logo
episode-header-image
May 2024
1h 48m

Hacker : « Je prépare un hack qui m’enve...

Sans Permission - By Yomi & Oussama
About this episode

Plongez dans le monde fascinant de la cybersécurité et du hacking avec cette vidéo exclusive. Dans cette conversation franche et provocante, explorez les motivations, les défis et les implications éthiques des activités de hacking avec un hacker expérimenté, Rabbin des bois. Découvrez les coulisses du monde du hacking, des motivations sous-jacentes aux techniques utilisées pour infiltrer les systèmes informatiques.


Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.

Up next
Oct 2
On fracasse les tabous : amitié, jets privés, liberté et milliardaires - Ft Hakim Benotmane
Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations. 
2h 8m
Sep 18
Sans Permission PIRATÉ : Déclin de la France, Squatters et Business Physiques - Feat Hakim Benotmane
Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations. 
1h 8m
Apr 2025
Ex-militaire : ”Les gens me demandent toujours combien de personnes j’ai tué”
Bienvenue dans cette nouvelle vidéo ! Aujourd’hui, on accueille un ex-militaire qui partage son expérience sur le terrain, les clichés sur son métier et la question qu’on lui pose sans cesse : combien de personnes a-t-il tuées ? Une discussion franche sur la réalité du combat, l’ ... Show More
1h 36m
Recommended Episodes
Oct 2023
HACKER, IL ARRIVE À RENTRER PHYSIQUEMENT DANS DES BÂTIMENTS ULTRA SURVEILLÉS
<p>Merci à Sylvain Hajri d'être venu nous présenter son métier extraordinaire de hacker et expert en cybersécurité.</p><br><p>Retrouvez l'offre exclusive de NordVPN juste ici ➡️ <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa3A2MS1ZczVP ... Show More
1h 24m
Jan 2025
Hacking the bureau.
The FBI warns agents of hacked call and text logs. The US Treasury sanctions entities tied to North Korea’s fake IT worker operations. Russian hacking group Star Blizzard attempted to infiltrate WhatsApp accounts of nonprofits supporting Ukraine. Yubico discloses a critical vulne ... Show More
34m 16s
Nov 8
A Former Black Hat Hacker Advises Us On Security Weaknesses
Unveiling the Double-Edged Sword of AI in Cybersecurity with Brian Black In this episode of Cybersecurity Today, host Jim Love interviews Brian Black, the head of security engineering at Deep Instinct and a former black hat hacker. Brian shares his journey into hacking from a you ... Show More
55m 44s
Aug 2024
“Security is an Illusion” Ethical Hacker Exposes Child Predators & Tools To Protect Against Hackers | PBD Podcast | Ep. 460
<p>Patrick Bet-David sits down with Ryan Montgomery, a renowned ethical hacker known for his expertise in cybersecurity and passion for child safety. Montgomery, who has been at the forefront of exposing online predators, shares insights into his journey as a hacker, his motivati ... Show More
2h 4m
Apr 2025
545: CIA Hacker to Tech Entrepreneur: How Cybersecurity Can Make or Break Your Business
<p dir="ltr">From CIA hacker to cybersecurity advisor to a U.S. President.<br /> <br /> Now trusted by Fortune 500 companies, international banks, and leaders like Bill Gates.<br /> <br /> (And he almost missed the CIA meeting... because it was raining.)<br /> <br /> "Something t ... Show More
54m 49s
Nov 2024
Maintain Your "Cyber Hygiene": How to Protect Precious Personal Data From The Growing Danger of Cyber Attacks
Tresa Stephens, North American Head of Cyber at Allianz Global Corporate &amp; Specialty (AGCS), joins the show to discuss why personal data is precious to hackers, how to lower the risk of cybercrime and maintain your "cyber hygiene", and why ransomware continues to be a threat. ... Show More
12m 35s
Apr 2017
Elections, influence operations, and hacking. How clever phishing succeeds. Chipotle's point-of-sale breach. Hacking in Fast and Furious 8.
In today's podcast, we follow the story of Fancy Bear (a.k.a. Pawn Storm, a.k.a. APT28) and France's elections. Why clever phishing continues to succeed, and what's up with 0Auth abuse. Information operations distinguished from simple "hacking." Another point-of-sale compromise s ... Show More
15m 33s
Jul 2024
Episode 80: Pwn2Own VS H1 Live Hacking Event (feat SinSinology)
Episode 80: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Sina Kheirkhah to talk about the start of his hacking journey and explore the differences between the Pwn2Own and HackerOne EventsFollow us on twitter at: @ctbbpodcastWe're new to this podca ... Show More
2h 49m