Cyber Security
Cyber Security
  • 476
  • 525 505
WorldWide Disruptions, Crowdstrike Update Causing Havoc
Business worldwide are being affected from banks to airports, TVs, supermarkets, and all kinds of services. This is due to a faulty crowdstrike sensor update that is forcing systems to go offline and get a blue screen of death.
#cyber #security #cybersecurity #hacker #crowdstrike #falcon #disruption
มุมมอง: 169

วีดีโอ

Disney Hacked, What Happened?
มุมมอง 101หลายเดือนก่อน
News about Disney suffering a massive data leak are out, and Disney has confirmed they are investigating this incident. We also take a look at the threat actor "Nullbuldge" to get a better idea of what happened. #cyberthreats #cyber #security #cybersecurity #hacked #hacker #databreach #breach
Apple iPhone Spyware Threat Notifications & Massive AT&T Breach
มุมมอง 143หลายเดือนก่อน
Apple is warning specific targeted users again this year about potential spyware affecting their systems. AT&T suffered a massive data breach affecting more than 100 million customers, some details have been shared. #cyber #cyberthreats #hacker #securitybreach #security #cybersecurity #spyware #apple #iphone
Shopify Breach, ChatGPT on Mac, & Evil Twin WiFi
มุมมอง 61หลายเดือนก่อน
Shopify customer data breach, what do we know so far? ChatGPT on Mac systems has a privacy issue that would reveal all your conversation in clear text on the device. Evil Twin Wifi attack could allow hackers to steal your credentials and ultimately your data. #cyber #securitybreach #security #cybersecurity #breach #databreach #hacker #hacking
TeamViewer Hacked, What's Going On!!
มุมมอง 1.8Kหลายเดือนก่อน
TeamViewer has announced that they have been hacked, and they have released multiple update statements. Further news outlets are reporting that TV is being exploited. In this video we try to get an idea of what's going on with this case. #cyber #cybersecurity #hacked #hacker #apt #teamviewer
CDK Hacked Causing Major Disruptions to Car Dealerships
มุมมอง 54หลายเดือนก่อน
CDK Global is a provider of dealership management systems which are used by more than 50% of car dealers in the US. They have been hit with ransomware, which has forced them to shut down their systems, and they are currently trying to bring them back online. #cyber #news #hacker #ransomware #cybersecurity #security
What Happened With Snowflake, Biggest Data Breaches Ever !!
มุมมอง 1.2K2 หลายเดือนก่อน
Several big profile data breaches have occurred in the last 2 months and snowflake is at the center of it. In this video we discuss what happened, how it happened, and how to remediate the situation. #cyber #news #cybersecurity #hacker #securitybreach #databreach
Coolest Cyber Security Jobs & NICE Framework Explained
มุมมอง 882 หลายเดือนก่อน
Lots of different roles within cybersecurity, and in this video we check the coolest ones according to SANS. We also explain what the NICE framework is and how it works. #cyber #cyberprotection #cybersecurity #cyberthreats #informationsecurity
Ticketmaster & Santandar Data Breaches, Shinyhunters Hitting Hard
มุมมอง 972 หลายเดือนก่อน
Major Data Breaches affecting the Santander Bank and Ticketmaster affecting 30 million and 560 million customers/employees respectively. Shinyhunters claims responsibility of both and is offering the data for sale on hacking forums. Cyber Security measures controlling third party risks should be in place. #cyber #cybersecurity #hacker #security #hacked #securitybreach #cyberthreats #databreach ...
Sextortion!! What to Do?
มุมมอง 262 หลายเดือนก่อน
Sextortion is a very serious scam that could lead to lots of anxiety to the victims, which could lead them to pay the attackers, or reach a level of hurting themselves to avoid embarrassment. In this video, we discuss what sextortion is, how to detect it, and what to do when you see it. #cyber #cybersecurity #sextortion #scam #phishing #hacker #hacked #security gridinsoft.com/blogs/what-is-sext...
Tesla Cars Hacked, Minesweeper Used in Phishing Campaigns
มุมมอง 472 หลายเดือนก่อน
