Cyber News April 2024 || Duvel Beer || Indian RAW & I4C || CISCO || Change Health Care || Phone Tap

แชร์
ฝัง
  • เผยแพร่เมื่อ 16 พ.ค. 2024
  • This video covers the top cyber news from April 2024.
    Subscribe & Follow us on📱
    ======================
    YT: ➡︎‪@Murali_Mastaru‬ ‪@jignesh.talasila‬
    IG: ➡︎ / murali_mastaru / jigneshtalasila
    #cybersecurity #cybercrime #forensicscience #telugupodcast #telugu #phishing #cyberforensics #frauds #careerpath #i4c #raw #Fuxnet #cisco
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 168

  • @jaswanthroyal3268
    @jaswanthroyal3268 หลายเดือนก่อน +31

    Full explanation on block chain regarding how it is benefits cyber security and how crypto can be lost or stolen.

    • @VasuYT1
      @VasuYT1 หลายเดือนก่อน

      Blockchain tech doesn’t benefit Cyber Security. It’s another revolutionary tech in terms of mainly sending money peer to peer without involvement of govt or any third party entity.

    • @jaswanthroyal3268
      @jaswanthroyal3268 หลายเดือนก่อน

      @@VasuYT1 it's just a technology, governments can also use this technology, with all due respect, I just how block chain can help cybersecurity, sir has lot of experience in cybersecurity space, so I assumed he may provide some valuable content.

    • @DarkBoyEdits9989
      @DarkBoyEdits9989 8 วันที่ผ่านมา

      ​@@VasuYT1lot of companies or projects due to vulnerabilites in web3.0...

  • @davidsunnykondru1754
    @davidsunnykondru1754 หลายเดือนก่อน +10

    Sir,
    Topic-1 if there is a Country which is under cyber attack, and every critical infrastructure is affected, how would the public and private sectors act and what kind of policies would be invoked and would there be any disaster management plan or do we have disaster management preparedness.
    Topic-2: Are there any cybersecurity summits that happen in our country and competitions not only hacking in other security related areas.

  • @vishnushivarejectedpeace9488
    @vishnushivarejectedpeace9488 หลายเดือนก่อน +1

    Real hacker ni theeskocchi oka podcast cheyyandi mastaruu...

  • @jagadeesh_damarasingu
    @jagadeesh_damarasingu หลายเดือนก่อน +7

    Block chain + Elections
    Blockchain + Donations sites (for transparency of funds)(ketto campaigning fraud during COVID)
    India's own Blockchain network ?

  • @nagak6489
    @nagak6489 หลายเดือนก่อน +9

    kudos for the efforts Murali mastaru , I am into cyber security and I can relate to the all the cases that you guys are discussing

    • @ShowTime31158
      @ShowTime31158 หลายเดือนก่อน +1

      Avunaa bro!! Ye domain lo work chesthunnaaru?

  • @SRaviKiranM
    @SRaviKiranM หลายเดือนก่อน +8

    Murali Sir #Pegasus (spyware) if you could do a small episode on this, please ?

  • @saikirannalubola3981
    @saikirannalubola3981 หลายเดือนก่อน

    Nice Information mastaru 😊

  • @krisayo
    @krisayo หลายเดือนก่อน

    Your experience is useful for movie writers

  • @telugu-shorts604
    @telugu-shorts604 หลายเดือนก่อน +1

    Nice daily make one video like this to cover all hacking news please sir..

  • @jaganmohanchowdhary8030
    @jaganmohanchowdhary8030 หลายเดือนก่อน +1

    Industrial automation or IOT systems are going towards edge computing where we no need to send the sensitive data to cloud do the data processing in edge devices like microcontrollers. Cloud data ni ela hack chestaaru anedi chepte baaguntundi because IOT and Machine learning vast ga use chestunnaru so students or techies ki idi baga use avtadi info.

  • @manatom
    @manatom 26 วันที่ผ่านมา +1

    i really like how you are explaining things.

  • @jackeysharath7077
    @jackeysharath7077 หลายเดือนก่อน +1

    That was a nice pod cast. Please suggest a few technologies that the upcoming students need to learn in this AI world. Also suggest the technology application with real world examples.

