Malware & Cybersecurity Threats on the Horizon

  Рет қаралды 61,286

John Hammond

John Hammond

Ай бұрын

jh.live/x-force-tii || Join me as I take a deep dive into the IBM Threat Intelligence Index with Malware Reverse Engineer at IBM X-Force, Golo Mühr. In our discussion, Golo shares his perspective on the trends in this year’s report, takes a closer look at IBM X-Force’s work and provides his predictions for the year ahead in cybersecurity.
You can check out the full IBM X-Force Threat Intelligence Index report here jh.live/x-force-tii and learn more about IBM X-Force here: jh.live/x-force-info
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥KZfaq ALGORITHM ➡ Like, Comment, & Subscribe!

Пікірлер: 51
@cedmim6461
@cedmim6461 Ай бұрын
Do you plan to make a video on the tukaani-project/xz package backdoor?
@BlablablaBla-tp1ws
@BlablablaBla-tp1ws Ай бұрын
Just what I was about to ask!
@aga1nstall0dds
@aga1nstall0dds Ай бұрын
Imagine john hammond is Jia tang :) just kidding plz dont hack me
@Nutle159
@Nutle159 Ай бұрын
Just read through the xz shell script (posted on research swtch) and thought that it would be nice to see all that in action with John's commentaries! I'm sure a video is coming, can't wait!
@lowerclasswarfare
@lowerclasswarfare 29 күн бұрын
Came here to ask this
@ahr0cdovlzk3my1lahqtbmftdw7
@ahr0cdovlzk3my1lahqtbmftdw7 27 күн бұрын
Boring
@joaovaz1289
@joaovaz1289 28 күн бұрын
AI is definitely over hyped, unfortunately AI today is like "blockchain" was a couple years ago where just by adding "blockchain" to your company's name would multiply it's value by 10x... On the phishing part thou it's a real risk, 99.9% of phishing mails are super easy to identify due to grammar errors or badly spelled words but with the LLM's that are being made available it will get harder to identify it like that (yeah, normal every day users do not have the skill to do a deeper analysis, they just go by the "basics" like wrong mail account, spelling errors and grammar errors)
@list1726
@list1726 Ай бұрын
Thanks for posting
@Cubear99
@Cubear99 26 күн бұрын
I have a question. Sometimes, explore starts by open settings, then starts typing a website after that gets links and closed up. I think it will save it in the bookmarks. What do I need to do about it?.
@fankyWunk
@fankyWunk Ай бұрын
I just read a paper on IEEE Explore called Automated Penetration Testing with Fine-Grained Control through Deep Reinforcement Learning (not allowed to link it), I’m curious as to what you think the future implications of things like this could be?
@fankyWunk
@fankyWunk Ай бұрын
Abstract: Penetration testing (PT) is an active method of evaluating the security of a network by simulating various types of cyber attacks in order to identify and exploit vulnerabilities. Traditional PT involves a time-consuming and labor-intensive process that is prone to errors and cannot be easily formulated. Researchers have been investigating the potential of deep reinforcement learning (DRL) to develop automated PT (APT) tools. However, using DRL in APT is challenged by partial observability of the environment and the intractability problem of the huge action space. This paper introduces RLAPT, a novel DRL approach that directly overcomes these challenges and enables intelligent automation of the PT process with precise control. The proposed method exhibits superior efficiency, stability, and scalability in finding the optimal attacking policy on the simulated experiment scenario.
@kcnl2522
@kcnl2522 Ай бұрын
Things like this have made me reconsider my desire to go into security. Still in uni but i think i would have a better future if i just go for software development or something more low level. Other stuff is getting automated, and even if it isnt good enough, companies will chose automated tools over real pentests anyday just to cut the costs. They just need the automated tools to be good enough so they can pass standards.
@fankyWunk
@fankyWunk Ай бұрын