Tesla cars can be hacked using relay attacks, and the new keyless technology based on ultrawide band radio protocols hasn't solved the problem. Minesweeper "the old windows game" has been used in a recent phishing campaign to infect systems and to allow hackers to remotely access them. #cyber #cybersecurity #hacker #news #security #hacked #securitybreach #cyberthreats #tesla
Chrome Vulnerability, ORBs, & A Compromised Court Recording System
มุมมอง 1082 หลายเดือนก่อน
Multiple cybersecurity news, from google chrome vulnerabilities that are being actively exploited, to ORBs networks that are used by Chinese hackers, to the JAVS recording platform that has been compromised with malware. #cyber #cybersecurity #hacker #security #hacked #securitybreach #cyberthreats #vulnerability
Malware That Stops EDR and Installs Crypto Miner - GhostEngine
มุมมอง 762 หลายเดือนก่อน
Elastic Security Labs has published a research about an intrusion set that contains ghostengine. This set is capable of disabling and deleting EDR solutions, clearing logs and events, and in the end installing cryptominers to mine Monero. #cyber #cybersecurity #hacker #security #hacked #edr #cyberthreats #malware #crypto #cryptomining
Microsoft Recall and its Security/Privacy Implications
มุมมอง 4012 หลายเดือนก่อน
Microsoft has announced their new Copilot PCs and a bunch of their included features. In this video, we talk about Recall, how it works, and the potential security implications of using it. #cyber #cybersecurity #cyberprotection #cyberthreats #microsoft #windows #copilot #recall #security #hacker #hacking
MediSecure Hacked, What Happened?
มุมมอง 2293 หลายเดือนก่อน
MediSecure is an e-prescription company in Australia that has suffered a major ransomware attack. Personal and health data has been leaked. No TA has claimed responsibility so far. In this video we discuss the details. #cyber #cybersecurity #cyberthreats #informationsecurity #hacker #cyberware #hacked #ransomware #databreach
How Private Are Our Messages and Emails? A Story of Wire & Proton
มุมมอง 843 หลายเดือนก่อน
How Private Are Our Messages and Emails? A Story of Wire & Proton
Home Cameras Hacked, Are You Actually Safe in Your Smart Home
มุมมอง 1643 หลายเดือนก่อน
Home Cameras Hacked, Are You Actually Safe in Your Smart Home
Dell Hacked, What Happened?
มุมมอง 2.6K3 หลายเดือนก่อน
Dell Hacked, What Happened?
Why Are Hackers Targeting Gift Card Departments?
มุมมอง 2603 หลายเดือนก่อน
Why Are Hackers Targeting Gift Card Departments?
Zero Day Vulnerabilities on OpenVPN, Patch ASAP
มุมมอง 8273 หลายเดือนก่อน
Zero Day Vulnerabilities on OpenVPN, Patch ASAP
Dropbox Hacked, What Happened?
มุมมอง 1.3K3 หลายเดือนก่อน
Dropbox Hacked, What Happened?
Millions of Malicious Docker Repositories Detected, What's Going On?
มุมมอง 1613 หลายเดือนก่อน
Millions of Malicious Docker Repositories Detected, What's Going On?
Dating Apps Schemes & Cyber Threats, Don't Be A Victim
มุมมอง 793 หลายเดือนก่อน
Dating Apps Schemes & Cyber Threats, Don't Be A Victim
Is Your Device a Residential Proxy? Okta Warning of Credential Stuffing Attacks
มุมมอง 1.4K3 หลายเดือนก่อน
Is Your Device a Residential Proxy? Okta Warning of Credential Stuffing Attacks
Learn AI #2: Expert Systems, AI Winter, Backpropagation, Deep Blue, Stanely, Deep Learning
มุมมอง 153 หลายเดือนก่อน
Learn AI #2: Expert Systems, AI Winter, Backpropagation, Deep Blue, Stanely, Deep Learning
VW Hacked? What Happened?
มุมมอง 1683 หลายเดือนก่อน
VW Hacked? What Happened?
Is Your Phone Being Tracked? Discover How to Protect Your Data!
มุมมอง 1743 หลายเดือนก่อน
Is Your Phone Being Tracked? Discover How to Protect Your Data!
Learn AI #1: Dartmouth, Turing, & the Three Stages of AI (ANI, AGI, ASI)
มุมมอง 483 หลายเดือนก่อน
Learn AI #1: Dartmouth, Turing, & the Three Stages of AI (ANI, AGI, ASI)
Beware of Advanced Phishing Attacks: Story of LastPass & CryptoChameleon
มุมมอง 613 หลายเดือนก่อน
Beware of Advanced Phishing Attacks: Story of LastPass & CryptoChameleon
Mitre Hacked, What Happened?
มุมมอง 1.9K4 หลายเดือนก่อน
Mitre Hacked, What Happened?

