Cyber Protection Magazine
Cyber Protection Magazine
  • 48
  • 28 627
Predictions 2023 - API Security
API security is one of those topics which don't gather too much attention, but are actually crucial, especially looking at today's world of modularized software and microservices. This year, however, might be the year where API security will get the attention it deserves - Chaim Peer, CEO of BLST Security, offers his opinion on the subject in this video statement.
zhlédnutí: 27

Video

Experts Predictions for 2023 - Part 2
zhlédnutí 58Před rokem
Our second video with predictions for 2023 from cybersecurity experts. This time our focus is on the impacts cybersecurity will have globally. This episodes features: TJ Jermoluk from Beyond identity Cesar Cid de Rivera from CommVault Antonio Sanchez from Fortra Raj Kalluri from Shufti Pro
Experts Predictions for 2023 - Part 1
zhlédnutí 45Před rokem
This is our first compilation video featuring predictions for 2023 from experts in the cybersecurity industry. This part focuses on what the trend of working remotely means for companies and their cybersecurity posture.
Modernizing your Security Operations Center (SOC)
zhlédnutí 47Před rokem
We sat together (virtually) with Richard Orange, Vice President EMEA at Exabeam, and initially, we just wanted to produce a Video Byte. While it meant to be a short conversation about why your SOC probably needs some refurbishment, it turned into a longer - and really good - discussion about SOCs in general, the role SIEMs play in that and why artificial intelligence is not only a buzzword in c...
Video Byte: Hardware Security
zhlédnutí 67Před rokem
When we speak about Cybersecurity, we are mostly discussing software. What about hardware? After all, hardware is usually inside the office, even if it's your home office - why would that need special protection? And what can attackers achieve if they do manage to hack the hardware? We've discussed this topic with Bentsi Ben-atar, CMO and Co-Founder for Sepio Systems
Video Bytes: Changing the script on cybersecurity hiring
zhlédnutí 36Před 2 lety
In this third and final episode of our video series with Matt Donato, managing director of #cybersecurity hiring company CyberSN, looks at the candidate experience in the hiring process; where it goes right and where it goes wrong. Finding sufficient human and technology resources to protect company data has reached a crisis point. Companies are desperate to hire the right people largely withou...
Video Bytes: Changing the script on cybersecurity hiring Matt Donato part 2
zhlédnutí 59Před 2 lety
Part two of our video series with Matt Donato, managing director of #cybersecurity hiring company CyberSN, looks at strategies for discovering and communicating the actual personnel need for a company. Finding sufficient human and technology resources to protect company data has reached a crisis point. Companies are desperate to hire the right people largely without knowing what kind of people ...
Video Byte: Changing the Script on Cybersecurity Hiring
zhlédnutí 26Před 2 lety
This is the first in a three-part video series where we briefly explore hiring strategies and tactics, with Matt Donato, managing director of CyberSN, a company dedicated to helping companies find the right #cybersecurity personnel. Finding sufficient human and technology resources to protect company data has reached a crisis point. Companies are desperate to hire the right people largely witho...
Video Byte: Endpoint Protection
zhlédnutí 44Před 2 lety
Endpoint protection - that still sounds a lot like "Anti-Virus“ doesn't it? But endpoint protection has come a long way from „only“ scanning for malicious software. What does modern endpoint protection entail, how does it protect from cyber attacks and how does it fit into a cybersecurity strategy of a company? We asked that question to Zac Warren, Sr. Director Cybersecurity Advisory EMEA, from...
5G Networks are on the Rise: Faraday Bags protect your electronic devices
zhlédnutí 59Před 2 lety
By now, most people have probably heard of 5G and the impact it will have. Data speeds up to 100 times faster, more bandwidth, and lower latency levels, will lead to the interconnection of devices and people worldwide. From a cybersecurity viewpoint, it’s understood that this major upgrade of the IoT means devices are built less secure for operational purposes. This has raised concerns from man...