@@kcnl2522I get that, though we are still a long way off from this really being applicable outside of research and simulations, and there still need to be humans to run and manage it, so I wouldn’t be too worried, I’m also an IT student and there are so many facets to things like this that I would not worry about AI taking over the field anytime soon
@kcnl2522
@kcnl2522 Ай бұрын
@@fankyWunk AI is just the buzzword they are using to cheap out on employers. I dont worry about it because i dont plan nor want to work for someone else my whole life. The point is, that they will make it really hard to work a fulfilling jov
@smnomad9276
@smnomad9276 Ай бұрын
Could you elaborate? What is that exactly?
@furyzlm7853
@furyzlm7853 Ай бұрын
xz backdoor vid ,plz? 🥺
@mercenarie666
@mercenarie666 Ай бұрын
Good content, are there links to articles and info from their research?
@brentsalassi5245
@brentsalassi5245 Ай бұрын
That’s the link John shared several videos back.
@brentsalassi5245
@brentsalassi5245 Ай бұрын
Never mind. Looks like I can’t post the link.
@nordgaren2358
@nordgaren2358 Ай бұрын
@@brentsalassi5245Which link are you trying to post? Is it to the xforce report? There is a link in the description for it. It's the jh.live/x-force-tii link, I think.
@brentsalassi5245
@brentsalassi5245 Ай бұрын
@@nordgaren2358 That’s the one. I swear it wasn’t there earlier, but I’m probably wrong.
@claudiamanta1943
@claudiamanta1943 19 күн бұрын
6:58 How do you determine that the attack is orchestrated by a state?
@user-cv1ij4dv5b
@user-cv1ij4dv5b Ай бұрын
great video.
@willredmambo3777
@willredmambo3777 Ай бұрын
awesome content
@JamesonMcree
@JamesonMcree Ай бұрын
does anyone know what keyboard he is using now is?
@takatoekoe
@takatoekoe Ай бұрын
Would like to know too
@clarkey8598
@clarkey8598 29 күн бұрын
Keyboard: Macally 2.4G Small Wireless Keyboard Mouse: Logitech MX MASTER 3S
@shakibbro2
@shakibbro2 14 күн бұрын
please 1 video how to hacked gmail password please please new video 🙏🙏🙏🙏🙏🙏
@Barty_unky
@Barty_unky Ай бұрын
Hello 👋🏻
@mk-ps6xv
@mk-ps6xv Ай бұрын
gg
@lyxcheats
@lyxcheats Ай бұрын
hii
@SpectralAI
@SpectralAI Ай бұрын
This is why we should never have accepted document technologies that allow executable code in a document. Try telling that to Microsoft or Adobe. Dumb dumb dumb. And same goes for embedded URLs.
@apIthletIcc
@apIthletIcc 29 күн бұрын
How do you suppose files get executed when everything is technically just a text file at heart? Genuinely curious how, because even with a lot of knowledge into the matter, I can't make sense of not using documents... What am I missing
@apIthletIcc
@apIthletIcc 29 күн бұрын
i think what you're saying is sanitation and stripping of executable code needs to be improved
@somexne
@somexne Ай бұрын
Nice AI Generated thumbnail
@mathieucaron4957
@mathieucaron4957 Ай бұрын
Another reason to send NATO in Naziland.
this Cybersecurity Platform is FREE
39:46
John Hammond
Рет қаралды 504 М.
Қайрат Нұртас & ИРИНА КАЙРАТОВНА - Түн
03:41
RAKHMONOV ENTERTAINMENT
Рет қаралды 482 М.
NO NO NO YES! (40 MLN SUBSCRIBERS CHALLENGE!) #shorts
00:27
PANDA BOI
Рет қаралды 103 МЛН
BRAWLER MUTATIONS WILL BREAK THE GAME! - Brawl Talk
09:34
Brawl Stars
Рет қаралды 26 МЛН
船长被天使剪成光头了?#天使 #小丑 #超人不会飞
00:28
超人不会飞
Рет қаралды 19 МЛН
Top 10 Countries With Most Powerful Hacker In The World. #shorts
0:29
aryan G.S Short Videos
Рет қаралды 981 М.
Biggest Cybersecurity Threats you need to know about!
54:15
David Bombal Tech
Рет қаралды 17 М.
Finding WEIRD Devices on the Public Internet
27:48
John Hammond
Рет қаралды 143 М.
Generate an editable .DOCX pentest report in under 60s
2:00
Pentest-Tools
Рет қаралды 1,4 М.
Free Coding Tool Distributes Malware
42:12
John Hammond
Рет қаралды 126 М.
Why flat earthers scare me
8:05
Sabine Hossenfelder
Рет қаралды 114 М.
Learn HTML5 and CSS3 For Beginners - Crash Course
3:54:03
developedbyed
Рет қаралды 2,4 МЛН
An Introduction to Malware Analysis
1:10:01
crow
Рет қаралды 27 М.
Қайрат Нұртас & ИРИНА КАЙРАТОВНА - Түн
03:41
RAKHMONOV ENTERTAINMENT
Рет қаралды 482 М.