ความคิดเห็น

  • @JonasNdayiragije-wb7qe
    @JonasNdayiragije-wb7qe 15 วันที่ผ่านมา

    J,ai Perdue la machine comment je peux trouver le model de cette machine

  • @DBlizt2k6
    @DBlizt2k6 หลายเดือนก่อน

    I switched to RustDesk a while ago. Its complete free. There is a paid version for self hosting I believe.

  • @japlic
    @japlic หลายเดือนก่อน

    Not your computer, not your files, remember boys, the cloud is just another man's computer

  • @user-ud8hw4gp6t
    @user-ud8hw4gp6t หลายเดือนก่อน

    die russen haben das gehackt um uns auszuspionieren XD XD XD

  • @user-ud8hw4gp6t
    @user-ud8hw4gp6t หลายเดือนก่อน

    thats why you should go for your private rtmp streeam :)

  • @SatoshiNakamoto.Bitcoin
    @SatoshiNakamoto.Bitcoin หลายเดือนก่อน

    My isn't working

  • @RadiantSwitch
    @RadiantSwitch หลายเดือนก่อน

    I just installed it 2 days ago

  • @TechnoMinded-qp5in
    @TechnoMinded-qp5in 2 หลายเดือนก่อน

    Microsoft thinks just because you have a policy you're above the law no it doesn't work that way people think again.

  • @Lord-Sméagol
    @Lord-Sméagol 2 หลายเดือนก่อน

    Law enforcement will have a wet dream over this if you sign in using face recognition or fingerprint; They can simply grab your hand and force your finger onto the fingerprint reader or grab your head to show your face to the camera WITHOUT A WARRANT! This isn't restricted to law enforcement, ANYONE can man-handle you! Use a strong password, then law enforcement will need to get a warrant!

    • @hydrohasspoken6227
      @hydrohasspoken6227 2 หลายเดือนก่อน

      If law enforcement needs any info on my laptop, I will gladly unlock it for them. They will mostly find books, pictures and quality porn on my PC. I am good.

    • @hydrohasspoken6227
      @hydrohasspoken6227 2 หลายเดือนก่อน

      Don't commit crime and you will be fine.

    • @hydrohasspoken6227
      @hydrohasspoken6227 2 หลายเดือนก่อน

      as a fellow criminal, your fear is related.

    • @TechnoMinded-qp5in
      @TechnoMinded-qp5in 2 หลายเดือนก่อน

      Law enforcement is breaking their own laws forcing people to deliberately switch to Linux can't wait until someone exploits Linux and be able to put it on every Smartphone and De Google and De Apple your Smartphone.

  • @devanandkumar1833
    @devanandkumar1833 2 หลายเดือนก่อน

    Somewhere I read about a malware that is specially for apple devices and the malware keeps an eye on user credentials.

  • @cloudsong5091
    @cloudsong5091 3 หลายเดือนก่อน

    Any Laptop that's immune to hacking ?

