what's the best live hunting vid you came across?

Cyber SubReddits
Unlock Carrier on Android
Thoughts on Sumo Logic SIEM
Why use an Access Control Service?
Xz Package Vuln
What are the "best" tools and tool types for small businesses? What tools and types should be avoided?
After Zuckerberg’s email, the Onavo team took on the project and a month later proposed a solution: so-called kits that can be installed on iOS and Android that intercept traffic for specific subdomains, “allowing us to read what would otherwise be encrypted traffic so we can measure in-app usage,”
Crowdstrike job
"Coding Challenges in Security Engineering Interviews at FAANG Companies"
AT&T Massive Data Breach
Truth
Copying encrypted rfid tags
Devs are truly athletes!
Do NOT install Global Themes - Some wipe out ALL YOUR DATA
Vulnerability management for large data
Gartner???
Former telecom manager admits to doing SIM swaps for $1,000
An error in security validation process?
DevSecOps: How to secure web application with AWS WAF and CloudWatch
Masters in Georgia Tech
Hardware Positions in Cybersecurity?
BAV2ROPC (useragent) in o365
Backdoor found in widely used Linux utility breaks encrypted SSH connections
Michigan State Funding for cybersecurity dry up?
Malware Name and Threat Name Terms
How does xz's backdoor rewrite the entry of RSA_public_decrypt@....plt ?
Move from Cybersecurity to AI?
Navigating Cybersecurity and Surveillance: Iran [Regime]'s Dual Strategy for National Security | The Washington Institute 2024
Cybersecurity vs IA
XZ Utils has a backdoor