Ransomcloud - Hacking Demonstration with Kevin Mitnick

Поделиться
HTML-код
  • Опубликовано: 1 июн 2024
  • One of the worlds most famous hackers showing you how ransomware in the cloud can get past your best defenses, see how a hacker can exploit your users to lock you out of your own email and what actually happens with your emails are encrypted, and what we can do to help you get your data back without having to engage cybercriminals.
    At one point Kevin was America's most wanted Cyber Hacker and was chased down by the FBI for hacking into to corporate computer systems, however, he's not doing that anymore.
    Today he is a cybersecurity expert and supports us in ensuring we stay a step ahead of these types of attacks.

Комментарии • 24

  • @a-google-user07
    @a-google-user07 9 месяцев назад +17

    R.I.P. The Greatest hacker of all time.

  • @jumpingjeffflash9946
    @jumpingjeffflash9946 2 месяца назад +1

    The guy was amazingly smart, I wish I had a little of his knowledge of computers, fascinating machines we use.

  • @johnnycrooks3856
    @johnnycrooks3856 Год назад +8

    Kevin this is freaking awesome. Short , quick and to the point. Can I freely send this out to my user base. I am a CISO for a city government agency in Kansas. I am trying to change our culture to me more security minded.

  • @voidshell6273
    @voidshell6273 10 месяцев назад +5

    R.I.P. Kevin

  • @Pedrizzy2
    @Pedrizzy2 Год назад +5

    It's my first day of soft School, and I can tell I'm going to like my teacher!

  • @edgardogalope411
    @edgardogalope411 Год назад +6

    You will definitely become the top 1 who makes cracks

  • @dsreddy1530
    @dsreddy1530 Год назад +5

    Nice explanation

  • @retroconsole_
    @retroconsole_ 14 дней назад

    During his hacking days he had hacked many high profile companies to steal millions of private customers information but he didn't use them. He only did it for fun, perhaps by implicitly sending a loud and clear message to companies that he hacked to fix that exploits. I tip my hat to Kevin. Most hackers out there are not like him, instead they use whatever they hack to their gains or advantage.

  • @Crisco4393
    @Crisco4393 Год назад +1

    Love Kevin M. 🎉🎉🎉🎉

  • @retroconsole_
    @retroconsole_ 14 дней назад

    Didn't the FBI hire him as security analyst after he got out of prison

  • @555kau1
    @555kau1 Год назад +3

    Isso explica a surra que o whindersson tomou do pópó.

  • @KQJ_Diya007
    @KQJ_Diya007 Год назад +1

    Damn 🔥🔥🔥🔥

  • @arjunpeter9614
    @arjunpeter9614 Год назад

    Dark Dante

  • @hady5452
    @hady5452 Год назад +1

    ive given up hope already

  • @50_Pence
    @50_Pence Год назад +3

    Can't you limit users not to have permission to this level

  • @isabelpaterson3277
    @isabelpaterson3277 Год назад +7

    This is so lame, as a developer this is an easy to write program or an add-on that gets privileged for 365 emails app, all your email add-ons can do this

    • @TurboWindex
      @TurboWindex Год назад

      Literally skid level shit lmao. But I guess it's mostly a demo for boomers.

    • @skougi
      @skougi Год назад +8

      Lame, sure, but an effective demonstration of the ease with which an attack like this could go down. It isn’t a purely mechanical hack being demonstrated either. There’s no fancy code or stack whatnots on display. It’s about phishing.
      Many devs can write malicious code that does “bad” stuff when executed with full permissions, and there’s many ways to get to that point. You can dev all sorts of protections or work arounds, but sometimes you just need the right person to click the right thing. Boom. Access.
      Plus it’s mitnick. His whole shtick has been social hacking (and cool business cards) for good reason. Educating ends users about phishing is worthwhile.

    • @sfdntk
      @sfdntk 11 месяцев назад +2

      This isn't a presentation for developers, doofus, it's for organisations that don't understand how phishing works or the threat it represents to their business. Mitnick is simply demonstrating the ease with which a remote attacker could target an employee and convince them to install a malicious application that allows an attacker to infiltrate an organisation and steal sensitive information.

  • @massagedickscodeoninstagra5132

    Dm o 🖕 nome acima ele vai te ajudar a corrigir seus problemas