Welcome to CyberSecurityTV, your go-to destination for mastering the world of cybersecurity! š Whether you're new to the field or a seasoned pro, this channel is packed with expert insights, real-world tips, and in-depth tutorials on everything from penetration testing to data protection strategies. Join experienced professionals as they walk you through the latest tools, techniques, and methods used to secure systems and networks. Tune in for actionable advice, hands-on demos, and a supportive community of cybersecurity enthusiasts. Stay one step ahead in the ever-evolving world of security!
Checkout securify or reach out to us for our services securifyai.co/
CyberSecurityTV
The Ethics Of AI In Cybersecurity: Are We Creating More Problems Than Solutions?
10 months ago | [YT] | 1
View 0 replies
CyberSecurityTV
InfoSec Black Friday Deals
github.com/0x90n/InfoSec-Black-Friday?tab=readme-oā¦
1 year ago | [YT] | 1
View 0 replies
CyberSecurityTV
500K open jobs
www.cbsnews.com/amp/news/cybersecurity-job-openingā¦
4 years ago | [YT] | 7
View 2 replies
CyberSecurityTV
How to get into Cybersecurity
Here is the podcast I had recorded with the techfellow
E04 - www.techfellow.co.uk/podcast
4 years ago | [YT] | 5
View 0 replies
CyberSecurityTV
I still donāt understand why anyone makes services in this day and age where the only login method is via phone number. Worryingly, services like Google pay are actually trending in the wrong direction here. This class of attacks seems unlikely to be gone anytime soon.
www.vice.com/amp/en/article/y3g8wb/hacker-got-my-tā¦
4 years ago | [YT] | 6
View 0 replies
CyberSecurityTV
If youāre on an iPhone, please update to iOS 14.4. Three zero days fixed in it that were apparently exploited in the wild.
techcrunch.com/2021/01/26/apple-says-ios-14-4-fixeā¦
4 years ago | [YT] | 2
View 0 replies
CyberSecurityTV
Cloud snooper attack
5 years ago | [YT] | 6
View 0 replies
CyberSecurityTV
Beer's entire attack stems from a simple, well-known type of vulnerabilityāa memory corruption bugāin the iOS kernel, the privileged core of an operating system that can access and control pretty much everything. The genius of the attack, though, is that the bug was exploitable through an iPhone's Wi-Fi features, meaning that an attacker just needed some antennas and adapters to launch the assault whenever they chose, compromising any nearby iOS device.
www.wired.com/story/zero-click-ios-attack-project-ā¦
5 years ago | [YT] | 1
View 0 replies
CyberSecurityTV
Firefox 83 introduces HTTPS-Only Mode
blog.mozilla.org/security/2020/11/17/firefox-83-inā¦
5 years ago | [YT] | 0
View 0 replies
CyberSecurityTV
If you have 5 minutes and want to understand why we say security should be layered even inside the Corp network, this is why.
arstechnica.com/information-technology/2020/10/whiā¦
5 years ago | [YT] | 0
View 0 replies
Load more