You have to look out for these hacks in 2024! (plus get FREE training)

Поделиться
HTML-код
  • Опубликовано: 12 июн 2024
  • Big thank you to Cisco for sponsoring this video! (And for the FREE Ethical Hacking Training!)
    // Free Ethical Hacking course //
    Free Ethical Hacking course: skillsforall.com/course/ethic...
    // Talos Report //
    2024 Q1 Trends: blog.talosintelligence.com/ta...
    These are the threats you need to be aware of in 2024 from the Talos Report:
    * Talos IR also observed a variety of threats in engagements, including data theft extortion, brute-force activ- ity targeting VPNs, and the previously seen commodity loader Gootloader.
    * Talos IR responded to new variants of Phobos and Akira ransomware for the first time this quarter as well as the previously seen LockBit and Black Basta ransomware operations.
    * A recent Talos IR engagement suggests that Akira has returned to using encryption as an additional extortion method, now deploying a multipronged attack strategy to target Windows and Linux ma- chines.
    * Security researchers discovered an MFA bypassing phishing kit called “Tycoon 2FA” that has since become one of the most widespread phishing kits. However, this has yet to appear in any Talos IR engagements.
    Firewalls getting hacked:
    ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices: blog.talosintelligence.com/ar...
    AI voice cloning:
    The use of voice cloning of voice mails to sound authentic. Attackers use voice clones to phone help desk and reset passwords etc.
    2FA is a major issue:
    "Users accepting unauthorized MFA push notifications was the top observed security weakness, accounting for 25 percent of engagements this quarter. The lack of proper MFA implementation closely followed, accounting for 21 percent of engagements, a 44 percent decrease from the previous quarter"
    // Martin Lee’s SOCIAL //
    Twitter / X: / mlee_security
    LinkedIn: / martinlee
    Talos Blog: blogs.cisco.com/tag/trac/
    Security Website: sec.cloudapps.cisco.com/secur...
    Cisco Blog: blogs.cisco.com/author/martinlee
    // Book //
    Cyber Threat Intelligence by Martin Lee:
    USA: amzn.to/4dJ2LQj
    UK: amzn.to/3K3TqVH
    // Articles MENTIONED //
    Talos Incident Response Threat Summary for Jan- March 2024: blog.talosintelligence.com/co...
    // David SOCIAL //
    Discord: / discord
    Twitter: / davidbombal
    Instagram: / davidbombal
    LinkedIn: / davidbombal
    Facebook: / davidbombal.co
    TikTok: / davidbombal
    RUclips: / @davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // MENU //
    00:00 - Coming up
    00:58 - Intro
    01:14 - Firewall Hacking
    05:23 - Patching, Configuration & MFA
    09:44 - Logging
    13:14 - The Cuckoo's Egg
    15:53 - MFA Fatigue
    19:10 - Weaknesses in MFA
    23:45 - SMS 2FA
    25:15 - A.I Voice Cloning
    31:11 - Brute Force VPNs
    33:17 - Is MFA/2FA Effective?
    36:03 - Tycoon 2FA
    37:32 - Cyber Paranoia & Self-Care
    42:46 - Final Thoughts
    43:54 - Outro
    firewalls
    cisco
    talos
    cisco talos
    pegasus
    spyware
    hacking
    hacker
    malware
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    Disclaimer: This video is for educational purposes only.
    #ai #iphone #android
  • НаукаНаука