    • @Cybscr
      @Cybscr 3 หลายเดือนก่อน

      Offline hidden in a bunker, maybe, but i wouldnt bet money on it

  • @user-gl7iu7tp2j
    @user-gl7iu7tp2j 3 หลายเดือนก่อน

    Fagimal has struck again

  • @adriancoanda9227
    @adriancoanda9227 3 หลายเดือนก่อน

    y don't think it was just dell targeted might be Lenovo also

  • @ZombieLurker
    @ZombieLurker 3 หลายเดือนก่อน

    Good videos, I hadn't heard about this yet. At some point when you can invest in a better mic, would be even better. Have to turn volume up super loud. +1 Sub.

    • @Cybscr
      @Cybscr 3 หลายเดือนก่อน

      Thanks. It's still a small channel, I post when I get some time, if/when it grows I will do a proper setup.

  • @BlockchainShango
    @BlockchainShango 3 หลายเดือนก่อน

    Thanks for sharing

  • @VioFax
    @VioFax 3 หลายเดือนก่อน

    We know what rhymes with Dell...

    • @denis2381
      @denis2381 3 หลายเดือนก่อน

      Taco Bell?

    • @MurasakiShizu
      @MurasakiShizu 3 หลายเดือนก่อน

      Hell

    • @Corteum
      @Corteum 2 หลายเดือนก่อน

      Well (as in 'Get Well') 😂

  • @y2ksw1
    @y2ksw1 3 หลายเดือนก่อน

    Great!🤗

  • @deilyyxx
    @deilyyxx 3 หลายเดือนก่อน

    this is crazy

  • @dissonantiacognitiva7438
    @dissonantiacognitiva7438 3 หลายเดือนก่อน

    Credential stuffing with single sign on seems like a match made in hell

  • @Richblackhat
    @Richblackhat 3 หลายเดือนก่อน

    Oldies but goodies. The old "Free VPN APP, ok now you're mine" strategy. But every time there is a new twist

  • @WahedaAfrose
    @WahedaAfrose 3 หลายเดือนก่อน

    Good

  • @MdRasel-xg2ys
    @MdRasel-xg2ys 3 หลายเดือนก่อน

    Nice

  • @rebeccaaldrich3396
    @rebeccaaldrich3396 3 หลายเดือนก่อน

    Chinese hackers on the loose!😅

  • @-Aar-n
    @-Aar-n 4 หลายเดือนก่อน

    Copilot was stealth installed on Server 2024 cloud=connected=hacked

    • @-Aar-n
      @-Aar-n 4 หลายเดือนก่อน

      xz util.. PuTTY .. C/PHP… and this. Is it happening?!?!?

  • @comosaycomosah
    @comosaycomosah 4 หลายเดือนก่อน

    danggggg now thats a shocking one

  • @yasinmohamed8528
    @yasinmohamed8528 4 หลายเดือนก่อน

    This is disturbing! Who is safe I wonder?

    • @Cybscr
      @Cybscr 4 หลายเดือนก่อน

      As they say: it is not a matter of "if" you will be hacked, but "when"

    • @D.von.N
      @D.von.N 4 หลายเดือนก่อน

      nobody. Don't pay for 'delete me' or 'aura', it is worthless.

  • @monnombre6547
    @monnombre6547 4 หลายเดือนก่อน

    wow!

  • @Lupinicus1664
    @Lupinicus1664 4 หลายเดือนก่อน

    So car makers have been reckless with their security and would rather just sell them to unsuspecting customers elsewhere than fix their problems. Marvelous.

    • @Cybscr
      @Cybscr 4 หลายเดือนก่อน

      Exactly, until they suffer a breach that causes them damage or new regulations force them.