58th Annual Design Automation Conference: Trust and Verify
zhlédnutí 185Před 2 lety
This panel of the importance of designing in security in complex semiconductors was presented at the 58th annual Design Automation Conference in San Francisco in December 2021. Moderated by Brian Fuller, editor in chief of ARM (division of Softbank), it included (l-r) Will Ruby, COO of FortifyIQ; Mike Borza, principal security technologist for Synopsys; Prabhat Misra, professor of computer scie...
Roundtable IoT Security - The Black Out will come
zhlédnutí 72Před 2 lety
“Black Out”, a book that predicted the future of IIoT security in 2012, highlighted an attack on the power grid, causing catastrophic scenes in all of Western Europe. Is this really a horror scenario from a science-fiction book? Reality seems to catch up, when we think of closed Coop supermarkets in Sweden after the Kaseya Supply Chain attack, or long traffic jams in the US after the colonial p...
Fletch.ai gives you the tools you need to find threats outside of your network and within.
zhlédnutí 160Před 2 lety
Cyber Protection Magazine interviewed the team at Gletch.ai about their tools to identify new external threats as they happen and identify who in your organization may not be who your think they are.
Video Byte: Security Service Edge
zhlédnutí 19Před 2 lety
SASE, CASB, Zero Trust, SSE - confused yet by all the abbrevations and acryonyms? Cybersecurity ist a highly dynamic field, and even the analysts find it hard to keep up. We asked Mike Schuricht, VP Products at Forcepoint, to shed some light on Security Service Edge and explains its relationship to SASE in this Video Byte. Find all Video Bytes here: cyberprotection-magazine.com/category/video-b...
The 2021 „Where‘s your Data“ Experiment
zhlédnutí 22Před 2 lety
The Dark Web is something like the speakeasy of the internet - among other, more legitimate uses, it serves as the meeting point for organized cyberattacks. But - how much so? A question that researchers from cloud security company Bitglass tried to answer with an experiment in 2015 - which they re-ran this year, with some interesting results. Cyber Protection Magazine discusses the experiment ...
Cybercriminals go after the little guys, cybersecurity goes after the big guys
zhlédnutí 25Před 2 lety
Cybercriminals go after the little guys, cybersecurity goes after the big guys
Zero Trust doesn't exist, but it should
zhlédnutí 21Před 2 lety
Zero Trust doesn't exist, but it should
Video Byte: How to fight ransomware with backups
zhlédnutí 63Před 2 lety
Video Byte: How to fight ransomware with backups
Interview: Prevention vs. Recovery - how to handle ransomware attacks
zhlédnutí 103Před 3 lety
Interview: Prevention vs. Recovery - how to handle ransomware attacks
Roundtable IoT Security - when they know what you are doing
zhlédnutí 94Před 3 lety
Roundtable IoT Security - when they know what you are doing
Video Byte: What is identity part 2 - answers from Alan Grau
zhlédnutí 19Před 3 lety
Video Byte: What is identity part 2 - answers from Alan Grau
Video Byte: What is identity Part 1- answers from Mike Kiser
zhlédnutí 67Před 3 lety
Video Byte: What is identity Part 1- answers from Mike Kiser
Video Byte: Why is Ransomware so popular?
zhlédnutí 34Před 3 lety
Video Byte: Why is Ransomware so popular?
Merging the Spheres of Identity
zhlédnutí 10Před 3 lety
Merging the Spheres of Identity
Video Byte: Cloud Security and Software Defined Perimeter
zhlédnutí 25Před 3 lety
Video Byte: Cloud Security and Software Defined Perimeter
Survey shows SMBs are a big target for cybercrime
zhlédnutí 23Před 3 lety
Survey shows SMBs are a big target for cybercrime
Itzik Feiglevitch on Security for the Internet of Things
zhlédnutí 35Před 3 lety
Itzik Feiglevitch on Security for the Internet of Things
Bentsi Ben Atar on Hardware Based Attacks
zhlédnutí 48Před 3 lety
Bentsi Ben Atar on Hardware Based Attacks
Before you get hacked, have a plan
zhlédnutí 27Před 3 lety
Before you get hacked, have a plan
USB Ninja Cable with Kevin Mitnick
zhlédnutí 25KPřed 3 lety
USB Ninja Cable with Kevin Mitnick