Комментарии • 102

  • @davidbombal
    @davidbombal  25 дней назад +25

    Big thank you to Cisco for sponsoring this video! (And for the FREE Ethical Hacking Training!)
    // Free Ethical Hacking course //
    Free Ethical Hacking course: skillsforall.com/course/ethical-hacker?courseLang=en-US
    // Talos Report //
    2024 Q1 Trends: blog.talosintelligence.com/talos-ir-quarterly-trends-q1-2024/
    These are the threats you need to be aware of in 2024 from the Talos Report:
    * Talos IR also observed a variety of threats in engagements, including data theft extortion, brute-force activ- ity targeting VPNs, and the previously seen commodity loader Gootloader.
    * Talos IR responded to new variants of Phobos and Akira ransomware for the first time this quarter as well as the previously seen LockBit and Black Basta ransomware operations.
    * A recent Talos IR engagement suggests that Akira has returned to using encryption as an additional extortion method, now deploying a multipronged attack strategy to target Windows and Linux ma- chines.
    * Security researchers discovered an MFA bypassing phishing kit called “Tycoon 2FA” that has since become one of the most widespread phishing kits. However, this has yet to appear in any Talos IR engagements.
    Firewalls getting hacked:
    ArcaneDoor - New espionage-focused campaign found targeting perimeter network devices: blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/
    AI voice cloning:
    The use of voice cloning of voice mails to sound authentic. Attackers use voice clones to phone help desk and reset passwords etc.
    2FA is a major issue:
    "Users accepting unauthorized MFA push notifications was the top observed security weakness, accounting for 25 percent of engagements this quarter. The lack of proper MFA implementation closely followed, accounting for 21 percent of engagements, a 44 percent decrease from the previous quarter"
    // Martin Lee’s SOCIAL //
    Twitter / X: twitter.com/mlee_security
    LinkedIn: www.linkedin.com/in/martinlee/
    Talos Blog: blogs.cisco.com/tag/trac/
    Security Website: sec.cloudapps.cisco.com/security/center/home.x
    Cisco Blog: blogs.cisco.com/author/martinlee
    // Book //
    Cyber Threat Intelligence by Martin Lee:
    USA: amzn.to/4dJ2LQj
    UK: amzn.to/3K3TqVH
    // Articles MENTIONED //
    Talos Incident Response Threat Summary for Jan- March 2024: blog.talosintelligence.com/content/files/2024/04/Talos-IR-Trends--Q1-2024-.pdf
    // David SOCIAL //
    Discord: discord.com/invite/usKSyzb
    Twitter: twitter.com/davidbombal
    Instagram: instagram.com/davidbombal
    LinkedIn: www.linkedin.com/in/davidbombal
    Facebook: facebook.com/davidbombal.co
    TikTok: tiktok.com/@davidbombal
    RUclips: www.youtube.com/@davidbombal
    // SPONSORS //
    Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
    // MY STUFF //
    www.amazon.com/shop/davidbombal
    // MENU //
    00:00 - Coming up
    00:58 - Intro
    01:14 - Firewall Hacking
    05:23 - Patching, Configuration & MFA
    09:44 - Logging
    13:14 - The Cuckoo's Egg
    15:53 - MFA Fatigue
    19:10 - Weaknesses in MFA
    23:45 - SMS 2FA
    25:15 - A.I Voice Cloning
    31:11 - Brute Force VPNs
    33:17 - Is MFA/2FA Effective?
    36:03 - Tycoon 2FA
    37:32 - Cyber Paranoia & Self-Care
    42:46 - Final Thoughts
    43:54 - Outro
    firewalls
    cisco
    talos
    cisco talos
    pegasus
    spyware
    hacking
    hacker
    malware
    Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
    Disclaimer: This video is for educational purposes only.
    #ai #iphone #android

    • @colorsofgaia
      @colorsofgaia 25 дней назад

      Exactly: We need to Learn more Programming, cause if ai 🤖 gets in crazyness we have to know how to not pull the trigger. Coding ai 🤖 is not difficult, but what it is used 4, ex war industri we have to look out for buggs, debuggable machines that are used at war, is so dangerous! I ALLWAYS talk nice to ai 🤖 bots.
      We need to Learn:
      1. How to Code ethically
      2. How to turn criminals go and do better, 4 example: Disney Worl: They use ”bad” people as former car-thieves, to protected the car-areas!
      It is stupid, being thieve or criminal.
      Every body know: If you are to rob a bank, you need freaking projekt leading! 😅😂🤣😇
      So do become Agile and Scrum lol 😜 And do it in Peace. 😅
      There is allways Good to work towards ethics
      And protected human rights 😊😢
      The programe of Tails does not leave trace it is encrypted! 😢
      I have not used Tails, but in Sweden Climate & Treehuggers, and people manifesting against rasism, get in jail.
      That’s why the climate lovers use encrypted, programs, for we are beeing in lots of loss of democrazy rights. But the Nazis (Jimmy Åkesson) are allowed to do Chaos
      And then i really love the open source community that is nice to trust eachother. 😊

    • @dalefernandez19
      @dalefernandez19 24 дня назад

      Can u make a video talking about the cybersecurity opportunities in uk plz ?

