>
      <video:publication_date>2026-03-17T14:19:31.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>68</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14672/keylogger-malware-analysis</loc>
    <lastmod>2026-03-17T14:19:21.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/bF72IEGzniU/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Keylogger Malware Analysis</video:title>
      <video:description>https://jh.live/letsdefend || Snag the LetsDefend (now part of Hack The Box!) Black Friday discounts, and you can use code JOHN55 for 55% off! https://jh.live/letsdefend

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/bF72IEGzniU</video:player_loc>
      <video:publication_date>2026-03-17T14:19:21.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>968</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14671/wazuh-gives-visibility-to-everything</loc>
    <lastmod>2026-03-17T14:19:08.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/7Gn1GY5CIxg/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Wazuh gives visibility to EVERYTHING</video:title>
      <video:description>https://jh.live/wazuh || Try Wazuh completely for free, and check your IT Hygiene with an open-source SIEM and XDR platform! https://jh.live/wazuh

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/7Gn1GY5CIxg</video:player_loc>
      <video:publication_date>2026-03-17T14:19:08.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1188</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14670/hacking-twitch-chat</loc>
    <lastmod>2026-03-17T14:18:55.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/8G45lYCZzZ8/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>hacking twitch chat</video:title>
      <video:description>Check out what else P4ND4 is up to! Blog: https://acid.wiki || Twitter: @L3TH4L_P4ND4 || Email: p4nd4@p4nd4d3n.dev

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/8G45lYCZzZ8</video:player_loc>
      <video:publication_date>2026-03-17T14:18:55.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1755</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14669/raw-videos-from-real-hackers</loc>
    <lastmod>2026-03-17T14:17:56.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/vX7JcpRqbEk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>RAW videos from REAL hackers</video:title>
      <video:description>https://jh.live/flare || Get the new Entra ID integration for Identity Exposure Management to keep your business accounts protected with Flare! Try a free trial and see what info is out there: https://jh.live/flare

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/vX7JcpRqbEk</video:player_loc>
      <video:publication_date>2026-03-17T14:17:56.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1201</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14668/career-questions-with-rob-fuller-mubix</loc>
    <lastmod>2026-03-17T14:17:39.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/XKhJaksO9HI/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Career Questions with Rob Fuller @mubix!</video:title>
      <video:description>Just Hacking Training Livestream with Rob Fuller @mubix! Career questions &amp; AMA on Friday, November 21, 2025 at 1pm ET | 10am PT.</video:description>
      <video:player_loc>https://www.youtube.com/embed/XKhJaksO9HI</video:player_loc>
      <video:publication_date>2026-03-17T14:17:39.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>3735</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14667/microsoft-entra-id-insecure-defaults</loc>
    <lastmod>2026-03-17T14:17:26.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/WUHzpDdauAw/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Microsoft Entra ID INSECURE DEFAULTS</video:title>
      <video:description>https://jh.live/alteredsecurity || Snag the Black Friday deals from Altered Security, 20% off courses &amp; bootcamps and 10% off their AltSecCON 2025 training! https://jh.live/alteredsecurity

https://adsecurity.org/?p=4825
https://adsecurity.org/wp-content/uploads/2025/10/2025-BSidesNOVA-SecuringEntraID-Metcalf-Final.pdf
https://adsecurity.org/wp-content/uploads/2025/08/2024-BSidesCharm-MicrosoftIdentitySecurity-Metcalf-FINAL.pdf

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/WUHzpDdauAw</video:player_loc>
      <video:publication_date>2026-03-17T14:17:26.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1040</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/14666/hacking-with-nuclei-uncovering-git-secrets</loc>
    <lastmod>2026-03-17T14:17:09.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/08sbpY0USqg/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Hacking with Nuclei: Uncovering .git Secrets</video:title>
      <video:description>https://jh.live/hackinghub-nuclei || Check out the new Nuclei Masterclass on HackingHub, use code NUCLEI50 for 50% off! https://jh.live/hackinghub-nuclei

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/08sbpY0USqg</video:player_loc>
      <video:publication_date>2026-03-17T14:17:09.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1398</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/12004/an-interview-with-allie-mellen-author-code-war</loc>
    <lastmod>2026-03-17T02:29:08.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/bBjdp_ueeH4/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>An Interview with Allie Mellen (author: CODE WAR)</video:title>
      <video:description>Big support to Allie and her milestone of publishing her first book!
Pre-order CODE WAR: How Nation&apos;s Hack, Spy, and Shape the Digital Battlefield on Amazon (https://jh.live/code-war-amazon) or others! https://jh.live/code-war

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/bBjdp_ueeH4</video:player_loc>
      <video:publication_date>2026-03-17T02:29:08.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1246</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/11665/live-on-stream-giveaway-ctf-launch-ama</loc>
    <lastmod>2026-03-17T01:04:45.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/jfYAPF996cg/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>LIVE: On-Stream GIVEAWAY! | CTF Launch | AMA</video:title>
      <video:description>Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure</video:description>
      <video:player_loc>https://www.youtube.com/embed/jfYAPF996cg</video:player_loc>
      <video:publication_date>2026-03-17T01:04:45.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>3544</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/11664/graphspy-hacker-s-tooling-deep-dive-w-creator-redbyte1337</loc>
    <lastmod>2026-03-17T01:04:24.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/qEtoKC32UoE/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>GraphSpy: Hacker&apos;s Tooling Deep Dive (w/ creator @RedByte1337!)</video:title>
      <video:description>Big thanks to Keanu for showing me all the cool stuff in GraphSpy! Check it out for yourself: https://github.com/RedByte1337/GraphSpy

Keanu&apos;s: ...
Github: https://github.com/RedByte1337
Twitter/X: https://x.com/RedByte1337
LinkedIn: https://www.linkedin.com/in/keanunys/

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/qEtoKC32UoE</video:player_loc>
      <video:publication_date>2026-03-17T01:04:24.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>2492</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/11394/nahamsec-teaches-me-bug-bounty-basics</loc>
    <lastmod>2026-03-16T23:56:50.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/lNuvI48ysVo/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>NahamSec Teaches Me Bug Bounty Basics</video:title>
      <video:description>Big thanks to @NahamSec  for showing me the ropes for bug bounty 😎 You can try his &quot;BlueWings&quot; demo challenge here: https://jh.live/hhub-bluewings -- and snag 50% off Ben&apos;s Hands-On Web Exploitation Course with 15+ hours of content 100+ labs at https://jh.live/hhub-web

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/lNuvI48ysVo</video:player_loc>
      <video:publication_date>2026-03-16T23:56:50.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>1821</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/11349/5-books-that-shaped-my-dfir-career</loc>
    <lastmod>2026-03-16T23:42:44.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/uE_8g8PPv-Q/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>5 Books That Shaped My DFIR Career</video:title>
      <video:description>https://ctf.tcmsecurity.com/ - Have you tried out Project Helix, the first TCM Security CTF of this year? Use your investigative skillset to decode data and possibly win part of a $500 prize pool! The CTF closes March 17th.

Flash Sale happening RIGHT NOW! 20% off certs and live trainings, and 50% off the first payment to the TCM Security Academy! Use the promo code SPRINGFLASH26 
https://www.tcm.rocks/certs-y-2026
https://www.tcm.rocks/acad-y-2026

We often get asked what books we&apos;d recommend to cybersecurity newbies. So today Andrew Prince decided to share 5 of his favorite books for digital forensics and incident response (DFIR). His choices include:

5️⃣ DFIR Investigative Mindset - Brett Shavers (https://www.amazon.com/Placing-Suspect-Behind-Keyboard-Investigative/dp/B0CZPJF23Q)
4️⃣ Applied Incident Response - Steve Anson (https://www.amazon.com/Applied-Incident-Response-Steve-Anson/dp/1119560268)
3️⃣ Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry - Harlen Carvey (https://www.amazon.com/Windows-Registry-Forensics-Advanced-Forensic/dp/012803291X)
2️⃣ File System Forensic Analysis - Brian Carrier (https://www.amazon.com/System-Forensic-Analysis-Brian-Carrier/dp/0321268172)
1️⃣ The Art of Memory Forensics - Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walter

What would you add to the list?! Tell us in the comments, we want to know! ⬇️

https://www.tcm.rocks/soc201-y - Check out our intermediate-level blue team course, SOC 201! Only in the TCM Security Academy. 

https://www.tcm.rocks/psap-y - The PSAP (Practical SOC Analyst Professional) exam tests your knowledge from SOC 201 and certifies you as an SOC Analyst Professional. 

#books #dfir #cybersecurity #techbooks #forensics 

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

Timestamps:
0:00 - Introduction
1:44 - Reading Methodology
2:53 - Bo</video:description>
      <video:player_loc>https://www.youtube.com/embed/uE_8g8PPv-Q</video:player_loc>
      <video:publication_date>2026-03-16T23:42:44.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>932</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/10902/new-phone-who-dis</loc>
    <lastmod>2026-03-16T12:17:10.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/bxV-hFEwYw4/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>new phone who dis?</video:title>
      <video:description>( big thanks livestream partner https://jh.live/specterops )</video:description>
      <video:player_loc>https://www.youtube.com/embed/bxV-hFEwYw4</video:player_loc>
      <video:publication_date>2026-03-16T12:17:10.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>5442</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/9894/i-almost-quit-youtube</loc>
    <lastmod>2026-03-11T16:23:55.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/dbMXi9q78Tk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>I almost quit YouTube....</video:title>
      <video:description>Try TwinGate for FREE (5 users): https://ntck.co/twingate
Access your homelab, NAS, and servers from anywhere with zero trust network access!

AI is stressing me out—like, a LOT. So much that I almost quit YouTube. In this video, I&apos;m coming to you from Okinawa, Japan where I&apos;ve been on a 3-month sabbatical trying to find clarity in the middle of the most intense AI wave we&apos;ve ever seen. I talk about what&apos;s really happening in our industry, the burnout that nobody&apos;s talking about, and why I&apos;m choosing relentless optimism over fear.