  • @vikranthreddy7736
    @vikranthreddy7736 หลายเดือนก่อน

    Very informative

  • @MrSrikanth00795
    @MrSrikanth00795 หลายเดือนก่อน

    Superb sir. Ty for the info

  • @jaruknath6114
    @jaruknath6114 หลายเดือนก่อน

    I used work on OSS configurations for a huge telecommunication company in US. Microwave is bloody complex configuration to do.

  • @karthikeyankumbam9906
    @karthikeyankumbam9906 หลายเดือนก่อน +1

    I saw all of your videos. Thanks for sharing the knowledge. Why the call recording has disabled in new mobile phones. Pls can u tell the reason for it

  • @hrushispace
    @hrushispace หลายเดือนก่อน +1

    Explain about " XZ & jia tan " backdoor

  • @sreekrishna8582
    @sreekrishna8582 28 วันที่ผ่านมา +1

    Awesome and interesting content! Can you please cover the Cyberattack of Maersk which happened in 2018 in the future episodes?
    It will be a great learning with do and don’t for all.

  • @loki7265
    @loki7265 หลายเดือนก่อน

    This is the content, which could understand people after 15 years ...

  • @sairamnandigam5525
    @sairamnandigam5525 หลายเดือนก่อน

    We able to send alert notification along with required action to take with the help of automation using Ansible and other tools😅🔥

  • @testuser6429
    @testuser6429 22 วันที่ผ่านมา

    Pegasus software gurinchi kooda cheppandi please

  • @majjiveerendra1291
    @majjiveerendra1291 หลายเดือนก่อน

    Hi bro, cryptos n stocks fraud gurinchi chepandi

  • @thummalatulasi
    @thummalatulasi 29 วันที่ผ่านมา

    Explain about most recent cyber cases in india and how in future the attacks will be there.. Thank you masteruu

  • @mohanganeshmunagala9423
    @mohanganeshmunagala9423 หลายเดือนก่อน

    Mi experience share cheyyandi anna ela decode chestaru oka problem ni avi chalu🎉

  • @Eamledu
    @Eamledu หลายเดือนก่อน +3

    Duvel case: IT SYSTEMS shutdown chesi format cheytam vala asalu ealaa attack jarigindi ani investigation ealaa chestaaru?

    • @kumarshk3071
      @kumarshk3071 หลายเดือนก่อน +1

      Shutdown ante... for outside world and isolated them to only their access

  • @Vamshi_hras
    @Vamshi_hras หลายเดือนก่อน +1

    Please tell us about Pegasus spyware …

  • @pavankumar9540
    @pavankumar9540 หลายเดือนก่อน

    Good education

  • @user-oc3zk4ou8w
    @user-oc3zk4ou8w หลายเดือนก่อน

    NFC hacking gurinchi video cheyandi sir..

  • @sriram-nv5hq
    @sriram-nv5hq หลายเดือนก่อน

    We need some Worlds top 3 mostly interesting hacks and how they catch

  • @Sudheer8723
    @Sudheer8723 หลายเดือนก่อน

    Solarwinds attack and Log4j explain these!!

  • @salinis5078
    @salinis5078 หลายเดือนก่อน

    Please do a video on bitcoin. What is it? How it works? Why hackers use bitcoins for ransomware payments

  • @vaibhavchaturvedi7824
    @vaibhavchaturvedi7824 หลายเดือนก่อน

    The pegasus should be covered as it made a lot of chaos in India. How israel compiled software had waves in India, who was responsible ? What was the impact? What were the mitigation steps taken? How it was the shutdown?

  • @cvkrishna86
    @cvkrishna86 หลายเดือนก่อน

    Today we have faced one only fraud they have taken mobile access and looted 2 lakhs. Really this online fraud is horrible, small mistake (negligence) costed huge loss

  • @BhanuPrakash-rq5qs
    @BhanuPrakash-rq5qs หลายเดือนก่อน

    Sir do a video about Dell finance app

  • @sampath1285
    @sampath1285 หลายเดือนก่อน

    Please please please make a full proof video on Pegasus spyware. Please....

  • @Yesh_9
    @Yesh_9 หลายเดือนก่อน

    I want know about how AI going to impact the cyber world.