  • @lancemarchetti8673
    @lancemarchetti8673 4 หลายเดือนก่อน

    Brilliant

  • @carlrose4877
    @carlrose4877 6 หลายเดือนก่อน

    Content is OK but the AI voice is terrible

  • @-VarietyVerse
    @-VarietyVerse 6 หลายเดือนก่อน

    thanks mate 👍

  • @teunaydin
    @teunaydin 3 ปีที่แล้ว

    very nice thanks

  • @BR-gt4zk
    @BR-gt4zk 3 ปีที่แล้ว

    excellent bunch of videos - i searched lots and i found only this to be short and sweet - Thank you tons

  • @nagarajgokarnkar6622
    @nagarajgokarnkar6622 3 ปีที่แล้ว

    Please make video series on iso data privacy

  • @vsolomon811
    @vsolomon811 3 ปีที่แล้ว

    How to buy that ?

  • @RanidaGob
    @RanidaGob 3 ปีที่แล้ว

    Thank you for all these videos

  • @jahidapk4547
    @jahidapk4547 4 ปีที่แล้ว

    how to write a policy document

    • @Cybscr
      @Cybscr 4 ปีที่แล้ว

      Depends on the topic of the policy. You would need good skills in language, and a clear understanding of the scope of the policy. If the policy is technical, then you should be aware of the technical details. You can look up some templates online for some ideas.

  • @rohitdhruti771
    @rohitdhruti771 4 ปีที่แล้ว

    I do not understand why can any-one dislike this amazing content, each topic covered in depth.

  • @DmitriousBazhanov
    @DmitriousBazhanov 4 ปีที่แล้ว

    - Verify config items against the repository - Compare config using appropriate tools - Report all deviations for approved corrections - Verify the config items physically - Review the target for the repository completeness

  • @DmitriousBazhanov
    @DmitriousBazhanov 4 ปีที่แล้ว

    - Results of Physical Verification (Internal) - License Deviations (MEA03) - Results of Repository Reviews (Internal)

  • @DmitriousBazhanov
    @DmitriousBazhanov 4 ปีที่แล้ว

    - Identify status change of config items and report them - Match config changes with approved requests - Report unauthorized changes - Identify stakeholder reporting reqs - Produce reports according to the reqs

  • @DmitriousBazhanov
    @DmitriousBazhanov 4 ปีที่แล้ว

    A: Head IT Oper. R: Head IT Admin I: - Results of Physical Inventory Checks (BAI09) O: - Config Status Reports (BAI03 / DSS02)

  • @DmitriousBazhanov
    @DmitriousBazhanov 4 ปีที่แล้ว

    - Regularly identify changes to the config items - Review the propose config changes against the baseline - Create and approve changes to config baselines

  • @DmitriousBazhanov
    @DmitriousBazhanov 4 ปีที่แล้ว

    Updated Repository with Config Items (DSS02) Approved Changes to Baseline (BAI03)

  • @DmitriousBazhanov
    @DmitriousBazhanov 4 ปีที่แล้ว

    - Change Request Status Reports (BAI06) - Asset Register (BAI09) - Asset Register Revisions (BAI09)

  • @DmitriousBazhanov
    @DmitriousBazhanov 4 ปีที่แล้ว

    - Identify and Classify config items - Populate the repository - Create and agree on config baselines of services and applications

  • @DmitriousBazhanov
    @DmitriousBazhanov 4 ปีที่แล้ว

    Register of Software Licenses (BAI09) OP: Config Repository (BAI09 / DSS02) Config Baseline (BAI03)

  • @DmitriousBazhanov
    @DmitriousBazhanov 4 ปีที่แล้ว

    Practice 2: Establish and maintain a configuration repository Accountable: Head IT Operations Responsible: Head IT Administration / Service Manager

  • @DmitriousBazhanov
    @DmitriousBazhanov 4 ปีที่แล้ว

    Practice 1: Establish a Configuration Model Includes: - Define the scope of the config management - State which assets and services will be included - Establish a logical model for config management - Include info such as config item types, item attributes, relationship types and attributes, status codes

  • @DmitriousBazhanov
    @DmitriousBazhanov 4 ปีที่แล้ว

    Process Goal 1: Configuration Repository is Updated and Accurate - Number of deviations between config repository and live config