Computer NetworksNETWORKS

Mercenary PREDATOR Spyware and other THREATS (plus FREE training)

Big thank you to Cisco for sponsoring this video! (And for the FREE Ethical Hacking Training!)

Commercial spyware use is on the rise, with actors leveraging these sophisticated tools to conduct surveillance operations against a growing number of targets.

Cisco is deeply concerned by an increase in the rate of high-sophistication attacks on network infrastructure — that we have observed and have seen corroborated by numerous reports issued by various intelligence organizations — indicating state-sponsored actors are targeting routers and firewalls globally.

// FULL Detailed Interviews //
Martin: https://youtu.be/rigOKIFwt48
Mark: Coming soon
Kieron: Coming soon

// Martin’s SOCIAL //
Twitter / X: https://twitter.com/mlee_security
LinkedIn: https://www.linkedin.com/in/martinlee/

// Mark’s SOCIAL //
Twitter / X: https://twitter.com/m_jacks76
LinkedIn: https://www.linkedin.com/in/mark-jackson-148a012/

// Kieron’s SOCIAL //
LinkedIn: https://www.linkedin.com/in/kieron-iveson-88625b1b1/

// YouTube VIDEOS //
Is AI biggest security threat in 2023?: https://youtu.be/SyaP9GDNIug

// Links MENTIONED //
Free Ethical Hacking course: https://skillsforall.com/course/ethical-hacker?courseLang=en-US

Talos Intellexa Predator: https://blog.talosintelligence.com/mercenary-intellexa-predator/

Talos Year in review: https://blog.talosintelligence.com/half-year-in-review-2023/

State-sponsored campaigns target global network infrastructure: https://blog.talosintelligence.com/state-sponsored-campaigns-target-global-network-infrastructure/

NSSC: https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/jaguar-tooth/NCSC-MAR-Jaguar-Tooth.pdf

// David’s SOCIAL //
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal

// MY STUFF //
https://www.amazon.com/shop/davidbombal

// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com

// MENU //
00:00 – Coming up
04:38 – Interview with Martin Lee // Mercenary software & Vulnerabilities in softwares
09:00 – How can non-tech savvy people stop hacks
12:57 – Ransomware + Mercenary software
15:52 – The sky is not falling // Know your Threat Profile
20:07 – Affordable and free courses
23:26 – Interview with Mark Jackson // Risks of end-of-life network devices
27:48 – SNMP vs NETCONF/RESTRCONF
29:44 – GRE Tunnels
31:09 – VPNs without Multi-Factor Authentication being targeted
32:43 – Tips to prevent getting hacked
38:06 – Security for home network devices
39:40 – Why is it happening now?
43:18 – Interview with Cisco Apprentice // Getting into Cicso at 18
45:04 – Advice for the youth
46:52 – The younger perspective
48:13 – Conclusion

cisco
talos
cisco talos
pegasus
spyware
hacking
hacker
malware

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

Disclaimer: This video is for educational purposes only.

#pegasus #iphone #android

source

cisco academie

30 thoughts on “Mercenary PREDATOR Spyware and other THREATS (plus FREE training)

  • Hi David,

    It would really make me happy if you did an interview with Nicole Perlroth!

    Then on another topic, I noticed that you like to make videos where you install Kali Linux on just about anything you can!

    But I just realized that you don't have a video where you install Kali Linux in a Docker container and then then add the tools into Kali Linux.

    I'd really appreciate it if you did one, so if possible, do it in the cloud (AWS?)!

    Thanks in advance!

  • Hello, firstly congratulations on the excellent content, always relevant and with didactic and practical content. I would like to ask, if it has not already been discussed on the channel, for an approach to the real security of encryption services such as those used by Nordvpn, among others. If they are in fact safe and to what extent. Could you present us with an attack on a Wi-Fi network to present possible flaws?

  • 03:35 – David Dombal apparently doesn't know what logical fallacies are. There are hundreds of millions of peopled that are oppressed by way of labeling they keep out of any achievement of social and societal success. Every system is corrupt and broken. Gatekeepers everywhere. Stop being dishonest just so that you can sleep at night.

  • I manage older devices but I block network management from the internet and all devices are protected with two factor.

  • ASA ALWAYS, MY MENTOR HAS DELIVERED YET ANOTHER INTORMATIONAL MASTERPIECE OF A VIDEO. THANK YOU FOR PUTTING ALL THIS CONTENT FOR FREE MR.DAVID. I HOPE I CAN MEET YOU SOMEDAY AND HAVE SOME PODCAST OR SMTH WHEN IM BIG ENOUGH HAHA. LOVE FROM PAKISTAN AND ME 🥰🥰🥰🥰🥰🥰

  • Mr. Bombal, you always ask your guests great questions that help people like me who are new to the industry. Thank you.

  • Security Admin to board of directors: "Our switches, servers, routers have been up for 10years!"
    Board of Directors: "Yippppeeeee, clap!clap!clap!clap!clap!clap!
    Hacker takes a break in 10 years to wash his Hoodie

  • My understanding is that VPNs are only as secure as their privacy policy dictates. If they decide to change it at the drop of a hat then there goes ur data and probably sold to the highest bidder.

  • Yet another Excellent video! Really like all the experts advice. And all the video's for the education and knowledge use. Speciality for a true beginner like me. Thank you David for being Awesome educator.

  • I love how you always put the "you can do whatever you put your mind to". My only thing is with following all the tutorials out there is getting stuck in tutorial hell. Basically Limbo for tutorials.

  • Thank you @davidbombal.
    Best cyber security channel on YouTube 🎉

  • Please I have strong password (Microsoft Authenticator Generated)

    Two factor Authentication (Google Authenticator)
    but still my LinkedIn Account got defaced but the attackers weren't able to locked me out.

    Can I get any help on how this can happen because with all my security protocols in place the account still got defaced and all my activities and certificates was erased

  • Is it possible to update the OS on an older Cisco ASA router/firewall that has no Cisco subscription?

Comments are closed.