    • @dalefernandez19
      @dalefernandez19 24 дня назад

      Need some more content with OTW as well

  • @jblaze600
    @jblaze600 25 дней назад +10

    After passing Sec +, it’s really great to hear real life scenarios going on in cybersecurity world. These threat actors don’t stop either, u have to be defensive minded 24/7. Great content David.

  • @user-ed7zt1ot8t
    @user-ed7zt1ot8t 25 дней назад +4

    Thanks David,you always come with things that are very important,and we love that❤

  • @themessenger-zq9lr
    @themessenger-zq9lr 25 дней назад +1

    I love the in-person round table format! Would love to see more of those!

  • @mrjakob853
    @mrjakob853 25 дней назад +1

    Love the new way you are filming your videoes

  • @peterwassmuth4014
    @peterwassmuth4014 25 дней назад +1

    Totally awesome! Thank you for Sharing! 💯✴

  • @guruoo
    @guruoo 11 дней назад

    I've found that this tactical distraction technique can even help with finding those misplaced keys...
    "...what you will find is when you're thinking about something else this is when you
    have your best ideas when you've got your mind distracted and you're thinking about
    something else you're allowing your mind to wander it's at that moment that you
    will come up with hey I know how to solve that problem."

  • @dalefernandez19
    @dalefernandez19 25 дней назад +1

    Another good one.Keep it going Sir.Love your content.🔥❤️

  • @BlockchainShango
    @BlockchainShango 25 дней назад +1

    Thank you for sharing 👍🏾

  • @animelover5849
    @animelover5849 25 дней назад +12

    Please do a Torspy video. Torspy is a Python package available on Pip and is used for interacting with the Dark Web. Your RUclips videos are amazing, and I hope you reply to this comment.

  • @emmyyung5576
    @emmyyung5576 25 дней назад +1

    Thank You David please also make a full SDR FOR BEGINNER COURSE

  • @ariasm8911
    @ariasm8911 14 дней назад

    Enjoyed this interview way more than i expected, please keep bringing him on the channel dear David

  • @rutgrrr5135
    @rutgrrr5135 24 дня назад +1

    Loved the video, very good guest.
    keep it up sir

  • @majiddehbi9186
    @majiddehbi9186 25 дней назад +1

    So the basic things to do could save u from a lot of pbs thx David as usual

  • @Abduselam.m
    @Abduselam.m 25 дней назад +3

    Thanks so much David ❤

  • @lefterisstavridis3764
    @lefterisstavridis3764 24 дня назад

    What a great and insightful conversation! Martin Lee is amazing and always with a real world business point of you. Thank you David!

  • @Didi-hh9hx
    @Didi-hh9hx 25 дней назад

    Thank you, David, for bringing Martin to us. I really enjoyed Martin's way of approaching the basics of cybersecurity in general and threat intelligence in particular. A big thanks to him for his brilliant insights and advice.

  • @mytechnotalent
    @mytechnotalent 25 дней назад

    Incredible David as always. Very informative. I have always said that MFA and cred rotation is still not enough as those creds have a lifetime and that is the vuln.

  • @gamereditor59ner22
    @gamereditor59ner22 25 дней назад +14

    Having a default password is bad. Thank you David!

    • @davidbombal
      @davidbombal  25 дней назад +4

      You're welcome!

    • @user-in2cs1vp6o
      @user-in2cs1vp6o 25 дней назад +2

      At this point 2024 onwards, you would be a fool not to use a password created with a program or command that does pseudo random generation. Its all about entropy now.

    • @Mike-ds7mu
      @Mike-ds7mu 24 дня назад +1

      Thank you for your continuing contribution David. follower from Australia.👍👍👍👍👍

  • @Rayabi_Encourages
    @Rayabi_Encourages 25 дней назад +2

    Watching from Ghana

    • @davidbombal
      @davidbombal  25 дней назад

      Thanks for watching! Welcome Ghana!