  • @srikanthnareddy6804
    @srikanthnareddy6804 หลายเดือนก่อน

    Hello sir , please guide or provide a road map for students who are studying cyber security covering how they become a great cyber security expert

  • @user-dr1nr7pg8q
    @user-dr1nr7pg8q หลายเดือนก่อน +1

    Please consider sharing your views on - Stock markets, share price manipulation and gambling chances by big players.. finally, how to crack that in practice.

    • @Murali_Mastaru
      @Murali_Mastaru  หลายเดือนก่อน +1

      I am not a expert on these topics - hence will not comment. But we can bring in an expert.

    • @user-dr1nr7pg8q
      @user-dr1nr7pg8q หลายเดือนก่อน

      @@Murali_Mastaru thank you for responding ❤️

  • @shivaakumar5998
    @shivaakumar5998 หลายเดือนก่อน

    Dear sir can you please explain about Israel technology and how they will caught criminals .. how many types of methods they will use .. please explain. If u do episode on this I think this is gonna be a viral and good video

  • @ShowTime31158
    @ShowTime31158 หลายเดือนก่อน

    Guriji....please check my preferences below:-
    1. State sponsored hacking groups
    2. APTs

  • @anthonyreddy8523
    @anthonyreddy8523 หลายเดือนก่อน

    How a decentralised, distributed and immutable systems can be useful for safe keeping of records and expose those records if necessary

  • @Mallich999
    @Mallich999 หลายเดือนก่อน

    In recent times we have issue with binace(crypto) can you take that case and exolane dep undersatng that ? its realy help !!..

  • @Ganeshreddysatti
    @Ganeshreddysatti หลายเดือนก่อน

    Sir, present wfh lo banking system like KYC completely license, personal photo passport, visa, address, phone number, address ani ee wfh Lappy lo unayi and also balance in card is that info easy to steal?

  • @murapakasrinivasarao544
    @murapakasrinivasarao544 หลายเดือนก่อน +1

    security gaa eelaa ?

  • @dasarisivadarling
    @dasarisivadarling หลายเดือนก่อน

    Waiting for hacker episode 🔥🔥🔥🔥🔥

  • @lalithsurya1630
    @lalithsurya1630 หลายเดือนก่อน

    How is crypto and blockchain related to cybersecurity

  • @RaghuRamPillamarapu
    @RaghuRamPillamarapu หลายเดือนก่อน

    What is computer networking how it works

  • @MadhuSudhan-sy4eu
    @MadhuSudhan-sy4eu หลายเดือนก่อน

    Frequently VMware systems are getting malware attacks. We know this company is big cloud and part of broadcom now. Can you explain about this.

  • @saicharankonyala7891
    @saicharankonyala7891 หลายเดือนก่อน

    can you talk about snowden movie

  • @Mahi-hk6dg
    @Mahi-hk6dg หลายเดือนก่อน

    Boat company customer data hack aindhi kadha, konchem detailed review ivvandi sir.

  • @NarasimharaoM1
    @NarasimharaoM1 หลายเดือนก่อน

    How can we secure our home wifi connections

  • @thirumalasriharsha6636
    @thirumalasriharsha6636 หลายเดือนก่อน

    Where can we learn the cyber security ??

  • @akshaykumarvadla7665
    @akshaykumarvadla7665 หลายเดือนก่อน

    what ever the news maybe but please keep doing.

  • @KASARANENIBALAKOTESWARARAO
    @KASARANENIBALAKOTESWARARAO หลายเดือนก่อน

    Hello sir i want to learn cyber security could please suggest one website from basics to advance in cyber security

  • @muralikrishna5314
    @muralikrishna5314 หลายเดือนก่อน

    Please change the shirt colour of host

  • @malladirajesh8367
    @malladirajesh8367 หลายเดือนก่อน

    Pithapuram election is reging pls investigation ...?

  • @ManiTejaJ
    @ManiTejaJ หลายเดือนก่อน

    Is indian rupee coming with block chain technology like bitcoin way buy/sell

  • @getrags555
    @getrags555 หลายเดือนก่อน

    Can you plz elaborate on mobile consents which we give for multiple apps such as cred, Truecaller and Google. What access do these applications have , I doubt they are listening to all our conversations and come up with add suggestions.

