Тёмный
Cyber Security
Cyber Security
Cyber Security
Подписаться
Cyber Security News, Knowledge & Awareness
Disney Hacked, What Happened?
6:27
День назад
TeamViewer Hacked, What's Going On!!
13:45
28 дней назад
Sextortion!! What to Do?
15:19
2 месяца назад
MediSecure Hacked, What Happened?
8:31
2 месяца назад
Dell Hacked, What Happened?
10:52
2 месяца назад
Dropbox Hacked, What Happened?
8:22
2 месяца назад
VW Hacked? What Happened?
8:54
3 месяца назад
Mitre Hacked, What Happened?
11:26
3 месяца назад
Комментарии
@DBlizt2k6
@DBlizt2k6 14 дней назад
I switched to RustDesk a while ago. Its complete free. There is a paid version for self hosting I believe.
@japlic
@japlic 15 дней назад
Not your computer, not your files, remember boys, the cloud is just another man's computer
@user-ud8hw4gp6t
@user-ud8hw4gp6t 21 день назад
die russen haben das gehackt um uns auszuspionieren XD XD XD
@user-ud8hw4gp6t
@user-ud8hw4gp6t 21 день назад
thats why you should go for your private rtmp streeam :)
@SatoshiNakamoto.Bitcoin
@SatoshiNakamoto.Bitcoin 27 дней назад
My isn't working
@RadiantSwitch
@RadiantSwitch 29 дней назад
I just installed it 2 days ago
@RicardoAlonso_Art
@RicardoAlonso_Art 29 дней назад
try freenx
@Midash2k
@Midash2k 27 дней назад
Noice!
@cyberdevil657
@cyberdevil657 13 дней назад
oof
@TechnoMinded-qp5in
@TechnoMinded-qp5in 2 месяца назад
Microsoft thinks just because you have a policy you're above the law no it doesn't work that way people think again.
@Lord-Sméagol
@Lord-Sméagol 2 месяца назад
Law enforcement will have a wet dream over this if you sign in using face recognition or fingerprint; They can simply grab your hand and force your finger onto the fingerprint reader or grab your head to show your face to the camera WITHOUT A WARRANT! This isn't restricted to law enforcement, ANYONE can man-handle you! Use a strong password, then law enforcement will need to get a warrant!
@hydrohasspoken6227
@hydrohasspoken6227 2 месяца назад
If law enforcement needs any info on my laptop, I will gladly unlock it for them. They will mostly find books, pictures and quality porn on my PC. I am good.
@hydrohasspoken6227
@hydrohasspoken6227 2 месяца назад
Don't commit crime and you will be fine.
@hydrohasspoken6227
@hydrohasspoken6227 2 месяца назад
as a fellow criminal, your fear is related.
@TechnoMinded-qp5in
@TechnoMinded-qp5in 2 месяца назад
Law enforcement is breaking their own laws forcing people to deliberately switch to Linux can't wait until someone exploits Linux and be able to put it on every Smartphone and De Google and De Apple your Smartphone.
@devanandkumar1833
@devanandkumar1833 2 месяца назад
Somewhere I read about a malware that is specially for apple devices and the malware keeps an eye on user credentials.
@cloudsong5091
@cloudsong5091 2 месяца назад
Any Laptop that's immune to hacking ?
@Cybscr
@Cybscr 2 месяца назад
Offline hidden in a bunker, maybe, but i wouldnt bet money on it
@user-gl7iu7tp2j
@user-gl7iu7tp2j 2 месяца назад
Fagimal has struck again
@adriancoanda9227
@adriancoanda9227 2 месяца назад
y don't think it was just dell targeted might be Lenovo also
@ZombieLurker
@ZombieLurker 2 месяца назад
Good videos, I hadn't heard about this yet. At some point when you can invest in a better mic, would be even better. Have to turn volume up super loud. +1 Sub.
@Cybscr
@Cybscr 2 месяца назад
Thanks. It's still a small channel, I post when I get some time, if/when it grows I will do a proper setup.
@BlockchainShango
@BlockchainShango 2 месяца назад
Thanks for sharing
@VioFax
@VioFax 2 месяца назад
We know what rhymes with Dell...
@denis2381
@denis2381 2 месяца назад
Taco Bell?
@MurasakiShizu
@MurasakiShizu 2 месяца назад
Hell
@Corteum
@Corteum 2 месяца назад
Well (as in 'Get Well') 😂
@y2ksw1
@y2ksw1 2 месяца назад
Great!🤗
@deilyyxx
@deilyyxx 2 месяца назад
this is crazy
@dissonantiacognitiva7438
@dissonantiacognitiva7438 3 месяца назад
Credential stuffing with single sign on seems like a match made in hell
@Richblackhat
@Richblackhat 3 месяца назад
Oldies but goodies. The old "Free VPN APP, ok now you're mine" strategy. But every time there is a new twist
@WahedaAfrose
@WahedaAfrose 3 месяца назад
Good
@MdRasel-xg2ys
@MdRasel-xg2ys 3 месяца назад
Nice
@rebeccaaldrich3396
@rebeccaaldrich3396 3 месяца назад
Chinese hackers on the loose!😅
@-Aar-n
@-Aar-n 3 месяца назад
Copilot was stealth installed on Server 2024 cloud=connected=hacked
@-Aar-n
@-Aar-n 3 месяца назад
xz util.. PuTTY .. C/PHP… and this. Is it happening?!?!?
