Where People Go When They Want to Hack You
Вставка
- Опубліковано 22 тра 2024
- What do you need to hack any system on the planet? Whatever it is, you can certainly find it on the Zero-day market: a network that consists of the world’s best hackers trading vulnerabilities with governments, cybercriminals and megacorporations. How does this market appear, how does it work and why nobody talks about it?
🎯 Subscribe to @cybernews for more AI news and cybersecurity updates: cnews.link/subscribe/
🎪 Looking for entertainment and more interesting stories? Check out our playlists filled with captivating content that will keep you entertained for hours:
• Infamous Hacks
• Cyber Tops
• Cyber Crime
📰 Stay up-to-date with the latest cybersecurity news and trends by checking out our curated news playlist. We cover the latest threats, trends, and insights from the world of cybersecurity:
• Latest NEWS
💬 Stay connected with us on social media for the latest news, insights, and discussions around cybersecurity: linktr.ee/Cybernews
0:00 Intro
1:16 Part 1. Cracked bricks
4:14 Part 2. People who already did that
8:45 Part 3. Time to use it
10:45 Part 4. Paying the price
15:38 Part 5. The complicated world
20:10 Part 6. Where it gets even worse
22:56 Part 7. Even worse than that
30:14 Part 8. Those who stare into the wall
33:28 Epilogue
🥷 Secure your online activities - Check out a VPN with the best discount - cnews.link/get-nordvpn/TLPHmH...
🔑 Keep your accounts safe - Get THE BEST password manager offer - cnews.link/get-nordpass/TLPHm...
🦠 Protect your devices - Grab an EXCLUSIVE Antivirus deal - cnews.link/get-bitdefender/TL...
Credits:
Producer: Ignas Žadeikis
Writer: Valius Venckūnas
Video Editing: Matas Paskačimas
Narration: Ben Mitchell
Thumbnail: Domantė Janulevičiūtė
Supervising Producer: Aušra Venckutė
All the sources we used in this video can be found here: docs.google.com/document/d/1j...
ℹ️ About us:
We are an independent news outlet with a UA-cam channel that posts cybersecurity & tech news videos daily. Our foremost concern is the safety and security of our viewers around the world. We remain vigilant on the issue of hacking and will provide updates as they become available. A number of our investigations and reports have been featured by industry-related publications and global news leaders like Forbes, PC mag, and Techradar.
We are affiliated but not sponsored by any service provider. This means we may receive a small commission when you click on the provided links.
Music license:
MB01Y50OJPFYTY0
MB01QHMCQBFMEDE - Наука та технологія
When you randomly bash your keyboard in infinite parallel universes for an infinite amount of time, you'd probably get a fully working exploit chain for the latest ios version some day in Eternity
can elaborate please? What do you mean by that? Is it so secure to get hacked that even governments can't do it?
@@Ahmn2250 He's likely saying it's UNLIKELY, but the issue with iOS is that since their code base is proprietary and not open source, there are fewer EYES on that could audit it for exploits.
Plus, you have entire nation states and private companies like (formerly) NSO Group spending tens of millions of dollars to develop spyware like Pegasus, etc.
By definition, a 0-DAY exploit is unknown, so you wouldn't even know if someone could hack into your phone.
But, if you're not an important enough target, and your adversary isn't fully technically equipped/capable, you're most likely fine.
If your adversary is the NSA, you're very likely screwed because as the Snowden leaks showed, they had the entire world tapped, including the German Chancellor's phone... and things are much worse now.
@@Ahmn2250 google: Infinite monkey theorem
Yeah, that's called fuzzing. Thankfully computers can type very fast ;)
@@Ahmn2250 Thats just the Infinite monkey theorem
As a Cybersecurity professional, I must say, this complex topic is way much simply explained. The analogy of bricks is really good. Good job and kudos to the creators.
Bro seriously, editing something like this takes a long time. Very impressive. Keep these docu’s coming, you can become a big youtuber.
Ice
Now watch it without the music.
@@muhcharona I want to make an AI filter that removes music from information videos
Iol, white hat hackers I know live in Dubai and through discord once in a blue moon they stop by to say hi. They do a lot more than hack, more like selling organs from china and transporting them through there private jets that cost them 10m+. lol it's about who u know
@@codywohlers2059ok
This is one of the best Cyber-sec educational videos that I've ever seen on UA-cam. Thanks for all the effort you put into this.
i shall agree. as the exeptional movement of this channel is over the top. of course i can say that there are som damages.. but no one else has none.. and he still has least. as i can say in the kitchen language. one of the beast
The origin of zero-day exploits isn't white hat hackers getting pissed off by companies that didn't appreciate the bug reporting. It's actually 'zero-day software' which referred to pirated software called Warez and was often released at the same time as the official retail version. The Warez scene morphed and expanded over time into other areas of underground cyber activity. The video is interesting but walks into a lot of muddy waters and mainstream journos on this subject are about as reliable as a sundial at midnight.