  • @HOURS_OF_INTERNET
    @HOURS_OF_INTERNET หลายเดือนก่อน

    News related to anonymous

  • @NSKPOWER
    @NSKPOWER หลายเดือนก่อน

    Edho podichedham Ani ...oka betting app lo aadhar. PAN card front back photos tho sahaa details echesaaa....
    Eppudu nenu em chesthe future lo veeti valla problem raakundaa untaadho chepthaaraa please....

  • @shivakissnad9741
    @shivakissnad9741 หลายเดือนก่อน

    I have one doubt, this is friction on movies but many science and adventure movies they are saying we have all access for every CCTV AND every government portal how is this possible this only for making that situation or its true?

  • @jotiswarreddyvangala2886
    @jotiswarreddyvangala2886 หลายเดือนก่อน

    Love you murali master sir try to make new videos sir

  • @talatamsiva6955
    @talatamsiva6955 หลายเดือนก่อน

    Hi sir
    Thanks for your sharing your experience with us. I am very happy for this. I just wanted to know zero click (Pegasus) how it works without user interaction

  • @phanindrakumar6855
    @phanindrakumar6855 หลายเดือนก่อน

    Can you please go through online course scam i.e., Skill lync and some shakes that would reduce body i.e Herbalife

  • @livebughunting9393
    @livebughunting9393 หลายเดือนก่อน

    Nenu ap gov website loo vulnerability find chesi .. lopala data motham .. edit and manage chesey antha vulnerability... But mana gov not responding 😂😂

  • @bodapatlavamshi1688
    @bodapatlavamshi1688 หลายเดือนก่อน

    Sir we need cyber sequrity course from from murali sir because he had lot of experience in this field we don't know the root map how it goes and it is also very expensive in the market so we could request to guide the people who are interesting in the cyber sequrity plz plz plz plzzz think about it sir I m full of respect uh sir plz give me a details to I earn course with u personally with any cost kindly kindly kindly think about these sir

  • @rockeyharshan5781
    @rockeyharshan5781 หลายเดือนก่อน

    Stock market kii SEBI vundi kadhaa mari crypto currency kii regulations who evaruuu

  • @shivasaiprasadbayya8188
    @shivasaiprasadbayya8188 หลายเดือนก่อน

    Murali sir tell me about boat data breach and other data breach which are exposing your data and passwords. In my case 3 mouths back i am
    Creating the AWS account while am using Google password to it (your password is breached in dark website try another password) this note is showcased after that i changed my passwords but how they getting this data from Google

  • @pramodsaiteja3153
    @pramodsaiteja3153 หลายเดือนก่อน +1

    Mastaru garu...
    I have a common query, like when police arrest some one assuming they made a crime and due to circumstances police kill them( in the name of......) if such things happen how a common man(victim family members) has to react to know the truth. Could you please give glimpse info on this which is very common scenario we are seeing now a days.

    • @Murali_Mastaru
      @Murali_Mastaru  หลายเดือนก่อน

      Pramod - I am not a criminal lawyer, but still my response as common man is the concerned personnel will depict will resort to these kind of behaviour when they fail to investigate the case, in any case the stance of courts have turned to be very strict and they impose serious punishment to erring officers more often than not.

    • @jaruknath6114
      @jaruknath6114 หลายเดือนก่อน

      I could immediately think of a name which starts with Initials of South Africa followed by double J and an Or !!

  • @venkatakoushikravuri
    @venkatakoushikravuri หลายเดือนก่อน

    How to enter into cyber field.i am doing engineering and I am desperate to go into cyber field but I have idea how to get in

  • @saikarun
    @saikarun หลายเดือนก่อน

    can you make a detailed video on Mahesh Bank fraud Hyderabad branch

  • @nageshvadlamudi5929
    @nageshvadlamudi5929 หลายเดือนก่อน

    Murali sir, I want to learn cybersecurity from you..are u providing any coaching by the way..guide us please 🙏

  • @boyaraghavendra
    @boyaraghavendra หลายเดือนก่อน

    Viewers will be very happy if you explain Bangladesh Central Bank hacking case. Where some transactions are stopped by SWIFT payment network fortunately...

    • @Murali_Mastaru
      @Murali_Mastaru  หลายเดือนก่อน

      This is good one to discuss - let me do a short on this.

