Anatomy of an Attack - Zero Day Exploit
ฝัง
- เผยแพร่เมื่อ 18 พ.ค. 2015
- Learn about zero day vulnerabilities, how they are used in cyber-attacks, and what you can do to protect against them.
Learn more: www.fireeye.com/solutions/nx-... - วิทยาศาสตร์และเทคโนโลยี
Wonderfully depicted using animations and a narrator.
I'm impressed. It could be the base for a movie.
David B there is a movie on it
@@ruru6495 whats the name of the movie?
@@khuajazaidi5489 zero day
damislav Go figure, lol
Omg so much effort was put into this video! Great work!
Amazing animation and explanation - very impressed ! :)
Flawless production!!
Outstanding Infomercial !! Thank you !!
this is freaking beautiful. impressive
Good luck convincing Adobe to patch anything withing 24 hours...
Video had an ASMR effect on me.
Thats cute ;)
This makes me want to watch TRON.
Awesome Video
Great presentation.
Do you reckon FireEye used FireEye to find out how they were hacked?
Awesome Video. What is the animation software for making this video?
Hello from 2020: is a sequel in order...? 🤔
is this an advertisement i can't tell
Stuxnet had 4 zero day exploits
And 4 other exploits that were used perfectly
Perfect
0day's are expensive, I'd just login as tomcat:tomcat
What audio synthesizer is this?
This needs an update. Ooof.
Is Zero day resulted from Advance Persistent Threat?
How should I understand the "dynamic threat intelligence cloud" ? I fail to interpret the definition of the word "intelligence" in this regard! pls !
Hi Tri. Dynamic Threat Intelligence collects the machine generated indicators and uses them across the FireEye cloud so all our customers are protected from the latest attacks.
Nice
This is truth
Sounds like the intro of a series
Do you sell this program
Finding vunrabulity in code and uploading it to a large database.... Hmmm very big brain 😉
*
so ironical :D
Oh boy
all I had to do is walk in a door, everything else was trying to go against something the world essentially needed on a psyop perspective, but am against.
in between that I built it.
I guess this is what is meant by software reuse 🙂
#LetsCodeTyler
^-^...
WOw.
Why IT sound complicated to me :( ... The animation is beautiful BTW. Still hacker trick
i see what you did there, nice play on words haha.
Zero day malware creators should just be computer scientist instead of doing this, they still earn six figures a year legit.
That depends who you work for. I'm assuming the average job but yes 6 to 7 is possible if you work for the fbi or cia.
im scared
So REALLY this is just a fireeye commercial, lol
Wtf is up with the pitched down voice layer, lol
sounds cool, but...it's just an attack
This is a good idea, until your own system is used as a weapon against the systems you are set up in. This commercial is deceptive because it fails to tell the real truth: "that no network is 100% safe".
Re volva!
"A zero-day is a software vulnerability that is previously unknown and unpatched."
False!
It is somewhat of a fine line and yet important to understand the distinction.
A zero-day *VULNERABILITY* is software containing a flaw that could potentially be exploited in a zero-day attack, perhaps, unless found first by these good guys.
A zero-day is the pre-programmed date/time when vulnerabilities that have already been exploited are triggered into destruction mode (as opposed to just spreading), causing damage usually across multiple systems simultaneously.
Elsewhere, all across the English language, "zero day" means doom/calamity, the day the big event is triggered, often involving a countdown. The hacking/software and IT definition needs to be brought into alignment with that. Sure it is great to use the term zero-day to scare up customers, however that's not really very honorable, you can do so easily with just a few more words and be upright. It is not the vulnerability per se (altho there is such a thing as code that can be vulnerable to a zero-day attack, that is the vulnerability, a potential), while zero-day itself is the date of the actual attack, an action, if that were to happen.
0days is an crazy devil of cyber exploits massive & dangerous Devil money
The voice changer feels unneeded.
Overly dramatic but ok
True.
Why the gimmick voice change 😔
Lol
Oofff
a honey pot?
hhhmmm This didn't cause covid-19 did it? like Stuxnet???
"on error resume next" , hehe Vb script th-cam.com/video/-BIANfzF43k/w-d-xo.html
is this too dramatic lmao..?
you could make 100000 dollars off this from the black market