Komentáře

  • @pabloorellana4223
    @pabloorellana4223 Před hodinou

    Soy argentina donde lo consigo

  • @coneheadzmusic1460
    @coneheadzmusic1460 Před 11 měsíci

    I received a ninja cable once…I made the mistake of letting it into my house, and one night after everyone was asleep I woke up and saw the usb cable standing at the foot of my bed dressed in all black from head to toe. He was also wearing this strange mask! Anyways, he used this really secretive karate technique, and before I knew it, we were all stuck to the wall with Chinese stars. He took everything from us, least of all, my trust in ninja cables in the future. Such a shame!

  • @hametoapnoke9357
    @hametoapnoke9357 Před rokem

    Ueyye

  • @stefanstruik
    @stefanstruik Před rokem

    Hello @Cyber Protection Magazine, can you share with me the payload used in this video? Thanks

  • @cool_manreal
    @cool_manreal Před 2 lety

    It’s sad people believe this

  • @jeremiahonah8736
    @jeremiahonah8736 Před 2 lety

    How can the cable be setup and what is the name of this Bluetooth. Please quick answer

  • @ffmax587
    @ffmax587 Před 2 lety

    very helpful

  • @Sector404
    @Sector404 Před 2 lety

    Hello @Cyber Protection Magazine, can you share with me the payload used in this video? Thanks

    • @ivory1233
      @ivory1233 Před rokem

      your so dumb you cant even tag someone properly

    • @Sector404
      @Sector404 Před rokem

      ​@@ivory1233 Is that how you talk to your dad? It can only be by mistake that you received a brain, a spinal cord would be more than enough for you.

  • @Fm-ss4uj
    @Fm-ss4uj Před 2 lety

    What are counter measures ? How easy is it to detect if your computer is compromised.

    • @CyberProtectionMagazine
      @CyberProtectionMagazine Před 2 lety

      Counter measures in general: a good cybersecurity hygiene. For this case in particular: make sure you only buy certified cables. And how to detect an attack: it really depends on the payload, sophisticated attacks can be almost invisible. Then again, most attacks can be detected with the right tools.

    • @Fm-ss4uj
      @Fm-ss4uj Před 2 lety

      @@CyberProtectionMagazine thanks for the input. I'm starting my certifications now from the ground up. I'm already thinking of what improvements if any I can make in cyber security.So looking at different attacks,defenses to gage what's out there.

    • @ivory1233
      @ivory1233 Před rokem

      no

  • @janenyamburanjoroge56

    Where can I get that cable?

  • @sergiomauricio9290
    @sergiomauricio9290 Před 2 lety

    Mitnick the best

  • @Potter_3810
    @Potter_3810 Před 2 lety

    Please make a video on how to block it

    • @Marthastewart209.
      @Marthastewart209. Před 2 lety

      You can use a usb blocker (physical device) to block data transfer. It essentially turns a data cable into a power charging only cable

    • @Potter_3810
      @Potter_3810 Před 2 lety

      Thanks bro

  • @pavelyankouski4913
    @pavelyankouski4913 Před 2 lety

    I bet he will hack Google at the end of a career and then he will run to a Cuba

  • @kevinalexander4959
    @kevinalexander4959 Před 2 lety

    I read this guys book, Ghost in the Wires when i was in college on the bus everyday. Back in the day this guy trolled and hacked FBI officials and was always a step ahead of them. He knew when they were coming for him. Freaking hilarious.

  • @saleh.alqahtani
    @saleh.alqahtani Před 2 lety

    From where i can buy this cable ?