Yup . It originally stood for zero days since release meaning the movie or game was cracked or leaked the same day it was released . There was a famous Warez leaker who worked at a company that made the DVDs who would leak them the day they dropped.
Which credible books, online videos, and sources would you recommend for learning about these topics, while ensuring the information is accurate and free from misinformation?
I mean, I stuck around to watch the whole thing. I liked it.
@@TheManInCommand Dread forums. Be careful.
Mainstream journos are called urinalist for a reason.
This was one of those rare videos on UA-cam that really open your eyes and are so well done that they just stay with you. Great job and great video!
Who ever animated this is a legend
Yeee. Shalom.
yeah forreal and i bet they did it effortlessly
They rotated the Australian mail in the correct orientation
Zero day exploits have always mesmerized me, knowing there is someone out there with a critical piece of info that could have so many implications, practically all being negative, is equal parts scary and fascinating to me.
Not really
@@DanielOnFire101wdym not really dummy
Do more of these videos.
BARELY scratched the surface! nice job, well done.
Credit to Kaspersky for operation triangulation, they did some amazing work exposing the attack chain. And the cherry on top, they released everything on Christmas for the jailbreak community.
Incroyable.
Kaspersky IS the hacker. Kaspersky is a major Russian FSB organization
@@borghorsa1902 Which comes around goes around
@@borghorsa1902So what do you sugest instead? NSA? CIA? Who? They are all the same crap...
The production quality of your channel is amazing. Thanks for the informative video!
Pplease make more videos like this, I loved every minute, perfect editing, incredible narration...
I loved this bro
If you could make the next video about Initial access brokers.....
@@AiZen042 i want vidio about skibiddy toilet and uccp meastery. also fanuc robot!!
You have a new subscribers. Great job!! Somehow I feel like I have less control on my life now though.
Great production quality on the video. Just subbed to ya keep it up!
Please keep this type of content coming in!!!! ❤
Dude your a G not gonna lie. These edits are out of this world 🌎
Really insightful. Great analogy - a wall and cracked bricks... really nailed that one!
🤣🤣🤣🤣🤣 DDoS going by this video is a HACK. Clearly you are why companies sell VPN and claim it keeps you free from big bad hackers. But nailed it right. OLOLOLOLOL
At 29:26 that Russian lady's voice sounds like a broken record.... painful to listen to. lol
@@TankerReviewwhat do you think of an Stridsvagn 104?
@@TankerReview I thought it does 😭. What keeps me free from the big bad hackers then? Tails Os + a VPN? Purism devices? Idk ☠️
@@TankerReviewpls reply when u get the time 🙏🏻. Thanks.
This video is amazing! You got my attention on watching this video. It was like a ELI5 but with visuals and a very simplified explanation! 👏👏👏👏
I just thought about all of this and realised that right now, there are not only people working on building these weapons but also people developing AI right now, that will be a mass production machinery to create 0-days...
Just insane...
the kind of video that makes me subscribe, thanks for the effort put into the making
Very high quality video, thank you!
Seeing malware Jake pop up in the video was awesome! Great video and good experts.
Man I loved this!! You've got a lifetime subscriber now. Very informative and painted a great picture
Very very good explanation for the masses. Much appreciated! Keep up the great work!
This video provided a much clearer and comprehensive understanding of zero-day exploits. It really confirmed some things I thought and also offered new insights. Thanks for doing this.
Social engineering, hacking data brokers and bribing corrupt employees are some other ways people get in. *The human will always be the weakest link, like when they setup their servers and their root password is admin*
Love how easy you made this for the newbies to understand.
I loved the animation trying to sell a zero day for TempleOS
Glowies in action.
Terrific Video and Content....keep up doing such great work. 👍🏻
Great video. Thank you for sharing!
Amazing documentary. One of the best videos I've seen on UA-cam.
This was really complex and interesting watch. Thankyou for all the effort put into this
The most informational and interesting video about zero days, even Mandiant doesnt have that kind of video. Cheers! 🔥
LOLlersk8s
These hackers need to have some natural ability... no run of the mill hacker can do this.
