Télécommunications

Threat Intel (10/23/22 to 10/29/22) // Cyber Security TLDR

Threat Intel (10/23/22 to 10/29/22) // Cyber Security TLDR

Join this channel to get access to perks:
https://www.youtube.com/channel/UCbbBt23LHt4WhjiWh67NJ3w/join

Looking to start a career in Information Security, Cyber Security, or Information Assurance? Check out all these resources to Get Started! https://www.jongood.com/getstarted/

Need CAREER COACHING or CONSULTING Services? https://www.jongood.com/services/

Listen to Cyber Security TLDR for Threat Intel and Cyber Security News on Podcast! https://www.cybersecuritytldr.com/

If you currently work in Cyber Security or are looking to grow your knowledge about what is happening today in the world of Cyber Security, it is crucial that you stay current with the latest threat intelligence. Fortunately, I track the latest activities throughout the week so that you do not have to and then I provide expert analysis on the most important topics.

Join me in this video as we walk through the most important Cyber Security threat intelligence (infosec news) for the week. This is a great way to not only add up continuing education credits for professional certifications but also to keep current with activity that you need to be aware of as a Cyber Security professional.

Keep on threat hunting with current cybersecurity news (cyber news)!

SHOW NOTES: https://jongood.com/threat-intel-10-23-22-to-10-29-22-cyber-security-news/

#cybersecurity #informationsecurity #infosec

📱Social Media📱 – https://www.jongood.com/links/

🔥Training🔥 – https://www.jongood.com/courses/

⚡️Lab & YouTube Gear⚡️ – https://www.jongood.com/equipment/

👕Merch👕 – https://www.jongood.com/merch/

📇Affiliates Links📇 – https://www.jongood.com/affiliates/

DISCLAIMER: I am an ambassador or affiliate for many of the brands referenced on the channel. As an Amazon Associate, I earn a commission from qualifying purchases.

DISCLAIMER (MUSIC): I only use royalty free music and sound effects.

0:00 ⏩ Introduction
1:58 ⏩ NSA Will Increase Threat Intelligence Information Sharing
5:19 ⏩ URSNIF Changing Tactics to a Backdoor For Extortion
7:52 ⏩ Hackers Were Skimming Credit Card Data For 2.5 years
13:14 ⏩ CISOs Have Trouble Explaining Cyber Risk to Board Members
18:37 ⏩ Cyber Security Using Gamification To Teach Students
25:32 ⏩ Sigstore Open Source Project For Software Signing
28:55 ⏩ 22 Year Old Vulnerability in SQLite Database Library // CVE-2022-35737
34:24 ⏩ Microsoft Fixes Vulnerable Driver Blocklist

Views : 244
cyber security

Source by Jon Good

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *