Simone's CyberSecurity
Simone's CyberSecurity
  • Видео 55
  • Просмотров 18 980
Understanding XZ Utils CVE-2024-3094: Key Fundamentals
Dive into the critical aspects of the CVE-2024-3094 vulnerability in XZ Utils with our comprehensive guide. This video covers the essential fundamentals you need to grasp the impact and scope of this security flaw, including what makes systems vulnerable, how the vulnerability is exploited, and the basics of related technologies like OpenSSH, OpenSSL, and systemd. Whether you're a cybersecurity enthusiast, a system administrator, or just keen to learn about software security, this video provides the insights you need to understand and address this significant issue.
- #CVE2024_3094
- #XZUtilsVulnerability
- #Cybersecurity
- #OpenSSH
- #OpenSSL
- #Systemd
- #LinuxSecurity
- #TechEducation
Просмотров: 605

Видео

Understanding XZ Utils CVE-2024-3094 in हिंदी
Просмотров 1745 месяцев назад
In Hindi | हिंदी Dive into the critical aspects of the CVE-2024-3094 vulnerability in XZ Utils. This video covers the essential fundamentals you need to grasp the impact and scope of this security flaw, including what makes systems vulnerable, how the vulnerability is exploited, and the basics of related technologies like OpenSSH, OpenSSL, and systemd. Whether you're a cybersecurity enthusiast,...
Difference in VULNERABILITY vs THREAT vs RISK
Просмотров 1596 месяцев назад
Dive into the basics of cybersecurity with our simple yet powerful analogy that anyone can understand! In this video, we break down the complex concepts of vulnerability, threat, and risk using the example of a mosquito net. Whether you're a cybersecurity newbie or just looking for a refresher, this video will give you a clear understanding of these crucial components of digital security. Say g...
Difference in VULNERABILITY vs THREAT vs RISK | [ HINDI ]
Просмотров 2176 месяцев назад
In this video in HINDI, we break down the complex concepts of vulnerability, threat, and risk using the example of a mosquito net. Whether you're a cybersecurity newbie or just looking for a refresher, this video will give you a clear understanding of these crucial components of digital security. Say goodbye to confusion and hello to clarity-watch now and secure your knowledge! #CybersecurityBa...
Understanding the ConnectWise CVE-2024-1709 in HINDI
Просмотров 3807 месяцев назад
In HINDI take a dive into the critical ConnectWise CVE-2024-1709 vulnerability that has impacted users worldwide. This video offers a comprehensive overview of the CVE-2024-1709 vulnerability found in ConnectWise, explaining how the exploit works, the implications for businesses in HINDI. Whether you're an IT professional, a business owner relying on ConnectWise, or just interested in cybersecu...
Understanding the ConnectWise CVE-2024-1709
Просмотров 6397 месяцев назад
Dive into the critical ConnectWise CVE-2024-1709 vulnerability that has impacted users worldwide. This video offers a comprehensive overview of the CVE-2024-1709 vulnerability found in ConnectWise, explaining how the exploit works, the implications for businesses. Whether you're an IT professional, a business owner relying on ConnectWise, or just interested in cybersecurity, this video provides...
Unveiling New Process Injection Attack from Black Hat 2023 in HINDI | Part 5
Просмотров 677 месяцев назад
Welcome to the grand finale of our 'Advanced Malware Tactics' series - Part 5, where we delve into the groundbreaking process injection techniques unveiled at the Black Hat Summit 2023. This video is dedicated to the cutting-edge research that has brought to light novel methods of process injection by the research presented by the team at SafeBreach, which remain undetected by current cybersecu...
Unveiling New Process Injection Attack from Black Hat 2023 | Part 5
Просмотров 1557 месяцев назад
Welcome to the grand finale of our 'Advanced Malware Tactics' series - Part 5, where we delve into the groundbreaking process injection techniques unveiled at the Black Hat Summit 2023. This video is dedicated to the cutting-edge research that has brought to light novel methods of process injection by the research presented by the team at SafeBreach, which remain undetected by current cybersecu...
QakBot Malware Analysis in HINDI: Dissecting Process Injection Attack | Part 4
Просмотров 887 месяцев назад
In Part 4 of our 'Advanced Malware Tactics' series, we take a theoretical yet intensive look at the notorious QakBot malware, renowned for its use of process injection. Through this video, we unravel how QakBot deploys its stealthy maneuvers to infiltrate legitimate Windows processes, like Wermgr.exe, to execute malicious activities. Armed with a real script from a QakBot investigation, we exam...
QakBot Malware Analysis: Dissecting Process Injection Attack | Part 4
Просмотров 1907 месяцев назад