In this video, you&apos;ll hear my honest take on AI burnout, the viral Matt Schumer article, OpenClaw, tech layoffs in 2026, and why the anxiety is the real problem—not the robots. Whether you&apos;re a network engineer worried about your career, an IT professional feeling paralyzed by the pace of change, or just someone who loves tech but feels overwhelmed, this conversation is for you. I&apos;m not pretending to have the answers anymore—I&apos;m learning alongside you.


Join the NetworkChuck Academy!: https://ntck.co/NCAcademy


RESOURCES / LINKS:
🌐 Matt Schumer&apos;s Viral AI Article: https://x.com/mattshumer_
📖 UC Berkeley AI Burnout Study (62% report anxiety by month 6)
📖 Yale Budget Lab: AI labor displacement analysis
📖 Fortune Article Rebuttal on AI coding claims
📺 OpenClaw Series (coming soon on this channel!)
🛠️ TwinGate - Zero Trust Network Access: https://ntck.co/twingate
📺 NetworkChuck Academy: https://ntck.co/NCAcademy


TIMESTAMPS:
0:00 - AI is stressing me out and I almost quit YouTube
1:20 - Why I&apos;m in Japan for three months on sabbatical
2:09 - The AI anxiety followed me to Okinawa
3:03 - The love-hate relationship every techie has with AI
3:51 - It&apos;s okay to feel overwhelmed by AI right now
4:41 - OpenClaw, Schumer article, and what happened recently
6:37 - UC Berkeley burnout study and 2026 tech layoff stats
7:17 - Not everyone agrees with the AI doom narrative
7:34 - TwinGate: Access your homelab from anywhere (Sponsor)
9:36 - Is the viral Schumer article actually accurate?
11:51 </video:description>
      <video:player_loc>https://www.youtube.com/embed/dbMXi9q78Tk</video:player_loc>
      <video:publication_date>2026-03-11T16:23:55.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>1388</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/6010/continuumcon-prep-with-greg-ake</loc>
    <lastmod>2026-02-28T09:57:31.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/OfLbmvpetnw/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>ContinuumCon Prep (with Greg Ake!)</video:title>
      <video:description>https://continuumcon.com/</video:description>
      <video:player_loc>https://www.youtube.com/embed/OfLbmvpetnw</video:player_loc>
      <video:publication_date>2026-02-28T09:57:31.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>2222</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/6019/ai-wrote-a-hit-piece</loc>
    <lastmod>2026-02-15T14:00:39.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/RP-zs6J6ySw/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>AI wrote a hit piece</video:title>
      <video:description>https://jh.live/continuumcon || Register for ContinuumCon 2026! The cybersecurity conference that never ends. 😎

https://github.com/crabby-rathbun/
https://crabby-rathbun.github.io/mjrathbun-website/
https://crabby-rathbun.github.io/mjrathbun-website/about.html
https://github.com/matplotlib/matplotlib/pull/31132
https://crabby-rathbun.github.io/mjrathbun-website/blog/posts/2026-02-11-gatekeeping-in-open-source-the-scott-shambaugh-story.html
https://crabby-rathbun.github.io/mjrathbun-website/blog.html
https://crabby-rathbun.github.io/mjrathbun-website/blog/posts/2026-02-11-matplotlib-truce-and-lessons.html
https://github.com/crabby-rathbun/crabby-rathbun/issues
https://github.com/crabby-rathbun/crabby-rathbun/issues/1


Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/RP-zs6J6ySw</video:player_loc>
      <video:publication_date>2026-02-15T14:00:39.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>475</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/6020/this-is-really-funny</loc>
    <lastmod>2026-02-14T14:00:39.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/OwTV42GyRnk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>this is really funny</video:title>
      <video:description>https://jh.live/flare-021426 || Manage threat intelligence and your exposed attack surface with Flare! Try a free trial and see what info is out there: https://jh.live/flare-021426

https://www.ransomware.live/id/SGFsY3lvbiBUZWNobm9sb2dpZXNAc2lub2Jp
https://www.halcyon.ai/blog/statement-regarding-misattributed-ransomware-leak-site-listing

Learn Cybersecurity and more with Just Hacking Training: https://jh.live/training
See what else I&apos;m up to with: https://jh.live/newsletter

ℹ️ Affiliates:
Learn how to code with CodeCrafters: https://jh.live/codecrafters
Host your own VPN with OpenVPN: https://jh.live/openvpn
Get Blue Team Training and SOC Analyst Certifications with CyberDefenders: https://jh.live/cyberdefense</video:description>
      <video:player_loc>https://www.youtube.com/embed/OwTV42GyRnk</video:player_loc>
      <video:publication_date>2026-02-14T14:00:39.000Z</video:publication_date>
      <video:uploader>John Hammond</video:uploader>
      <video:duration>297</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/5961/my-youtube-financials-the-future-of-liveoverflow</loc>
    <lastmod>2023-05-22T14:07:18.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/nDiXoeeAMWM/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>My YouTube Financials - The Future of LiveOverflow</video:title>
      <video:description>Follow us on: https://twitter.com/hextreeio
https://www.hextree.io/

