IBM X-Force Threat Intelligence Index and the Verizon DBIR are my favorite sources for this kind of info. I think all security professionals should be reading this data, at the very least to avoid getting caught in their own bubble. Just because you don't see certain threats in your own environment doesn't mean they aren't out there
Can you please make a video on Nood Ransom ware How it works and how can we recover data which is infected by this Ransom , both for Offline and online Key please show how can we decrypt the data which is encrypted by this Nood Ransom. please.
Teach yourself. Maybe the reason you are behind is because you are relying on other people for your success. The server side request isn't going to forge itself
Babe wake up, new threat intel just dropped
IBM X-Force Threat Intelligence Index and the Verizon DBIR are my favorite sources for this kind of info. I think all security professionals should be reading this data, at the very least to avoid getting caught in their own bubble. Just because you don't see certain threats in your own environment doesn't mean they aren't out there
Great video! I am NOW really excited to check out the report
If you’ve ever integrated ibm x force iocs into your siem, you know the pain of false positives
I feel like that is the case with most of the ioc vendors
I tried using Wazuh and a Windows system which had JDK installed. It almost broke my brain because I had LAN notifications on
Cool video John! I like hit the high points as much as possible. Greatly appreciate the content you made. 👍 I like it.
Identies, particularly machine identies are literally everything and those that enforce these identities will provide real security.
At 8:17, whats the difference between valid account and phishing?
THANKS
DR.3V1l
thanks for the tip!
looking at this later tonight.
Nice one !
Can you please make a video on Nood Ransom ware How it works and how can we recover data which is infected by this Ransom , both for Offline and online Key please show how can we decrypt the data which is encrypted by this Nood Ransom. please.
Good stuff, John. Definitely going to check out the full report.
Did you ever report on Vault 7?
Wow, thanks for covering this. Definitely gonna download that and read through more
You're the man! Thanks for the content. Also lol please get a pop filter for your mic.
Hi John, Can you make a video with @13cubed about windows forensics... would love to see that. He has great content.
why are you screaming at me john? why?
Lol
he sounds perfect
He's excited about the topic.
At this point I'm used to the abuse.
😅😅😅😅😅😅😅😅😅😅😅😅😅😅😅😅😅😅😅😅@@eleven937
Interesting!
Sweet ? was it ?
GenAI threat hype >= the upside to nft’s in 2021 ….. we’re so repetitive lol
I was waiting for John to run strings on the pdf
John please do a tutorial on SSRF. I need to understand it more. At least do it for 1 hour Teaching us SSRF
Teach yourself. Maybe the reason you are behind is because you are relying on other people for your success. The server side request isn't going to forge itself
Or please recommend something
@@thomasspeer1388ill forge your request ;)
@@thomasspeer1388 This is exactly what I keep telling people. But no one ever listens
I did it
Any thoughts about changing the MIC setup? This shaking is embarrassing
cuber
kerberoasting? roasting the security of your Kubernetes cluster heh
i am 37
First
Nice one !