Where People Go When They Want to Hack You
What do you need to hack any system on the planet? Whatever it is, you can certainly find it on the Zero-day market: a network that consists of the world’s best hackers trading vulnerabilities with governments, cybercriminals and megacorporations. How does this market appear, how does it work and why nobody talks about it?
🎯 Subscribe to @cybernews for more AI news and cybersecurity updates: https://cnews.link/subscribe/
🎪 Looking for entertainment and more interesting stories? Check out our playlists filled with captivating content that will keep you entertained for hours:
https://www.youtube.com/playlist?list=PLa8oKYy_2UcNWMp91QuENBVLtv2HimUUB
https://www.youtube.com/playlist?list=PLa8oKYy_2UcMmqPRg4X95LTWO9HxFQR35
https://www.youtube.com/playlist?list=PLa8oKYy_2UcNqsnRRwfWT3raZOG4Ey44I
📰 Stay up-to-date with the latest cybersecurity news and trends by checking out our curated news playlist. We cover the latest threats, trends, and insights from the world of cybersecurity:
https://www.youtube.com/playlist?list=PLa8oKYy_2UcOv27VEdZYZpFXcoxVcI11h
💬 Stay connected with us on social media for the latest news, insights, and discussions around cybersecurity: https://linktr.ee/Cybernews
0:00 Intro
1:16 Part 1. Cracked bricks
4:14 Part 2. People who already did that
8:45 Part 3. Time to use it
10:45 Part 4. Paying the price
15:38 Part 5. The complicated world
20:10 Part 6. Where it gets even worse
22:56 Part 7. Even worse than that
30:14 Part 8. Those who stare into the wall
33:28 Epilogue
🥷 Secure your online activities - Check out a VPN with the best discount - https://cnews.link/get-nordvpn/TLPHmHPaCiQ/
🔑 Keep your accounts safe - Get THE BEST password manager offer - https://cnews.link/get-nordpass/TLPHmHPaCiQ/
🦠 Protect your devices - Grab an EXCLUSIVE Antivirus deal - https://cnews.link/get-bitdefender/TLPHmHPaCiQ/
Credits:
Producer: Ignas Žadeikis
Writer: Valius Venckūnas
Video Editing: Matas Paskačimas
Narration: Ben Mitchell
Thumbnail: Domantė Janulevičiūtė
Supervising Producer: Aušra Venckutė
All the sources we used in this video can be found here: https://docs.google.com/document/d/1jmmdOQK2AeSwYXzPuils17Vg1cSnsIJc
ℹ️ About us:
We are an independent news outlet with a YouTube channel that posts cybersecurity & tech news videos daily. Our foremost concern is the safety and security of our viewers around the world. We remain vigilant on the issue of hacking and will provide updates as they become available. A number of our investigations and reports have been featured by industry-related publications and global news leaders like Forbes, PC mag, and Techradar.
We are affiliated but not sponsored by any service provider. This means we may receive a small commission when you click on the provided links.
Music license:
MB01Y50OJPFYTY0
MB01QHMCQBFMEDE
Видео Where People Go When They Want to Hack You канала CyberNews
🎯 Subscribe to @cybernews for more AI news and cybersecurity updates: https://cnews.link/subscribe/
🎪 Looking for entertainment and more interesting stories? Check out our playlists filled with captivating content that will keep you entertained for hours:
https://www.youtube.com/playlist?list=PLa8oKYy_2UcNWMp91QuENBVLtv2HimUUB
https://www.youtube.com/playlist?list=PLa8oKYy_2UcMmqPRg4X95LTWO9HxFQR35
https://www.youtube.com/playlist?list=PLa8oKYy_2UcNqsnRRwfWT3raZOG4Ey44I
📰 Stay up-to-date with the latest cybersecurity news and trends by checking out our curated news playlist. We cover the latest threats, trends, and insights from the world of cybersecurity:
https://www.youtube.com/playlist?list=PLa8oKYy_2UcOv27VEdZYZpFXcoxVcI11h
💬 Stay connected with us on social media for the latest news, insights, and discussions around cybersecurity: https://linktr.ee/Cybernews
0:00 Intro
1:16 Part 1. Cracked bricks
4:14 Part 2. People who already did that
8:45 Part 3. Time to use it
10:45 Part 4. Paying the price
15:38 Part 5. The complicated world
20:10 Part 6. Where it gets even worse
22:56 Part 7. Even worse than that
30:14 Part 8. Those who stare into the wall
33:28 Epilogue
🥷 Secure your online activities - Check out a VPN with the best discount - https://cnews.link/get-nordvpn/TLPHmHPaCiQ/
🔑 Keep your accounts safe - Get THE BEST password manager offer - https://cnews.link/get-nordpass/TLPHmHPaCiQ/
🦠 Protect your devices - Grab an EXCLUSIVE Antivirus deal - https://cnews.link/get-bitdefender/TLPHmHPaCiQ/
Credits:
Producer: Ignas Žadeikis
Writer: Valius Venckūnas
Video Editing: Matas Paskačimas
Narration: Ben Mitchell
Thumbnail: Domantė Janulevičiūtė
Supervising Producer: Aušra Venckutė
All the sources we used in this video can be found here: https://docs.google.com/document/d/1jmmdOQK2AeSwYXzPuils17Vg1cSnsIJc
ℹ️ About us:
We are an independent news outlet with a YouTube channel that posts cybersecurity & tech news videos daily. Our foremost concern is the safety and security of our viewers around the world. We remain vigilant on the issue of hacking and will provide updates as they become available. A number of our investigations and reports have been featured by industry-related publications and global news leaders like Forbes, PC mag, and Techradar.
We are affiliated but not sponsored by any service provider. This means we may receive a small commission when you click on the provided links.
Music license:
MB01Y50OJPFYTY0
MB01QHMCQBFMEDE
Видео Where People Go When They Want to Hack You канала CyberNews
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
This Game Looks TOO REAL #shortsHow to make Facebook profile private on browser and mobileShopify Tutorial For Beginners 2024 | Build your eCommerce site in no time!Pakistan Social Media Blackout After Imran Khan Arrest | cybernews.comDiscord Admins HACKED by Malicious Bookmarks | cybernews.comHow Many Members Does Anonymous Have? #shortsHere is what an ideal phishing victim looks like #cybernewsMicrosoft Edge Is Leaking The Sites You Visit to Bing | cybernews.comWindows Vulnerability Exploit Published By Experts | cybernews.comThe Internet Archive explained #shortsReuters LEAKED 3 TERABYTES of Sensitive Data #cybernewsIsrael, Russian Banks and Cyber Influencers | Weekend RecapCredit Card Hackers BUSTED in Ukraine | cybernews.comTwitter Leak (Part 2): Piers Morgan HACKED | cybernews.comGoogle AI ChatBot "Bard" RELEASED | cybernews.comT-Mobile BREACHED Again... | cybernews.comHow to install WordPress on cPanel Easily (Bluehost/GoDaddy)Top 5 Most Dangerous US States for Cyber CrimeMany Cameras Use Default Passwords - What Can Happen | cybernews.comWhat is ChatGPT?When Facial Recognition Goes Wrong Unmasking the Flaws in Crime Investigation