@comosaycomosah
@comosaycomosah 3 месяца назад
danggggg now thats a shocking one
@yasinmohamed8528
@yasinmohamed8528 3 месяца назад
This is disturbing! Who is safe I wonder?
@Cybscr
@Cybscr 3 месяца назад
As they say: it is not a matter of "if" you will be hacked, but "when"
@D.von.N
@D.von.N 3 месяца назад
nobody. Don't pay for 'delete me' or 'aura', it is worthless.
@monnombre6547
@monnombre6547 3 месяца назад
wow!
@Lupinicus1664
@Lupinicus1664 3 месяца назад
So car makers have been reckless with their security and would rather just sell them to unsuspecting customers elsewhere than fix their problems. Marvelous.
@Cybscr
@Cybscr 3 месяца назад
Exactly, until they suffer a breach that causes them damage or new regulations force them.
@lancemarchetti8673
@lancemarchetti8673 3 месяца назад
Brilliant
@carlrose4877
@carlrose4877 5 месяцев назад
Content is OK but the AI voice is terrible
@-VarietyVerse
@-VarietyVerse 5 месяцев назад
thanks mate 👍
@teunaydin
@teunaydin 2 года назад
very nice thanks
@BR-gt4zk
@BR-gt4zk 3 года назад
excellent bunch of videos - i searched lots and i found only this to be short and sweet - Thank you tons
@nagarajgokarnkar6622
@nagarajgokarnkar6622 3 года назад
Please make video series on iso data privacy
@vsolomon811
@vsolomon811 3 года назад
How to buy that ?
@RanidaGob
@RanidaGob 3 года назад
Thank you for all these videos
@jahidapk4547
@jahidapk4547 4 года назад
how to write a policy document
@Cybscr
@Cybscr 3 года назад
Depends on the topic of the policy. You would need good skills in language, and a clear understanding of the scope of the policy. If the policy is technical, then you should be aware of the technical details. You can look up some templates online for some ideas.
@rohitdhruti771
@rohitdhruti771 4 года назад
I do not understand why can any-one dislike this amazing content, each topic covered in depth.
@DmitriousBazhanov
@DmitriousBazhanov 4 года назад
- Verify config items against the repository - Compare config using appropriate tools - Report all deviations for approved corrections - Verify the config items physically - Review the target for the repository completeness
@DmitriousBazhanov
@DmitriousBazhanov 4 года назад
- Results of Physical Verification (Internal) - License Deviations (MEA03) - Results of Repository Reviews (Internal)
@DmitriousBazhanov
@DmitriousBazhanov 4 года назад
- Identify status change of config items and report them - Match config changes with approved requests - Report unauthorized changes - Identify stakeholder reporting reqs - Produce reports according to the reqs
@DmitriousBazhanov
@DmitriousBazhanov 4 года назад
A: Head IT Oper. R: Head IT Admin I: - Results of Physical Inventory Checks (BAI09) O: - Config Status Reports (BAI03 / DSS02)
@DmitriousBazhanov
@DmitriousBazhanov 4 года назад
- Regularly identify changes to the config items - Review the propose config changes against the baseline - Create and approve changes to config baselines
@DmitriousBazhanov
@DmitriousBazhanov 4 года назад
Updated Repository with Config Items (DSS02) Approved Changes to Baseline (BAI03)
@DmitriousBazhanov
@DmitriousBazhanov 4 года назад
- Change Request Status Reports (BAI06) - Asset Register (BAI09) - Asset Register Revisions (BAI09)
@DmitriousBazhanov
@DmitriousBazhanov 4 года назад
- Identify and Classify config items - Populate the repository - Create and agree on config baselines of services and applications
@DmitriousBazhanov
@DmitriousBazhanov 4 года назад
Register of Software Licenses (BAI09) OP: Config Repository (BAI09 / DSS02) Config Baseline (BAI03)
@DmitriousBazhanov
@DmitriousBazhanov 4 года назад
Practice 2: Establish and maintain a configuration repository Accountable: Head IT Operations Responsible: Head IT Administration / Service Manager
@DmitriousBazhanov
@DmitriousBazhanov 4 года назад
Practice 1: Establish a Configuration Model Includes: - Define the scope of the config management - State which assets and services will be included - Establish a logical model for config management - Include info such as config item types, item attributes, relationship types and attributes, status codes
@DmitriousBazhanov
@DmitriousBazhanov 4 года назад
Process Goal 1: Configuration Repository is Updated and Accurate - Number of deviations between config repository and live config
@DmitriousBazhanov
@DmitriousBazhanov 4 года назад
IT Goal 1: IT Compliance with Laws and Regulations - Cost of IT non-compliance IT Goal 2: Optimization of IT Assets and Resources - Business satisfaction level with IT related costs IT Goal 3: Availability of Reliable Info - Business satisfaction level with the info quality