  • @gorge5412
    @gorge5412 25 дней назад +1

    Thank you, Mr. David.
    `

  • @AmarNavi-td3cf
    @AmarNavi-td3cf 22 дня назад

    Nice, interview yes my bank in the UK asked as well for voice recording but I didn't agree

  • @amaduscamara4378
    @amaduscamara4378 25 дней назад

    Watching from guine bissau thank you Devid I hope one day I can thank you in person 😊

  • @BoHror933
    @BoHror933 25 дней назад

    8:52 OK I’m gonna be on the lookout for the udb packet. I know it’s crazy how that can happen. Thank you guys.

  • @insanegamerz2006
    @insanegamerz2006 25 дней назад

    david , you are the. who I belive ,, thanks for this usefull things ,,, and I garanty we will definetly going to learn someting new ,,, love from India ,,, ❤❤

  • @fk319fk
    @fk319fk 25 дней назад

    Probably the best ending of any video!

  • @AnshuBhadouria-jx7ev
    @AnshuBhadouria-jx7ev 25 дней назад +1

    Pls make a video with OTW that include topics like "Quantum Hacking.... Q - Day... AI Hackers.... Future of Cyber Security by 2030.... Scary reality of Cyber - War".... It's my humble request to David sir 🙏🙏🙏🙏🙏🙏🙏🙏

  • @Lou-sassole3
    @Lou-sassole3 25 дней назад +1

    good shit man

  • @Jamesgarrys
    @Jamesgarrys 25 дней назад +2

    Can't wait to see the video

    • @davidbombal
      @davidbombal  25 дней назад +1

      I hope you enjoy the video :)

  • @fishfish3861
    @fishfish3861 25 дней назад

    If i take my sec+ and pass should i take the ethical hacking course?

  • @Duncain-Data-Boy
    @Duncain-Data-Boy 25 дней назад

    Watching from 🇿🇲🇿🇲🇿🇲

    • @davidbombal
      @davidbombal  25 дней назад

      Welcome! And thank you for watching :)

  • @kristitv69
    @kristitv69 23 дня назад

    hello please help me, some weeks ago i installed kali linux. i opened windows defender and it shows "threats found" there's so many of them, is this dangerous what should i do?

  • @aafif5607
    @aafif5607 25 дней назад +3

    I've got it, looking forward to this. Thanks Mr. David

  • @ron2040
    @ron2040 25 дней назад

    David, I have decade of experience in IT security and Unix skills are in my blood, however, there are no updates from my job applications to New Zealand and Australia. Ironically, visa is oftenly prioritized over the security and as a result, I foresee more Australia airlines systems and NZ infra is going to be intruded. I am not sure if you have HR from those countries that can you could link me to ? People are always saying shortage of security professionals but restricting to hire them from abroad.

  • @CROWNTHRONEHERBALCOMPANY
    @CROWNTHRONEHERBALCOMPANY 24 дня назад

    please sir, i can be able to connect to the network from linux os. please what can i do?.

  • @cyberdevil657
    @cyberdevil657 24 дня назад

    Hi David!

  • @ggelosstavrou9117
    @ggelosstavrou9117 25 дней назад

    Hey BleuDucky does not work now. Please make another video on it and how to use it with the Bluetooth adaptor u suggested (ASUs one )

  • @jeevarevarth9280
    @jeevarevarth9280 25 дней назад +1

    1st view frome INDIA(TAMIL NADU)

    • @davidbombal
      @davidbombal  25 дней назад

      Thank you for your support!

  • @x0rZ15t
    @x0rZ15t 9 дней назад

    Not all MFAs are made equal. The SMS is considered (one of the) weakest forms of it while something like Yubikey is the most resilient one.

  • @richardb123123
    @richardb123123 25 дней назад +1

    Inspirational. I'm 39 and currently retraining to get into cyber security and this talk reinforces why I want to do it. Thanks

  • @jean-francoistasse7788
    @jean-francoistasse7788 20 дней назад

    31:01 About changing the default password, for my new Asus router, they ask you to first unplug the modem, do your changes and then plug back the modem. That was the first time I saw this kind of procedure on a normal everyday router.

  • @Bcowzz
    @Bcowzz 22 дня назад

    Most folks would get bored on this..... ... Expect resistance

  • @CyberSecJourn
    @CyberSecJourn 20 дней назад

    Interesting. I can here once because my students recommended it and now I get notices for every video you post and I'm NOT subscribed? Love how RUclips's algos work sometimes.

