[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f-Iu97rJ0bAh8GXEboycFH--o4n5zAIkNFEvKn1R49U0":3},{"id":4,"name":5,"category_id":6,"subcategory_id":7,"uploaded_by":8,"downloads":9,"size":10,"seeders":11,"leechers":12,"infohash":13,"language":14,"title":15,"slogan":15,"poster_alt":16,"description":15,"cover_image":15,"magnet_link":17,"stream_link":16,"content":18,"files":19,"comments_count":20,"tracker_list":21,"date_uploaded":22,"last_checked":22,"last_checked_at":16,"user_id":16,"submit_flag":20,"uploaded_at":23,"created_at":24,"updated_at":24,"slugged_title":25,"category_name":26,"subcategory_name":27,"uploaded_ago":28,"category":29,"subcategory":30,"comments":32},6607791,"AI Agents for Cybersecurity (2026)",9,34,"freecoursewb",35116,"604.5 MB",23859,8070,"FBF9AC7012FF3A9546F091B716F8F8C193030E80","English","",null,"magnet:?xt=urn:btih:FBF9AC7012FF3A9546F091B716F8F8C193030E80&dn=AI+Agents+for+Cybersecurity+%282026%29&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=http%3A%2F%2Ftracker.foreverpirates.co%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.cyberia.is%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexplodie.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2780%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%3A80%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2900%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2720%2Fannounce&tr=udp%3A%2F%2Fopentor.org%3A2710%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Fopentracker.i2p.rocks%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fcoppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.zer0day.to%3A1337%2Fannounce","\u003Cp>\u003Cstrong> AI Agents for Cybersecurity (2026)  \u003C/strong>\n\u003Cbr>\u003Cbr>\u003Cspan style=\"font-size: 16px\">\u003Cstrong>\u003Ca target=\"_blank\" href=\"https://WebToolTip.com\">https://WebToolTip.com\u003C/a> \u003C/strong>\u003C/span>\n\u003Cbr>\u003Cbr>Released 3/2026\n\u003Cbr>MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch\n\u003Cbr>Genre: eLearning | Language: English | Duration: 3h 55m | Size: 604.46 MB\n\u003Cbr>\u003Cbr>Learn how to deploy autonomous AI agents in security operations, including SOC automation, anomaly detection, and real-time threat mitigation frameworks.\n\u003Cbr>\u003Cbr>Course details\n\u003Cbr>AI agents represent the next evolution in cybersecurity defense. These autonomous systems can perceive their environment, engage in genuine reasoning, and take decisive action in real-time, creating a new paradigm for proactive defensive strategies. This comprehensive course begins with the philosophical and technical underpinnings of AI agents and progresses to their implementation within Security Operations Centers. Learn how these intelligent systems are revolutionizing threat detection, automating vulnerability analysis, streamlining incident response, and enabling proactive threat hunting. Plus, develop a deep understanding of the security considerations and ethical implications that arise when deploying autonomous AI systems in high-stakes cybersecurity environments. Ideal for security analysts, SOC managers, and cybersecurity professionals, this course provides the knowledge and practical insights you need to harness the power of AI agents responsibly and effectively. This course was created by Starweaver. We are pleased to host this training in our library.\u003C/p>","\u003Ch2>Files: \u003C/h2>\n                            \u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>[ WebToolTip.com ] AI Agents for Cybersecurity (2026)\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-other-file\">\u003C/i>Get Bonus Downloads Here.url (0.2 KB)\u003C/li>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>~Get Your Files Here !\u003C/span>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>01. Introduction\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Welcome and course goals.mp4 (16.9 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Welcome and course goals.srt (5.0 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>02. 1. Introduction to AI and LLMs in Cybersecurity\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Chapter introduction.mp4 (13.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Chapter introduction.srt (3.8 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. The transformative potential of AI and LLMs in cybersecurity.mp4 (15.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. The transformative potential of AI and LLMs in cybersecurity.srt (7.0 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Defining large language models (LLMs) and their architectures.mp4 (29.2 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Defining large language models (LLMs) and their architectures.srt (13.1 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>04. Evolution of AI in cybersecurity From ML to agentic AI.mp4 (15.7 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>04. Evolution of AI in cybersecurity From ML to agentic AI.srt (7.2 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>03. 2. Core Concepts of AI Agents\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. What are AI agents Definition, characteristics, and workflow.mp4 (16.3 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. What are AI agents Definition, characteristics, and workflow.srt (6.8 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. LLMs as the “brain” of AI agents Capabilities and limitations.mp4 (20.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. LLMs as the “brain” of AI agents Capabilities and limitations.srt (8.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Agent autonomy levels in cybersecurity.mp4 (15.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Agent autonomy levels in cybersecurity.srt (7.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>04. Multi-agent systems Collaboration and complexity.mp4 (12.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>04. Multi-agent systems Collaboration and complexity.srt (6.4 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>05. Memory and learning in AI agents.mp4 (13.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>05. Memory and learning in AI agents.srt (6.0 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>06. Adapting LLMs for cybersecurity Fine-tuning, prompt engineering, and augmentation.mp4 (15.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>06. Adapting LLMs for cybersecurity Fine-tuning, prompt engineering, and augmentation.srt (7.5 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>04. 3. Datasets and Data Handling for AI Agents in Cybersecurity\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Types of datasets in LLM for security Code-based, text-based, and combined.mp4 (14.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Types of datasets in LLM for security Code-based, text-based, and combined.srt (9.2 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. Data pre-processing and representation for cybersecurity AI models.mp4 (14.7 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. Data pre-processing and representation for cybersecurity AI models.srt (9.2 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Addressing data scarcity LLMs for data augmentation in cybersecurity.mp4 (8.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Addressing data scarcity LLMs for data augmentation in cybersecurity.srt (2.5 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>05. 4. AI Agents in Threat Detection\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Chapter introduction.mp4 (12.4 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Chapter introduction.srt (3.6 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. Real-time detection of cyber threats with AI.mp4 (14.9 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. Real-time detection of cyber threats with AI.srt (7.3 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Automated vulnerability detection and analysis.mp4 (14.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Automated vulnerability detection and analysis.srt (7.1 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>04. Malware analysis and classification with AI agents.mp4 (12.3 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>04. Malware analysis and classification with AI agents.srt (6.9 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>06. 5. AI Agents in Network and Social Engineering Security\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Network intrusion detection and attack classification.mp4 (15.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Network intrusion detection and attack classification.srt (6.5 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. Detecting and defending against phishing attacks and deceptive language.mp4 (13.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. Detecting and defending against phishing attacks and deceptive language.srt (6.1 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Leveraging AI for threat intelligence and attack surface management.mp4 (13.5 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Leveraging AI for threat intelligence and attack surface management.srt (7.4 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>07. 6. Advanced Analysis Capabilities\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. AI for System Log Analysis and Anomaly Detection.mp4 (14.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. AI for System Log Analysis and Anomaly Detection.srt (7.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. Reverse Engineering and Binary Analysis with AI Assistance.mp4 (13.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. Reverse Engineering and Binary Analysis with AI Assistance.srt (8.3 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. AI for understanding security and privacy policies.mp4 (14.9 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. AI for understanding security and privacy policies.srt (9.0 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>08. 7. AI Agents in Incident Response\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Chapter introduction.mp4 (8.2 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Chapter introduction.srt (3.3 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. Automating vulnerability repair and patch generation.mp4 (13.5 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. Automating vulnerability repair and patch generation.srt (6.8 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Streamlining incident response workflows and playbooks.mp4 (13.7 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Streamlining incident response workflows and playbooks.srt (7.2 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>04. Post-attack analysis and root cause identification with AI.mp4 (13.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>04. Post-attack analysis and root cause identification with AI.srt (8.0 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>09. 8. Enhancing Security Operations Centres (SOCs) with Agentic AI\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. AI for proactive defense and threat hunting.mp4 (9.1 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. AI for proactive defense and threat hunting.srt (6.0 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. AI-powered risk management and predictive analytics.mp4 (12.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. AI-powered risk management and predictive analytics.srt (6.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Optimizing cybersecurity investments and compliance automation.mp4 (13.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Optimizing cybersecurity investments and compliance automation.srt (7.9 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>04. Adaptive decision-making and continuous learning in SOC agents.mp4 (12.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>04. Adaptive decision-making and continuous learning in SOC agents.srt (8.2 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>10. 9. Security Risks and Vulnerabilities of AI Agents\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Chapter introduction.mp4 (11.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Chapter introduction.srt (3.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. Overview of AI agent security challenges The four knowledge gaps.mp4 (15.8 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. Overview of AI agent security challenges The four knowledge gaps.srt (7.1 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Inherent AI-related vulnerabilities Adversarial AI, data poisoning, and misalignment.mp4 (14.6 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>03. Inherent AI-related vulnerabilities Adversarial AI, data poisoning, and misalignment.srt (8.0 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>04. Agent-specific threats Prompt injection, jailbreaking, and supply chain vulnerabilities.mp4 (10.0 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>04. Agent-specific threats Prompt injection, jailbreaking, and supply chain vulnerabilities.srt (6.8 KB)\u003C/li>\n\u003C/ul>\n\u003Cspan class=\"head\">\u003Ci class=\"flaticon-folder\">\u003C/i>11. 10. Ethical Considerations and Governance Frameworks\u003C/span>\n\u003Cul>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Challenges in LLM interpretability, trustworthiness, and ethical usage.mp4 (7.2 MB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>01. Challenges in LLM interpretability, trustworthiness, and ethical usage.srt (2.7 KB)\u003C/li>\n\u003Cli>\n\u003Ci class=\"flaticon-movies\">\u003C/i>02. Addressing bias and fairness in AI agents.mp4 (14.4 MB)                        \u003C/li>\u003C/ul>\u003C/ul>",0,"\u003Ch3>\n                                Code:\n                            \u003C/h3>\n                            \u003Cul>\n                                \u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://tracker.torrent.eu.org:451/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://tracker.tiny-vps.com:6969/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        http://tracker.foreverpirates.co:80/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://tracker.cyberia.is:6969/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://exodus.desync.com:6969/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://explodie.org:6969/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://tracker.opentrackr.org:1337/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://9.rarbg.to:2780/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://tracker.internetwarriors.net:1337/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://ipv4.tracker.harry.lu:80/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://open.stealth.si:80/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://9.rarbg.to:2900/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://9.rarbg.me:2720/announce                                    \u003C/li>\u003Cli>\n                                        \u003Cspan class=\"icon\">\n                                            \u003Ci class=\"flaticon-href-link\">\n                                            \u003C/i>\n                                        \u003C/span>\n                                        udp://opentor.org:2710/announce                                    \u003C/li>                            \u003C/ul>","Mar. 20th '26","2026-03-21 06:11:00","2026-03-21T06:11:00.000000Z","ai-agents-for-cybersecurity-2026","Other","Tutorials","Mar. 21st '26",{"id":6,"name":26},{"id":7,"name":27,"icon":31},"flaticon-tutorial",[]]