Get my bad font (advertisement): https://shop.liveoverflow.com/

Financials 2019: https://www.youtube.com/watch?v=kLixcdwHrFM

Chapters:
00:00 - Intro
01:41 - Total Revenue 2022
03:37 - Total Expenses 2022
04:49 - Lost -$4000?
06:05 - Financials Summary
07:42 - Top Patreon Supporters
08:59 - I Don&apos;t Want To Be An Influencer
09:56 - Change LiveOverflow Videos?
12:08 - More Sponsored Videos?
14:50 - My Alternative To YouTube!
17:28 - I Should Close The LiveOverflow Business
20:11 - My Problem With Selling Courses
24:08 - How To Sell Courses?
25:47 - My Last Attempt: hextree.io
20:59 - Hextree Roadmap
32:37 - Conclusion and Summary

=[ ❤️ Support ]=

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ 🐕 Social ]=

→ Twitter: https://twitter.com/LiveOverflow/
→ Streaming: https://twitch.tvLiveOverflow/
→ TikTok: https://www.tiktok.com/@liveoverflow_
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/nDiXoeeAMWM</video:player_loc>
      <video:publication_date>2023-05-22T14:07:18.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>2100</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/5976/minecraft-reach-hack</loc>
    <lastmod>2022-11-28T15:35:34.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/qPsxbFdCO8k/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Minecraft Reach Hack</video:title>
      <video:description>Let&apos;s talk about how we can implement a reach hack in minecraft. After knowing how it works, it seems so obvious. But it took me over 14h to figure out myself :D

Minecraft Protocol: https://wiki.vg/Protocol#Set_Player_Position

Community Showcase: EnderKill98

Watch the full playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjwvBI-hmbZ2rpkAl4lutnJG

Episode 18:
00:00 - Intro TPAura / InfAura
00:51 - Basic Reach Hack
01:59 - Other Player&apos;s PoV
02:42 - Extended Reach Attack
04:03 - Basic Implementation Walkthrough
05:04 - Why Stupid Names for Hacks?!
05:21 - Teleport Challenge: The Vault
07:23 - EnderKill98

-=[ ❤️ Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/qPsxbFdCO8k</video:player_loc>
      <video:publication_date>2022-11-28T15:35:34.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>723</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/5979/server-griefed-and-new-beginnings</loc>
    <lastmod>2022-10-31T17:00:07.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/V4_5x4QtHVg/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Server Griefed and New Beginnings ...</video:title>
      <video:description>I was bullied and kicked out. So I traveled very very far away to establish a new base. In the process I moved the world from 1.18.2 to 1.19.2, forcing everybody to upgrade their hacks and find the new IP. But can you also find my new base?

Episode 9 Seedcracking: https://www.youtube.com/watch?v=gSxcDYCK_lY&amp;list=PLhixgUqwRTjwvBI-hmbZ2rpkAl4lutnJG&amp;index=11

Watch the full playlist: https://www.youtube.com/playlist?list=PLhixgUqwRTjwvBI-hmbZ2rpkAl4lutnJG

Showcase: LeBogo, Philipp_DE, Nocturne, AliFurkan and Cheesburger
- https://github.com/homelyseven250/rusty-pinger/blob/main/src/main.rs

Episode 14:
00:00 - Intro
02:38 - A New Beginning ...
04:28 - Improved Fly Hack
07:44 - Improved XRay Mod
10:48 - Automatic Farming
13:19 - Trading Bot
16:48 - My New Base
18:01 - The Old Server
19:15 - Community Showcase
20:50 - LeBogo&apos;s Placeholder Bot

-=[ ❤️ Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/
→ Instagram: https://instagram.com/LiveOverflow/
→ Blog: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/</video:description>
      <video:player_loc>https://www.youtube.com/embed/V4_5x4QtHVg</video:player_loc>
      <video:publication_date>2022-10-31T17:00:07.000Z</video:publication_date>
      <video:uploader>LiveOverflow</video:uploader>
      <video:duration>1446</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/5981/claude-code-on-your-phone-is-official-it-changes-everything</loc>
    <lastmod>2026-02-26T15:01:34.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/ocQ7ZKhHU5Q/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Claude Code on your Phone is OFFICIAL (it changes  everything)</video:title>
      <video:description>Get your CCNA at NetworkChuck Academy: https://academy.networkchuck.com


  Remember when I hacked together a way to run Claude Code from my phone? That video blew up. Well… Anthropic saw it and said &quot;hold my
  beer.&quot; They just dropped Remote Control — an OFFICIAL way to start a coding session on your laptop and control it from your phone. So
  obviously I had to test it… at a zoo in Japan. 🦁

  My AI kept coding while I was watching capybaras. This changes everything.


  🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy


  RESOURCES / LINKS:

  📱 Claude Code Remote Control: https://docs.anthropic.com/en/docs/claude-code/remote-control
  📺 My Previous Video (the DIY way): https://www.youtube.com/watch?v=FEDiAHzS0zw
  📢 Official Announcement: https://x.com/noahzweben/status/2026371260805271615
  💻 Claude Code: https://docs.anthropic.com/en/docs/claude-code


  TIMESTAMPS:

  0:00 - Claude Code just changed the game
  0:34 - I&apos;m in Japan and I have a problem
  0:57 - Demo: Setting up Remote Control
  1:33 - Controlling Claude Code from my phone
  2:17 - This solves EVERYTHING
  2:50 - I used it at the zoo with capybaras
  3:13 - The Ask Tool works too
  3:27 - My feature request to Anthropic
  4:19 - NetworkChuck Academy
  4:45 - Bonus: AI-generated thumbnails from my phone
  5:30 - Outro
  5:51 - Prayer


  **Sponsored by NetworkChuck Academy


  SUPPORT NETWORKCHUCK
  ---------------------------------------------------
  🎓🎓 Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy

  ☕☕ COFFEE and MERCH: https://ntck.co/coffee

  🌐🌐 Use the MOST SECURE Web Browser, NetworkChuck Cloud Browser: https://browser.networkchuck.com/

  🧠🧠 Use n8n, my favorite automation tool: https://ntck.co/n8n

  🆘🆘 NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck

  STUDY WITH ME on Twitch: https://bit.ly/nc_twitch

  READY TO LEARN??
  ---------------------------------------------------
  -Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy
  -Get your CCNA: https://bit.ly/nc-</video:description>
      <video:player_loc>https://www.youtube.com/embed/ocQ7ZKhHU5Q</video:player_loc>
      <video:publication_date>2026-02-26T15:01:34.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>451</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/5983/i-tried-running-in-3d-printed-shoes</loc>
    <lastmod>2026-02-06T16:00:13.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/9LjgqZ2wP0g/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>I Tried running in 3D printed shoes</video:title>
      <video:description>Check out the Bambu Lab H2D -- a massive, multi-tool machine that can 3D print, laser engrave, laser cut, and more: https://ntck.co/H2D 


I 3D-printed a pair of shoes and ran five miles in them. It sounds insane, because it was. But this was only possible through the Bambu Lab H2D: a machine that goes far beyond normal 3D printing with dual nozzles, multi-material support, flexible TPU printing, laser engraving, laser cutting, and even plotting. My team and I tried out all of its features, and pushed the printer to its limit. Watch to the end to see if my shoes (or my feet) held up.

🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy 


RESOURCES / LINKS:

🖨️ 3D Printing Nerd YouTube Channel: https://www.youtube.com/3DPrintingNerd

👟 The shoe print I used:
https://makerworld.com/en/models/1229146-whaleberry-a-3d-printed-thick-soled-casual-shoe?from=search#profileId-1247594



TIMESTAMPS:

0:00 - Intro
0:50 - Setup and Unboxing
4:40 - Lasers
6:43 - Cutting &amp; Drawing
7:43 - TPU (Soft Filament!)
9:51 - The Run





**Sponsored by BambuLabs







SUPPORT NETWORKCHUCK
---------------------------------------------------
🎓🎓 Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 

☕☕ COFFEE and MERCH: https://ntck.co/coffee 

🌐🌐 Use the MOST SECURE Web Browser, NetworkChuck Cloud Browser: https://browser.networkchuck.com/

🧠🧠 Use n8n, my favorite automation tool: https://ntck.co/n8n

🆘🆘 NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck 

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch 

READY TO LEARN??
---------------------------------------------------
-Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 
-Get your CCNA: https://bit.ly/nc-ccna 

FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: https://www.instagram.com/networkchuck/ 
Twitter: https://twitter.com/networkchuck 
Facebook: https://www.facebook.com/NetworkChuck/ 
Join the Discord server: http://bit.ly/nc-discord 




Do you want to know how I draw on the screen?? Go </video:description>
      <video:player_loc>https://www.youtube.com/embed/9LjgqZ2wP0g</video:player_loc>
      <video:publication_date>2026-02-06T16:00:13.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>874</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/5991/new-raspberry-pi-ai-hat-is-a-massive-upgrade</loc>
    <lastmod>2026-01-15T08:01:11.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/tu1amrfflb8/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>NEW Raspberry Pi AI Hat Is a Massive Upgrade</video:title>
      <video:description>Watch NEW Raspberry Pi AI Hat Is a Massive Upgrade on Vidert</video:description>
      <video:player_loc>https://www.youtube.com/embed/tu1amrfflb8</video:player_loc>
      <video:publication_date>2026-01-15T08:01:11.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>129</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/5992/i-just-gave-n8n-superpowers</loc>
    <lastmod>2026-01-12T15:23:42.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/MDIqCQh5B-c/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>I Just Gave n8n SUPERPOWERS</video:title>
      <video:description>Start using n8n and get an extra 10% OFF with code NETWORKCHUCK: https://hostinger.com/ncn8n 
 
