Malware & Cybersecurity Threats on the Horizon

2024 ж. 3 Сәу.
61 597 Рет қаралды

jh.live/x-force-tii || Join me as I take a deep dive into the IBM Threat Intelligence Index with Malware Reverse Engineer at IBM X-Force, Golo Mühr. In our discussion, Golo shares his perspective on the trends in this year’s report, takes a closer look at IBM X-Force’s work and provides his predictions for the year ahead in cybersecurity.
You can check out the full IBM X-Force Threat Intelligence Index report here jh.live/x-force-tii and learn more about IBM X-Force here: jh.live/x-force-info
Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
📧JOIN MY NEWSLETTER ➡ jh.live/email
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
🔥KZhead ALGORITHM ➡ Like, Comment, & Subscribe!

Пікірлер
  • Thanks for posting

    @list1726@list1726Ай бұрын
  • Do you plan to make a video on the tukaani-project/xz package backdoor?

    @cedmim6461@cedmim6461Ай бұрын
    • Just what I was about to ask!

      @BlablablaBla-tp1ws@BlablablaBla-tp1wsАй бұрын
    • Imagine john hammond is Jia tang :) just kidding plz dont hack me

      @aga1nstall0dds@aga1nstall0ddsАй бұрын
    • Just read through the xz shell script (posted on research swtch) and thought that it would be nice to see all that in action with John's commentaries! I'm sure a video is coming, can't wait!

      @Nutle159@Nutle159Ай бұрын
    • Came here to ask this

      @lowerclasswarfare@lowerclasswarfareАй бұрын
    • Boring

      @ahr0cdovlzk3my1lahqtbmftdw7@ahr0cdovlzk3my1lahqtbmftdw7Ай бұрын
  • great video.

    @user-cv1ij4dv5b@user-cv1ij4dv5bАй бұрын
  • AI is definitely over hyped, unfortunately AI today is like "blockchain" was a couple years ago where just by adding "blockchain" to your company's name would multiply it's value by 10x... On the phishing part thou it's a real risk, 99.9% of phishing mails are super easy to identify due to grammar errors or badly spelled words but with the LLM's that are being made available it will get harder to identify it like that (yeah, normal every day users do not have the skill to do a deeper analysis, they just go by the "basics" like wrong mail account, spelling errors and grammar errors)

    @joaovaz1289@joaovaz1289Ай бұрын
  • awesome content

    @willredmambo3777@willredmambo3777Ай бұрын
  • I have a question. Sometimes, explore starts by open settings, then starts typing a website after that gets links and closed up. I think it will save it in the bookmarks. What do I need to do about it?.

    @Cubear99@Cubear99Ай бұрын
  • I just read a paper on IEEE Explore called Automated Penetration Testing with Fine-Grained Control through Deep Reinforcement Learning (not allowed to link it), I’m curious as to what you think the future implications of things like this could be?

    @fankyWunk@fankyWunkАй бұрын
    • Abstract: Penetration testing (PT) is an active method of evaluating the security of a network by simulating various types of cyber attacks in order to identify and exploit vulnerabilities. Traditional PT involves a time-consuming and labor-intensive process that is prone to errors and cannot be easily formulated. Researchers have been investigating the potential of deep reinforcement learning (DRL) to develop automated PT (APT) tools. However, using DRL in APT is challenged by partial observability of the environment and the intractability problem of the huge action space. This paper introduces RLAPT, a novel DRL approach that directly overcomes these challenges and enables intelligent automation of the PT process with precise control. The proposed method exhibits superior efficiency, stability, and scalability in finding the optimal attacking policy on the simulated experiment scenario.

      @fankyWunk@fankyWunkАй бұрын
    • Things like this have made me reconsider my desire to go into security. Still in uni but i think i would have a better future if i just go for software development or something more low level. Other stuff is getting automated, and even if it isnt good enough, companies will chose automated tools over real pentests anyday just to cut the costs. They just need the automated tools to be good enough so they can pass standards.

      @kcnl2522@kcnl2522Ай бұрын
    • @@kcnl2522I get that, though we are still a long way off from this really being applicable outside of research and simulations, and there still need to be humans to run and manage it, so I wouldn’t be too worried, I’m also an IT student and there are so many facets to things like this that I would not worry about AI taking over the field anytime soon

      @fankyWunk@fankyWunkАй бұрын
    • @@fankyWunk AI is just the buzzword they are using to cheap out on employers. I dont worry about it because i dont plan nor want to work for someone else my whole life. The point is, that they will make it really hard to work a fulfilling jov

      @kcnl2522@kcnl2522Ай бұрын
    • Could you elaborate? What is that exactly?

      @smnomad9276@smnomad9276Ай бұрын
  • xz backdoor vid ,plz? 🥺

    @furyzlm7853@furyzlm7853Ай бұрын
  • Good content, are there links to articles and info from their research?

    @mercenarie666@mercenarie666Ай бұрын
    • That’s the link John shared several videos back.

      @brentsalassi5245@brentsalassi5245Ай бұрын
    • Never mind. Looks like I can’t post the link.

      @brentsalassi5245@brentsalassi5245Ай бұрын
    • @@brentsalassi5245Which link are you trying to post? Is it to the xforce report? There is a link in the description for it. It's the jh.live/x-force-tii link, I think.

      @nordgaren2358@nordgaren2358Ай бұрын
    • @@nordgaren2358 That’s the one. I swear it wasn’t there earlier, but I’m probably wrong.

      @brentsalassi5245@brentsalassi5245Ай бұрын
  • 6:58 How do you determine that the attack is orchestrated by a state?

    @claudiamanta1943@claudiamanta1943Ай бұрын
  • does anyone know what keyboard he is using now is?

    @JamesonMcree@JamesonMcreeАй бұрын
    • Would like to know too

      @takatoekoe@takatoekoeАй бұрын
    • Keyboard: Macally 2.4G Small Wireless Keyboard Mouse: Logitech MX MASTER 3S

      @clarkey8598@clarkey8598Ай бұрын
  • please 1 video how to hacked gmail password please please new video 🙏🙏🙏🙏🙏🙏

    @shakibbro2@shakibbro2Ай бұрын
  • Hello 👋🏻

    @Barty_unky@Barty_unkyАй бұрын
  • gg

    @mk-ps6xv@mk-ps6xvАй бұрын
  • hii

    @lyxcheats@lyxcheatsАй бұрын
  • Nice AI Generated thumbnail

    @somexne@somexneАй бұрын
  • This is why we should never have accepted document technologies that allow executable code in a document. Try telling that to Microsoft or Adobe. Dumb dumb dumb. And same goes for embedded URLs.

    @SpectralAI@SpectralAIАй бұрын
    • How do you suppose files get executed when everything is technically just a text file at heart? Genuinely curious how, because even with a lot of knowledge into the matter, I can't make sense of not using documents... What am I missing

      @apIthletIcc@apIthletIccАй бұрын
    • i think what you're saying is sanitation and stripping of executable code needs to be improved

      @apIthletIcc@apIthletIccАй бұрын
  • Another reason to send NATO in Naziland.

    @mathieucaron4957@mathieucaron4957Ай бұрын
KZhead