In Part 4 of our 'Advanced Malware Tactics' series, we take a theoretical yet intensive look at the notorious QakBot malware, renowned for its use of process injection. Through this video, we unravel how QakBot deploys its stealthy maneuvers to infiltrate legitimate Windows processes, like Wermgr.exe, to execute malicious activities. Armed with a real script from a QakBot investigation, we exam...
Process Injection Attack Fundamentals in HINDI: Allocation, Write, Execution Explained | Part 3
Просмотров 787 месяцев назад
Step into Part 3 of our 'Advanced Malware Tactics' series, where we dissect the building blocks of process injection: Allocation, Write, and Execution. This installment is the cornerstone of the series, laying out the essential stages that form the backbone of any process injection technique. In this deep dive, we clarify why these three fundamental stages - Allocation, Write, and Execution - a...
Process Injection Attack Fundamentals: Allocation, Write, Execution Explained | Part 3
Просмотров 907 месяцев назад
Step into Part 3 of our 'Advanced Malware Tactics' series, where we dissect the building blocks of process injection: Allocation, Write, and Execution. This installment is the cornerstone of the series, laying out the essential stages that form the backbone of any process injection technique. In this deep dive, we clarify why these three fundamental stages - Allocation, Write, and Execution - a...
Understanding Injection Attack in HINDI: Essential Cybersecurity Evasion Techniques | Part 2
Просмотров 737 месяцев назад
Welcome to our Hindi-speaking viewers! This 'Advanced Malware Tactics: Process Injection Deep Dive' series is crafted for those who prefer content in Hindi. Dive into Part 2 of our 'Advanced Malware Tactics' series where we introduce the concept of Process Injection - a crucial evasion technique used by cyber attackers. This video provides a clear overview of how process injection works and why...
Understanding Injection Attack: Essential Cybersecurity Evasion Techniques | Part 2
Просмотров 937 месяцев назад
Dive into Part 2 of our 'Advanced Malware Tactics' series where we introduce the concept of Process Injection - a crucial evasion technique used by cyber attackers. This video provides a clear overview of how process injection works and why it's a preferred method for avoiding detection. Before we get into the technicalities in Part 3, it's vital to grasp why process injection is a cornerstone ...
Process Injection Explained in HINDI: Windows OS Fundamentals for Cybersecurity | Part 1
Просмотров 1817 месяцев назад
Process Injection Explained in HINDI: Windows OS Fundamentals for Cybersecurity | Part 1
Process Injection Explained: Windows OS Fundamentals for Cybersecurity | Part 1
Просмотров 2527 месяцев назад
Process Injection Explained: Windows OS Fundamentals for Cybersecurity | Part 1
Citrix Bleed Attack | in HINDI | in हिंदी | CVE-2023-4966
Просмотров 25110 месяцев назад
Citrix Bleed Attack | in HINDI | in हिंदी | CVE-2023-4966
Boeing Ransomware Attack aur Citrix Bleed Vulnerability: Ek Vishleshan (बोइंग रैनसमवेयर हमला)
Просмотров 10410 месяцев назад
Boeing Ransomware Attack aur Citrix Bleed Vulnerability: Ek Vishleshan (बोइंग रैनसमवेयर हमला)
Deep Dive into Citrix Bleed: Understanding Netscaler Vulnerability (CVE-2023-4966)
Просмотров 1,7 тыс.10 месяцев назад
Deep Dive into Citrix Bleed: Understanding Netscaler Vulnerability (CVE-2023-4966)
LockBit vs BOEING: Unpacking the High-Stakes Ransomware | A Cyber Security Analysis
Просмотров 17910 месяцев назад
LockBit vs BOEING: Unpacking the High-Stakes Ransomware | A Cyber Security Analysis
Linux Directory: Cybersecurity के लिए आवश्यक कौशल | 2023 पूरी गाइड
Просмотров 12910 месяцев назад
Linux Directory: Cybersecurity के लिए आवश्यक कौशल | 2023 पूरी गाइड
Linux Directory for Cybersecurity: Essential Skills for Cybersecurity | 2023 Guide
Просмотров 18410 месяцев назад
Linux Directory for Cybersecurity: Essential Skills for Cybersecurity | 2023 Guide
HIPAA Compliance Simplified | PHI | [HINDI]
Просмотров 1,7 тыс.11 месяцев назад
HIPAA Compliance Simplified | PHI | [HINDI]
HIPAA Compliance Simplified | PHI
Просмотров 105Год назад
HIPAA Compliance Simplified | PHI
ICS Security Essentials | Protecting Critical Infrastructure in 2023 [HINDI]
Просмотров 165Год назад
ICS Security Essentials | Protecting Critical Infrastructure in 2023 [HINDI]
Industrial Control System | ICS | SCADA | DCS in [HINDI]
Просмотров 188Год назад
Industrial Control System | ICS | SCADA | DCS in [HINDI]
Security Governance [HINDI] | ISMS | Cybersecurityprogram
Просмотров 104Год назад
Security Governance [HINDI] | ISMS | Cybersecurityprogram
Security Governance | ISMS | Cybersecurity Program
Просмотров 97Год назад
Security Governance | ISMS | Cybersecurity Program
DPMS in [Hindi] Data Protection Management System
Просмотров 119Год назад
DPMS in [Hindi] Data Protection Management System
MITRE ATT&CK in [HINDI] CVE-2023-36884
Просмотров 4,4 тыс.Год назад
MITRE ATT&CK in [HINDI] CVE-2023-36884