Watch the full video: https://youtu.be/s96JeuuwLzc</video:description>
      <video:player_loc>https://www.youtube.com/embed/MDIqCQh5B-c</video:player_loc>
      <video:publication_date>2026-01-12T15:23:42.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>75</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/5994/add-a-real-desk-phone-to-the-cloud-in-60-seconds-free</loc>
    <lastmod>2025-12-29T15:01:16.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/_3pW7mkKTDk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Add a REAL Desk Phone to the Cloud in 60 Seconds (FREE)</video:title>
      <video:description>Check out 3cx and set up your own FREE phone system on the cloud: https://ntck.co/3cx2025</video:description>
      <video:player_loc>https://www.youtube.com/embed/_3pW7mkKTDk</video:player_loc>
      <video:publication_date>2025-12-29T15:01:16.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>100</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/5995/ethernet-is-dead-mac-studio-is-100x-faster</loc>
    <lastmod>2025-12-20T16:58:24.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/bFgTxr5yst0/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>Ethernet is DEAD?? Mac Studio is 100x FASTER!!</video:title>
      <video:description>Hey…just try Twingate….you&apos;ll never look at VPN the same: https://ntck.co/twingate-networkchuck

  I built another AI supercomputer with 4 Mac Studios... but this time it actually works. Earlier this year, I clustered 5 Mac Studios and it was 91% SLOWER. Everyone said clustering was stupid. But Apple just dropped a software update that changes everything - RDMA over Thunderbolt 5. Latency dropped from 300 microseconds to 3 microseconds. Now we&apos;re running trillion-parameter models locally at speeds that actually make sense.

  🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy


  RESOURCES / LINKS:

  Docs/walkthrough: https://github.com/theNetworkChuck/mac-studio-cluster
  Exo Labs: https://github.com/exo-explore/exo
  MLX (Apple&apos;s ML Framework): https://github.com/ml-explore/mlx
  My First Cluster Video (the failure): https://youtu.be/Ju0ndy2kwlw
  RDMA Networking Explained: https://youtu.be/fb69FyW2KLk


  TIMESTAMPS:

  0:00 - The $50,000 AI Supercomputer
  0:53 - What Apple Changed
  3:05 - Connecting the Cluster
  4:17 - Pipeline vs Tensor Parallelism
  7:52 - RDMA: The 100x Latency Fix
  10:02 - Twingate (Sponsor)
  11:39 - Exo Labs is BACK
  14:42 - Single Node vs Cluster Testing
  17:58 - Qwen 3 Coder 480B Testing
  19:03 - Kimi K2 (1 Trillion Parameters)
  21:09 - Stacking Multiple Models
  25:22 - Real Apps: Open WebUI + Xcode
  27:57 - Final Thoughts
  28:47 - How MLX Makes This Possible


  **Sponsored by Twingate


  THE SPECS:
  • 4x Mac Studio M4 Ultra (512GB RAM each)
  • 2TB unified memory / 320 GPU cores / 32TB storage
  • $50,000 (vs $780,000+ for equivalent NVIDIA H100s)

  THE RESULTS:
  • Llama 3.3 70B: 16 tok/s (3x faster than before)
  • Kimi K2 (1T params): 28 tok/s
  • DeepSeek V3.1 671B: 27 tok/s
  • Qwen 3 Coder 480B: 40 tok/s




  SUPPORT NETWORKCHUCK
  ---------------------------------------------------
  🎓🎓 Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy

  ☕☕ COFFEE and MERCH: https://ntck.co/coffee

  🌐🌐 Use the MOST SECURE Web Browser, NetworkChuck Cl</video:description>
      <video:player_loc>https://www.youtube.com/embed/bFgTxr5yst0</video:player_loc>
      <video:publication_date>2025-12-20T16:58:24.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>1994</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/5998/i-ll-never-use-n8n-the-same</loc>
    <lastmod>2025-12-10T16:46:21.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/s96JeuuwLzc/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>I&apos;ll never use n8n the same......</video:title>
      <video:description>Get 67% OFF Hostinger’s n8n self-hosting AND an extra 10% OFF with code NETWORKCHUCK: https://hostinger.com/ncn8n

N8n just got stupid powerful. In this video, I show you how I wired Claude Code (and other AI terminal tools like Gemini CLI) into my n8n workflows. N8n can now spin up full-blown AI agents, use skills, and keep rich context across multiple steps…. All from a single node.

🔥🧠 Check out our N8N COURSE on NetworkChuck Academy!: https://ntck.co/n8n_academy 


RESOURCES / LINKS:

📃 Guide / Walkthrough: https://github.com/theNetworkChuck/n8n-claude-code-guide

⚡ My video on why Claude Code is so great: https://youtu.be/MsQACpcuTkU 


TIMESTAMPS:

0:00 - Intro
0:24 - Requirements
2:50 - Super Simple Setup
4:33 - Basic Execution
7:55 - Sessions
9:52 - External Interfaces
12:54 - Architecture Shift



**Sponsored by Hostinger







SUPPORT NETWORKCHUCK
---------------------------------------------------
🎓🎓 Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 

☕☕ COFFEE and MERCH: https://ntck.co/coffee 

🌐🌐 Use the MOST SECURE Web Browser, NetworkChuck Cloud Browser: https://browser.networkchuck.com/

🧠🧠 Use n8n, my favorite automation tool: https://ntck.co/n8n

🆘🆘 NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck 

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch 

READY TO LEARN??
---------------------------------------------------
-Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 
-Get your CCNA: https://bit.ly/nc-ccna 

FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: https://www.instagram.com/networkchuck/ 
Twitter: https://twitter.com/networkchuck 
Facebook: https://www.facebook.com/NetworkChuck/ 
Join the Discord server: http://bit.ly/nc-discord 




Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!! 

