Yaniv Hoffman
I am an IT and Cyber Security professional, which has had a lifelong passion for computers since the 1980s. I began coding at just 13 and went on to earn a bachelor's degree in computer science, starting a successful career in the hi-tech industry.
My mission is clear: to empower others with cybersecurity knowledge. I firmly believe that anyone, with the right information and guidance, can make significant progress in the industry. I invite everyone to explore my website and YouTube channel, where I shares insights from years of hands-on experience and a genuine passion for cybersecurity. Join me on this journey towards a more secure digital future

Bluetooth Hacking Explained: Why Your Devices Are at Risk (ft. OTW)

Hijacked in Seconds: How Hackers Steal Your Online Sessions

Medusa The Ransomware Paralyzing Companies | With OTW

How Mexican Cartels Built a Secret Phone Network

How to Attack and Defend LLMs: AI Security Explained

Password Cracking in Cybersecurity: How It Works

Top 10 cybersecurity attacks

operating system for cyber security

Ethical Hacking Roadmap 2025

Top Hacking Books to Learn Ethical Hacking in 2025

How Ghidra Changed Reverse Engineering Forever

How Hackers Manipulate Online Information

Inside the CIA’s Secret Hacking Tools: Vault 7 and Weeping Angel Explained

FBI Arrests Incognito Market Founder Rui-Siang Lin in $100M Dark Web Bust

How Hackers Are Taking Over Your Software

The XZ Backdoor Story: A Cybersecurity Threat Uncovered at DEFCON

Satellite Hacking Explained: Tools, Techniques, and Risks in Cybersecurity

3rd Anniversary Celebration: Meet the Giveaway Winners!

Cyber Warfare explained: Ranking the Most Powerful State-Sponsored Hackers

Radio Jamming Explained: How It Works and Why It Matters in Cybersecurity

3 YEARS CHANNEL ANNIVERSARY GIVEAWAY!

How Hackers Exploit IoT Devices and How to Defend Against Attacks

How Hackers Exploit CI/CD Pipelines to Bypass Your Security

Shodan OSINT Tutorial: Uncovering Vulnerable Devices Online

How To Break Into Cybersecurity (Career Roadmap)

How to Use Nmap: Top Scans for Beginners in Cybersecurity

AI Agents vs ChatGPT: The Future of Cybersecurity and Agentic Workflows

How Hackers Use HTTP/2 for DDoS Attacks: The New Cyber Threat

How to Secure Your Files (Cybersecurity Tips)

Build a Mini Ethical Hacking Lab with a Single-Board Computer