Комментарии

  • @Rocky-g2i
    @Rocky-g2i 7 часов назад

    Do you have any extra material on process injections?

  • @rapolur9858
    @rapolur9858 18 дней назад

    HI Sir, no videos from last 5 months, please do videos, it is helping a lot to understand concepts

  • @justahuman2024
    @justahuman2024 19 дней назад

    Good content delivery

  • @gtabuzar
    @gtabuzar Месяц назад

    sir mujhe personal study karoge apna number dijiye sar ya email.

  • @premierde
    @premierde Месяц назад

    After threat modelling, how does it get resolved or prevented, what remedy principal should be applied.

  • @jorgeluisrejasramirez369
    @jorgeluisrejasramirez369 2 месяца назад

    Excellent explanation

  • @KawaldeepSingh-bc5cd
    @KawaldeepSingh-bc5cd 2 месяца назад

    Knowledgable information in few mins, thanks.

  • @Sec_ArtChavez
    @Sec_ArtChavez 3 месяца назад

    Thanks for sharing. I use MAF as well for my security architecture design analysis. I use threat mapping diagrams in my artifacts when delivering documentation to the project teams. Appreciate your time.

  • @kundankumarsaraf3563
    @kundankumarsaraf3563 3 месяца назад

    Extremely useful video. Much appreciated your efforts.

  • @kundankumarsaraf3563
    @kundankumarsaraf3563 3 месяца назад

    Extremely useful video. Much appreciated your efforts.