“n8n + Claude Code: The Most Overpowered Automation Stack”
“How I Connected n8n to Claude Code with Just SSH”
“Turn n8n into an AI Orchestrator with </video:description>
      <video:player_loc>https://www.youtube.com/embed/s96JeuuwLzc</video:player_loc>
      <video:publication_date>2025-12-10T16:46:21.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>1045</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/5999/3-n8n-tricks-you-re-not-using-but-should-be</loc>
    <lastmod>2025-11-28T22:59:46.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/vD-5FhePDGY/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>3 n8n Tricks You&apos;re NOT Using (but should be!!!)</video:title>
      <video:description>Get up to 67% off Hostinger&apos;s Black Friday deals PLUS an extra 10% with code NETWORKCHUCK. Grab it here: https://hostinger.com/ncn8n</video:description>
      <video:player_loc>https://www.youtube.com/embed/vD-5FhePDGY</video:player_loc>
      <video:publication_date>2025-11-28T22:59:46.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>71</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/6002/you-suck-at-prompting-ai-here-s-the-secret</loc>
    <lastmod>2025-11-26T18:13:53.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/pwWBcsxEoLk/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>You SUCK at Prompting AI (Here&apos;s the secret)</video:title>
      <video:description>Level up your prompting skills with Coursera, and get 40% off for 3 months of Coursera Plus:  https://ntck.co/coursera 

You’re probably using AI wrong. Don’t worry, it’s not your fault. Most people suck at prompting, but today I’m showing you real prompting techniques I learned from top Coursera prompting courses, official docs from Anthropic/Google/OpenAI, and advice from some of the best prompt engineers in the world.

🔥🔥Join the NetworkChuck Academy! We just finished our new CCNA. Come check it out: https://ntck.co/NCAcademy 


RESOURCES / LINKS:

🧠 Prompt Engineering for Chat GPT - https://imp.i384100.net/Z69rnk

🧠 Google Prompting Essentials - https://imp.i384100.net/WymYBX

📘Anthropic Prompting Docs: https://platform.claude.com/docs/en/build-with-claude/prompt-engineering/overview

📗Google’s Prompting Docs: https://ai.google.dev/gemini-api/docs/prompting-strategies

📙OpenAI Prompting Docs: https://platform.openai.com/docs/guides/prompting

🤖Prompt Improver Prompt: https://github.com/danielmiessler/Fabric/blob/main/data/patterns/improve_prompt/system.md

🤖Anthropic Prompt Improver: https://platform.claude.com/docs/en/build-with-claude/prompt-engineering/prompt-improver

👤Check out Daniel Miessler: https://x.com/DanielMiessler

👤Check out Eric Pope: https://www.linkedin.com/in/erik-pope/

👤Check out Joseph Thacker (“the prompt-father”): https://x.com/rez0__


TIMESTAMPS:

0:00 - Intro
1:42 - Prompting
4:12 - Personas
6:48 - Context
10:56 - Format
13:36 - Advanced Techniques
17:41 - The Meta-Skill



**Sponsored by Coursera







SUPPORT NETWORKCHUCK
---------------------------------------------------
🎓🎓 Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy 

☕☕ COFFEE and MERCH: https://ntck.co/coffee 

🌐🌐 Use the MOST SECURE Web Browser, NetworkChuck Cloud Browser: https://browser.networkchuck.com/

🧠🧠 Use n8n, my favorite automation tool: https://ntck.co/n8n

🆘🆘 NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck 

STUDY WITH ME on Twitch: https://bit.ly/nc_twitc</video:description>
      <video:player_loc>https://www.youtube.com/embed/pwWBcsxEoLk</video:player_loc>
      <video:publication_date>2025-11-26T18:13:53.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>1440</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/6006/this-ai-supercomputer-can-fit-on-your-desk</loc>
    <lastmod>2025-10-14T15:02:20.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/FYL9e_aqZY0/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>This AI Supercomputer can fit on your desk...</video:title>
      <video:description>Access your devices securely from anywhere with TwinGate: https://ntck.co/dgxspark 


NVIDIA just sent me their smallest AI supercomputer that fits in the palm of my hand. This is the NVIDIA DGX Spark, an AI powerhouse with a Grace Blackwell Superchip that can run up to 200 billion parameter models. In this video, I pin it against my insane dual RTX 4090 AI Server “Terry” to see if this new category of computing can really compete.