We all hear of hackers, and know it implies getting into your computers and other systems... but explaining it so the average person can understand it is a talent, the analogies need to be hand picked.... great job. The rabbit hole stop by step.
Amazing video and visual representations! Great insight and definitely I’m a lot more educated now.
the animations maybe look easy and they are but planning out the structure of the video is really impressive
This is really great, I gained so much knowledge from this. Thank you :)
Bro this video is so good! Thank you very much for it
Thank you for this, very insightful.
The comments section as well.
It's not sloppy code. It's intentionally written to be exploited by the NSA until their tools get leaked. Then, it's a critical update.
🧐🤔💡
Excellent video. Subscribed.
Damn this video is so good. I stopped and watched the entire video in one shot. Excellent. Expecting more videos like this.
Great video. I also read Nicole's book, certainly an eye opener!
Thanks for the info
fantastic work as always
Thanks for the great video. Loved it! Can you please tell me what the soundtrack is?
Wonderfully edited and explained, enjoyed a lot
Unreal cool video. Very cool release. Thank you!
great vid, mate! super interesting...
This is fascinating. I plan to show it to my cybersecurity courses.
thank you for the high quality content
This material is extremely well-made. Loved it
You did a really good job, making this video
Great video, thanks!
I remember your shady rat video. This video and that one are just amazing... No matter how deep your knowledge is of this area it's still a great watch!
The best cyber documentary on the world. More please.
Incredible work making this video. Your ability to take complex techniques/events on this topic and simplify them something easy for everyone to understand is truly remarkable. Combined with the seamless editing creates a perfect pair for educational infosec content. Keep up the great work and I encourage you to continue creating more content like this!
Not really
Thank you for this brilliant essay.
I like this long format videos
Lovely video.
Really enjoyed it and learnt a lot
Great video, cool animations and very informative!
I can't describe how i really enjoyed watching this video i hope to see more coming out soon such an inspiration to me ♥ hope u the best sir
Very informative , thumbs up!
absolutly informational video !!! thanks for complaining it !
This is the best explanation for this I've ever seen.
I hear Waveshaper!! Great music!
I was watching this on my TV in bed, and I had to find my phone to subscribe and comment. What a well made video.
Actually magnificent video. I really just sat through all of it with maximum interest.
very good video. well done. keep them coming
pretty cool vid.
Well explained to any lvl of ppl. Subbed.
Your wall reminds me of Arkanoid. Subbed 🤙
sparked so much inspiration and curiosity. outstanding work.
Best video I have ever watched😮, love it❤❤❤
Love the documentary angle 🥰
love these documentaries
Absolutely riveting video!
Great production quality
Good video 🤞🏾. Bugs can be anywhere in any software
This channel's writing, design, and overall production quality is very impressive! Im pretty sure bots aren't making this 😅 Subscribed
Fantastic video.
love the editing
22:25 honestly i am "glad" to see Argentina as a country that has cybersecurity as a priority, but i think that it is not the case, do you know something that we all didn't ? 😀
Cool video.
Great content love it.
This is a very well made overview of what happens behind the facade, where there is no black and white and where much depends on perspective. The filming, the editing, everything is on point here.
Although the origin of the 0day market is - to my at best anecdotal knowledge - not really anything to do with hacking governments or espionage. If my very limited understanding is anything to go by, the original "Warez" scene that cropped up in the early 80s and persisted well into the 1990s was where 0day software was first being shared. This could be anything from pirated cracked games to any other kind of software that people did not necessarily want to pay money for but still wanted to have it and use it. This also eventually gave rise to things like the art- and the demoscene. This is not to take away from the otherwise great insights offered here.
Both scenes are independent from each other. 0-day is just different meaning to both and while the term is the same, the origins are not. Stop perpetuating this misleading info.
your editing is so pretty i love it
Amazing video very entertaining and great editing,
i can assure you when the bashing is intensive enough you get success 👀
Is this a Bourne-Again SHell joke? Because it's funny.
It opens up windows
or a concussion
True
@@eldiablo1221 brute-force
Need more of such content ❤
Great video.
The fact that I notice grugq at 6:41 from the talk on opsec at defcon lol
Bro this video is edited way better than any Marvel movie in the last 10 years.
This is amazing! ❤
NIcely explained! Liked it
5:58 was menace mean 😂😂😂
Great video❤
Wow good stuff guys!!
Best video i have seen in awhile
Wow. 👏👏👏 worth watching !!!
terrifying and equally fascinating