  • @amritpal3608
    @amritpal3608 3 месяца назад

    Helpful👍

  • @amritpal3608
    @amritpal3608 3 месяца назад

    Nice 👌

  • @EARN_WITH_KK
    @EARN_WITH_KK 4 месяца назад

    Nice sir ❤

  • @harneetkaur3170
    @harneetkaur3170 4 месяца назад

    please make a video on how to install n use git n github

  • @revathiganapathi4765
    @revathiganapathi4765 4 месяца назад

    Audio is little loud than the voice. Pls check

  • @avinashkolhe5914
    @avinashkolhe5914 4 месяца назад

    This is a very helpful video. Please make more videos on MITRE Framework for different Security Threats. Thanks bro.😊

  • @moksh2553
    @moksh2553 5 месяцев назад

    👍

  • @giteshpaldhingra7436
    @giteshpaldhingra7436 5 месяцев назад

    very useful

  • @ghulammuhammad2504
    @ghulammuhammad2504 5 месяцев назад

    🌷🌷🌹🌹🌻🌻🌺🌺

  • @shubham._.kulkarni
    @shubham._.kulkarni 5 месяцев назад

    Thank you 🙏 Part 2 please

  • @siddhantsaraf1218
    @siddhantsaraf1218 5 месяцев назад

    Informative.... keep uploading bro🎉

  • @devenderagyani5m681
    @devenderagyani5m681 5 месяцев назад

    Kindly upload 2nd video

  • @ByteHax_
    @ByteHax_ 6 месяцев назад

    ❤❤ really good

  • @ВиталийОвчаренко-и1н
    @ВиталийОвчаренко-и1н 6 месяцев назад

    The stages involved in resolving issues related to CVE-2023-4966 include identification of the vulnerability, publication of advisories by Citrix, observation of exploitation in the wild, and addition of the vulnerability to the Known Exploited Vulnerabilities catalog by the U.S. Cybersecurity and Infrastructure Security Agency (CISA).

    • @SimonesCyberSecurityil7
      @SimonesCyberSecurityil7 6 месяцев назад

      Absolutely, the stages you've outlined are critical in the response to security vulnerabilities. It's a continuous process to keep systems secure.

  • @anderjones1547
    @anderjones1547 6 месяцев назад

    what one should do to understand large codebase? I find it difficult.

    • @SimonesCyberSecurityil7
      @SimonesCyberSecurityil7 6 месяцев назад

      Understanding large codebases would take practice. Starting first by getting familiar with code's structure and documentation. Looking into main modules and how they interact. Focusing on the high-level flow first.

  • @thenoobplayer6533
    @thenoobplayer6533 6 месяцев назад

    Vary usefull information

  • @thenoobplayer6533
    @thenoobplayer6533 6 месяцев назад

    Thank you brother

  • @Dilipkumar-eu9bk
    @Dilipkumar-eu9bk 6 месяцев назад

    Nice Content

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    we liked your videos, all the best and keep it up.

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    Nice!

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    nice! the way to explained.

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    We want more videos related to the cyber security too .

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    Suck a nice video.

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    Great video.

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    Thanks, All videos are helpful.

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    Good way to explained.

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    I saw your all the videos man, good going. keep it up.

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    Thanks, Made simple video for us.

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    Great video, keep it up.

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    Good Knowledge!

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    Thanks! It is very simple to understand.

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    Thanks for making the videos .

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    Good explaining.

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    Helpful.

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    thanks for simplify this ,keep it up.

  • @akashhedaoo7003
    @akashhedaoo7003 6 месяцев назад

    You are doing a great work. Keep it up.

  • @amritpal3608
    @amritpal3608 6 месяцев назад

    Thanks ! It would be really helpful.

  • @neeraapande6634
    @neeraapande6634 6 месяцев назад

    Bohot achche se information di hai aapne 👍🏼 Thank you 🙏

  • @JenniferAhluwalia
    @JenniferAhluwalia 6 месяцев назад

    Something new I’ve learnt 👍🏼. Thank you 🙏

  • @practicingminimalism4710
    @practicingminimalism4710 7 месяцев назад

    Very helpful ❤