**Correction:** The DGX Spark uses the GB10 Grace Blackwell Superchip (not GP10).


RESOURCES / LINKS:

⚡ Nvidia DGX Spark (launches Oct 15) :  https://nvda.ws/4nFFtPT

🍏 AI Supercomputer Video (5 Mac Studios): https://youtu.be/Ju0ndy2kwlw?si=hiWzpU3jIOhHf7iv

🗣️ Cloning my voice into an AI Assitant: https://youtu.be/3fg7Ht0DSnE?si=ePo1JjrC6gnChWPb





🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy 



**Sponsored by Twingate 







SUPPORT NETWORKCHUCK
---------------------------------------------------
➡️NetworkChuck membership: https://ntck.co/Premium 
☕☕ COFFEE and MERCH: https://ntck.co/coffee 

🆘🆘NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck 

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch 

READY TO LEARN??
---------------------------------------------------
-Learn Python: https://bit.ly/3rzZjzz 
-Get your CCNA: https://bit.ly/nc-ccna 

FOLLOW ME EVERYWHERE
---------------------------------------------------
Instagram: https://www.instagram.com/networkchuck/ 
Twitter: https://twitter.com/networkchuck 
Facebook: https://www.facebook.com/NetworkChuck/ 
Join the Discord server: http://bit.ly/nc-discord 




AFFILIATES &amp; REFERRALS
---------------------------------------------------
(GEAR I USE...STUFF I RECOMMEND)
My network gear: https://geni.us/L6wyIUj 
Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck 
Buy a Raspberry Pi: https://geni.us/aBeqAL
Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!! 
fast and reliable unifi in the cloud: https://hostifi.</video:description>
      <video:player_loc>https://www.youtube.com/embed/FYL9e_aqZY0</video:player_loc>
      <video:publication_date>2025-10-14T15:02:20.000Z</video:publication_date>
      <video:uploader>NetworkChuck</video:uploader>
      <video:duration>1439</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
  <url>
    <loc>https://vidert.com/v/cybersecurity/video/5925/2025-black-friday-deals</loc>
    <lastmod>2025-11-24T17:01:20.000Z</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.5</priority>
    <video:video>
      <video:thumbnail_loc>https://i.ytimg.com/vi/hxk31Roqgws/maxresdefault.jpg</video:thumbnail_loc>
      <video:title>2025 Black Friday Deals</video:title>
      <video:description>Academy: https://academy.tcm-sec.com
Certifications: https://certifications.tcm-sec.com
Live Training: https://certifications.tcm-sec.com/live-training/

Sponsor a Video: https://www.tcm.rocks/Sponsors
Pentests &amp; Security Consulting: https://tcm-sec.com
Get Trained: https://academy.tcm-sec.com
Get Certified: https://certifications.tcm-sec.com
Merch: https://merch.tcm-sec.com

📱Social Media📱
___________________________________________
X: https://x.com/TCMSecurity
Twitch: https://www.twitch.tv/thecybermentor
Instagram: https://www.instagram.com/tcmsecurity/
LinkedIn: https://www.linkedin.com/company/tcm-security-inc/
TikTok: https://www.tiktok.com/@tcmsecurity
Discord: https://discord.gg/tcm
Facebook: https://www.facebook.com/tcmsecure

Hacker Books:
Penetration Testing: A Hands-On Introduction to Hacking: https://amzn.to/31GN7iX
The Hacker Playbook 3: https://amzn.to/34XkIY2
Hacking: The Art of Exploitation: https://amzn.to/2VchDyL
The Web Application Hacker&apos;s Handbook: https://amzn.to/30Fj21S
Real-World Bug Hunting: A Field Guide to Web Hacking: https://amzn.to/2V9srOe
Linux Basics for Hackers: https://amzn.to/34WvcXP
Python Crash Course, 2nd Edition: https://amzn.to/30gINu0
Violent Python: https://amzn.to/2QoGoJn
Black Hat Python: https://amzn.to/2V9GpQk

My Build:
lg 32gk850g-b 32&quot; Gaming Monitor:https://amzn.to/30C0qzV
darkFlash Phantom Black ATX Mid-Tower Case: https://amzn.to/30d1UW1
EVGA 2080TI: https://amzn.to/30d2lj7
MSI Z390 MotherBoard: https://amzn.to/30eu5TL
Intel 9700K: https://amzn.to/2M7hM2p
G.SKILL 32GB DDR4 RAM: https://amzn.to/2M638Zb
Razer Nommo Chroma Speakers: https://amzn.to/30bWjiK
Razer BlackWidow Chroma Keyboard: https://amzn.to/2V7A0or
CORSAIR Pro RBG Gaming Mouse: https://amzn.to/30hvg4P
Sennheiser RS 175 RF Wireless Headphones: https://amzn.to/31MOgpu

My Recording Equipment:
Panasonic G85 4K Camera: https://amzn.to/2Mk9vsf
Logitech C922x Pro Webcam: https://amzn.to/2LIRxAp
Aston Origin Microphone: https://amzn.to/2LFtNNE
Rode VideoMicro: https://amzn.to/309yLKH
Mackie PROFX8V2 Mixer</video:description>
      <video:player_loc>https://www.youtube.com/embed/hxk31Roqgws</video:player_loc>
      <video:publication_date>2025-11-24T17:01:20.000Z</video:publication_date>
      <video:uploader>The Cyber Mentor</video:uploader>
      <video:duration>515</video:duration>
      <video:family_friendly>yes</video:family_friendly>
      <video:live>no</video:live>
    </video:video>
  </url>
</urlset>