  • @KOTTALIKARTHIK-mg2fz
    @KOTTALIKARTHIK-mg2fz หลายเดือนก่อน

    Sir can u say abt the topic dark web

  • @vamshimarikanti1470
    @vamshimarikanti1470 หลายเดือนก่อน

    Ts phone tapping and Pegasus gurinchi discuss cheyandi

    • @Murali_Mastaru
      @Murali_Mastaru  หลายเดือนก่อน

      Phone Tapping is coming very soon....

  • @phanistuart6421
    @phanistuart6421 หลายเดือนก่อน

    Topic: how Crypto coins mining works and hacking of crypto currency?

  • @vikranthreddy7736
    @vikranthreddy7736 หลายเดือนก่อน

    Darkweb topic

  • @Tinku-jn5rn
    @Tinku-jn5rn หลายเดือนก่อน +1

    Mahesh cooperative bank robbery case study cheppandi sir and a bank vallu proper IDS/IPS systems setup chyaledhu and vallu oka chinna company tho software chepincharu. so okasari a case meru study chesi maku okasari explain chyandi sir.

  • @pmsagar
    @pmsagar หลายเดือนก่อน

    case 1 AIMS HACK in our country
    case 2 MHA informing in Press conference that on the day of ayodhya temple pran pratista jan22 this year we had 1200 ips blocked reg cyber attack on pls detail teh info

  • @balakarthikpendyala6339
    @balakarthikpendyala6339 26 วันที่ผ่านมา

    Bro I got a job email and interview and everything was done later before releasing offer letter they asked me to submit passport and resume of mine I shared them and later I realized it was a fake job email. I have registered the complaint in cyber crime online. Should I also need to go to police station what could be the resolution for this please suggest me.

  • @manishtoparam7116
    @manishtoparam7116 หลายเดือนก่อน

    Cyber security course nerchukunte bayata market unda

  • @user-qf1lg2wg9h
    @user-qf1lg2wg9h หลายเดือนก่อน

    Sir would you please EXPLAIN HOW TO PROTECT MY SELF FROM CYBER CRIMES ( MONEY MATTERS)

    • @Whackfuck
      @Whackfuck หลายเดือนก่อน

      Don’t fall for honey traps and don’t click on any links. Don’t give your personally identifiable info, cards details etc. phone number is very key for your life, your bank, aadhar, pan, ITR etc links to your phone if it’s gone your life will turn upside down.

  • @gnanatejserla6388
    @gnanatejserla6388 หลายเดือนก่อน +3

    Why not UPI is hackable?
    Total India using it.
    Is it dangerous in future that we can loos the money?
    Now money is just number in digital!!!

  • @santoshkumar-sm5ec
    @santoshkumar-sm5ec หลายเดือนก่อน +1

    Topics and solutions needed
    1. Thousands of Indian mobile SIMS going to Vietnam, reason?
    2. Where could be Pegasus software now which brought by earlier govts in AP. Is that single person able to handle today tool.
    3. If I lost phone, with find my device active, still not found.. what are worst case scenarios and solutions.
    4. Gold and drug busts in airports and ports
    5. Deep fake what's app call to request money as friend or family.
    6. Naked vedios blackmail solutions.
    7. How hard or easy an EVM to hack.
    8. How easy an normal router wifi to hack, safety tips.
    9. Hackers competetions in other nations including neighbours, record level 7 seconds to hack iPhone? Possible?
    10. What if a money heist kind of scenarios in India, how well established our depts are! who and how they handle!!!

    • @Murali_Mastaru
      @Murali_Mastaru  หลายเดือนก่อน

      This a lot of home work - OMG

  • @user-ye9bd8nw7x
    @user-ye9bd8nw7x หลายเดือนก่อน

    Please make a video on cyber security detailed roadmap for freshers

    • @ShowTime31158
      @ShowTime31158 หลายเดือนก่อน

      Already done

    • @ShowTime31158
      @ShowTime31158 หลายเดือนก่อน

      Already done...check videos

    • @user-ye9bd8nw7x
      @user-ye9bd8nw7x หลายเดือนก่อน

      @@ShowTime31158 yes I have already gone through that video but if he eloborate road map it would be more helpful

  • @rajkumarnakka4557
    @rajkumarnakka4557 หลายเดือนก่อน

    Hi sir I was scammed by xstrata online fraud company for investment
    Please add it as a topic
    So many people were scammed like me

  • @snehalatha3206
    @snehalatha3206 หลายเดือนก่อน

    Tor and kevin

  • @durga8950
    @durga8950 หลายเดือนก่อน

    Cyber security job resources.if possible course pettandi

  • @SashiA-dx7fg
    @SashiA-dx7fg หลายเดือนก่อน

    I am interested in Ethical hacking. Could you recommend me any courses.