  • @MrDBNicholson
    @MrDBNicholson 18 дней назад

    @ 27:02 I personally know of an email forgery of a construction and a house of worship. The house of worship was billed for legitimate work. The Threat actor must have been watching the construction company for some time because as soon as the bill was sent a second was sent redirecting the payment a different way. As you can guess the threat actors received the church’s money.

  • @rishiraj2548
    @rishiraj2548 25 дней назад +1

    👍💯

  • @Bcowzz
    @Bcowzz 22 дня назад

    Voltage and low voltage

  • @bx1803
    @bx1803 25 дней назад

    MFA Fatigue ... what are we doing about it..

  • @kuldeepjangid10
    @kuldeepjangid10 25 дней назад

    Please explain Triton cyber attack…

  • @ikust007
    @ikust007 25 дней назад

    Thats is why I am very doubtful about protocols like RNDR or any other decentralized uses of hardware (DEPIN).
    Comments please ? Thank you

  • @aquatrax123
    @aquatrax123 25 дней назад

    Login token/cookies really need to be moved to secure hardware like the TPM.

  • @Bcowzz
    @Bcowzz 22 дня назад

    Now lets talk about ciscos backdoors

  • @user-ih7yb1ic6e
    @user-ih7yb1ic6e 25 дней назад

    Hi sir ❤

    • @davidbombal
      @davidbombal  25 дней назад

      Hi!

    • @user-ih7yb1ic6e
      @user-ih7yb1ic6e 25 дней назад

      Watching this video has helped a lot. Will help improve my skills ​@@davidbombal

  • @ShojibShak-dd3he
    @ShojibShak-dd3he 20 дней назад

    Ser oppo a 17 bootloder please please iam from 🇧🇩🇧🇩🇧🇩

  • @reggiedaniels6920
    @reggiedaniels6920 24 дня назад

    You know David, the problem with shows like yours, it that those who most need them would never take the time watch these videos. And if a friend tried to tell them they would find some excuse not to take the warnings seriously. There are thousands of situations like this that fall into the same state of affairs.

  • @AmazingJayB51
    @AmazingJayB51 19 дней назад

    Add a salt to your pw! 😁

  • @Bcowzz
    @Bcowzz 22 дня назад

    Its built in, goes back to IBM

  • @satirical_snake
    @satirical_snake 24 дня назад

    Rooters

  • @muddkipp_1
    @muddkipp_1 25 дней назад

    pokemon go is my exercise, thank you

  • @Editor_vdeo
    @Editor_vdeo 25 дней назад

    Help me

  • @savagepro9060
    @savagepro9060 25 дней назад

    David Bombal, sincerely: "You have to look out for these hacks in 2024!"
    New Malware Phish Link Release: "You have to look out for these hacks in 2024!"! Click! Oops!

    • @davidbombal
      @davidbombal  25 дней назад

      Don't click on links in e-mails!

  • @ShojibShak-dd3he
    @ShojibShak-dd3he 20 дней назад

    Ser kali linux live boot install 📲

  • @alexis-uh4nt
    @alexis-uh4nt 24 дня назад

    Bro i used morse code for my password😂😂 gotta be secured right

  • @danieltran7637
    @danieltran7637 24 дня назад +1

    Yep interesting times, these days. Only the paranoid will survive. 😄

  • @mrcinnamondotexe
    @mrcinnamondotexe 25 дней назад

    Woohoo

    • @davidbombal
      @davidbombal  25 дней назад

      I hope you enjoy the video :)

  • @ani65ans94
    @ani65ans94 21 день назад

    They got my name address. N.I no. Know I'm broke, and inherite. My pass transgressions. Help Uself.

  • @BurkenProductions
    @BurkenProductions 25 дней назад +1

    No you SHOULD NEVER use default passwords NOR should you use MFA either. Just block everyone except your own networks. PPl need to STOP pushing MFA on everyone who does NOT wish to have it on their account on web sites etc. it should be a personal choise.

  • @BoHror933
    @BoHror933 25 дней назад

    how can you possibly expect people to take any of this advice and apply it when you use so much slang and abbreviations without explaining …people don’t understand.

  • @GOTHAM21
    @GOTHAM21 25 дней назад

    Bad analogy.

  • @1amy0u1amy0u
    @1amy0u1amy0u 23 дня назад