    • @Naz_Y3m3n
      @Naz_Y3m3n Před 2 lety

      Hak5

    • @ivory1233
      @ivory1233 Před rokem

      call 911 for it and theyll send it to you just give them your adress

  • @albertcurielx
    @albertcurielx Před 2 lety

    WTFFFFFFFFFFFFFFFF omG!

  • @starviptv6544
    @starviptv6544 Před 2 lety

    📚LOL 💾🧀🐀 - wave airs are dangerously loud .

  • @tharinduwiraj2563
    @tharinduwiraj2563 Před 3 lety

    Thanks

  • @skunkgrowusa
    @skunkgrowusa Před 3 lety

    where is the ducky code for this?

  • @erasmus5369
    @erasmus5369 Před 3 lety

    You're a terrible person and hope you realize it!!

  • @trichert7360
    @trichert7360 Před 3 lety

    Some sites detect log in from strange, different ip , bah you are caught

    • @trichert7360
      @trichert7360 Před 3 lety

      And the video was made BEFORE popular password manager compromise

    • @Abdullah_Al-Sammarraie
      @Abdullah_Al-Sammarraie Před 3 lety

      bah,I use a vpn for a reason

    • @mareikestatt4520
      @mareikestatt4520 Před 3 lety

      Well, as in the scenario, both are in the same network. Both have the same public ip, so it really doesn't matter and there is no way websites can check anything. Same browser, same ip, even same fingerprint, since the entire browser session gets copied. It's really game over for the victim, because they might be able to turn off 2FA, change passwords, backup email, everything

  • @stark6314
    @stark6314 Před 3 lety

    Yes that cable is dangerous

    • @ivory1233
      @ivory1233 Před rokem

      hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm

  • @tyronejay5510
    @tyronejay5510 Před 3 lety

    Hes such a pro that he doesnt care if he shows his password

    • @simonp37
      @simonp37 Před rokem

      Passwords are easy to guess. Using multifactor authentication is the key ;-)

    • @jaysonjoy6467
      @jaysonjoy6467 Před rokem

      A real hacker never put any credentials in browser. They save these kind of credentials which is not much important

    • @ivory1233
      @ivory1233 Před rokem

      my mojmmuy said you are meanie

  • @riajtech1699
    @riajtech1699 Před 3 lety

    The Google Chrome must fix this issue

    • @tinu949
      @tinu949 Před 3 lety

      Google Chrome is the issue

    • @riajtech1699
      @riajtech1699 Před 3 lety

      @@tinu949 but its the same case on every browser

    • @kurdmajid4874
      @kurdmajid4874 Před 3 lety

      @@riajtech1699 not tor

    • @riajtech1699
      @riajtech1699 Před 3 lety

      @@kurdmajid4874 what tor ??

    • @kurdmajid4874
      @kurdmajid4874 Před 3 lety

      @@riajtech1699 its a web browser its how people acess the dark web its the most secured browser

  • @hackzgamezyt
    @hackzgamezyt Před 3 lety

    Wait this has been out for awhile, is there still not a security update for this?

    • @syphaxxxxx
      @syphaxxxxx Před 3 lety

      Like keyloggers has been out for years , but no security update can catch them , i guess the same thing is going with usb ninja

    • @seanfaherty
      @seanfaherty Před 2 lety

      On a windows machine you can make USBs need permission. Works on a rubber ducky but people will give the cable permission .

    • @ivory1233
      @ivory1233 Před rokem

      nah i just use my Dora the explorer phone and she protects me from hostile nucellar threats from north Korea

  • @michaeljearfed5913
    @michaeljearfed5913 Před 3 lety

    best video ever

  • @AndyHayter
    @AndyHayter Před 4 lety

    Great Presentation. On the topic of free security software you have to factor in support or lack of support. Most security products that you buy come with some form of support. While most 'free' security products will ask you to pay additionally if you need support.