  • @ashokraguri9073
    @ashokraguri9073 หลายเดือนก่อน

    I want to know about how to work ECIL.....is it possible to manipulate EVM's by chance any party's .....?

    • @Murali_Mastaru
      @Murali_Mastaru  หลายเดือนก่อน +1

      Every lock breaks eventually - but how long is that duration- is what matters - conspiracy theories exist for every topic in the world - you have to make a choice to believing in science or fiction eventually.

  • @ArunKumar-lk8ls
    @ArunKumar-lk8ls หลายเดือนก่อน

    Sir, week back I have got WhatsApp message with unknown number asking if interested for Video s**, is there a way we can give complaint online as anonymous person and submit proofs? If yes will Govt take immediate action on this? Asking this to save others from such traps.

  • @SupportStudents-tl7yj
    @SupportStudents-tl7yj หลายเดือนก่อน

    Posting comment in behalf of telugu cyber security aspirants, how the future of manual penetration testing jobs in future. Is it true it is replaces by Ai ?

    • @Murali_Mastaru
      @Murali_Mastaru  หลายเดือนก่อน

      That's a very large generalized comment, remember new software always has unknown pattern of bugs and hence human intelligence will always be needed, but routine/published vulnerabilities may not need humans per se.

  • @Hyd_pilla
    @Hyd_pilla หลายเดือนก่อน

    Good... Script readers 📖📖📖

  • @narendranathvaddi9853
    @narendranathvaddi9853 หลายเดือนก่อน

    Hi,
    The content is very helpful and knowledgeable,thank you very much for taking this initiative
    My question is
    Our Indian hackers are capable of hacking neighbour country which has different language altogether?
    Is there any such incident earlier happened?

    • @Murali_Mastaru
      @Murali_Mastaru  หลายเดือนก่อน

      The language of Internet is TCP/IP - all packets traverse using that, you are referring to Conte t on the websites, which is not relevant when we want to hack, the attack is on the open vectors on the Applications and OS.

    • @narendranathvaddi9853
      @narendranathvaddi9853 หลายเดือนก่อน

      @@Murali_Mastaru thanks for your reply
      Some time back I heard Chinese hackers made down our government websites
      It is just speculations or is it really?

  • @saicharanjogu
    @saicharanjogu หลายเดือนก่อน

    Hey murali, wts the the point of keeping subtitles in Telugu, if you are speaking in Telugu, I hope i can see English subtitles back..!!

    • @Murali_Mastaru
      @Murali_Mastaru  หลายเดือนก่อน

      TH-cam is playing tricks with us, we will fix it

  • @shivaakumar5998
    @shivaakumar5998 หลายเดือนก่อน

    No one knows and aware about like pagasus type technology..and how the app will be works ? And how they hack mobiles or laptops … etc. without using links .. how we can protect our mobiles from Pegasus type technologies.. can you give us brief explanation…

  • @uppalanarasimha3641
    @uppalanarasimha3641 หลายเดือนก่อน

    Penetration testing complete guide

  • @Bu4364
    @Bu4364 หลายเดือนก่อน

    Can we lock hacker details in hardware system using embedded system

    • @Murali_Mastaru
      @Murali_Mastaru  หลายเดือนก่อน

      Can you elaborate?

    • @Bu4364
      @Bu4364 28 วันที่ผ่านมา

      @@Murali_Mastaru no sir it's my doubt

  • @sreenum.p.v369
    @sreenum.p.v369 หลายเดือนก่อน

    డిటెక్టివ్ నారద sorry detective Murali master

  • @BHRKNK
    @BHRKNK หลายเดือนก่อน

    Why Hackers choose Linux servers more than windows

    • @Murali_Mastaru
      @Murali_Mastaru  หลายเดือนก่อน +1

      Flexibility of Shell (s) , access to tools, access to source code are few factors