Learn the Price of a Knowledge Breach report → https://ibm.biz/BdGEHY Within the ever altering panorama cybersecurity panorama, Jeff …
source
Learn the Price of a Knowledge Breach report → https://ibm.biz/BdGEHY Within the ever altering panorama cybersecurity panorama, Jeff …
source
Copyright © 2023 The Crypto HODL.
The Crypto HODL is not responsible for the content of external sites.
Copyright © 2023 The Crypto HODL.
The Crypto HODL is not responsible for the content of external sites.
Its always interesting to listen to you.
All Hail the YouTube prophet!
Well, no more doubts about going into cyber security or not. The AI part was like a cherry on top of the cake.
I use AI for some stuff like losing what foods are good but I don't trust it
I totally agree with this individual
I like how he simplifies complex technology for easy understanding. Thank you, Jeff Crume.
Excellent thank you.
Help me 😢
A masterpiece in its own way 🎨
Supply Chain + Hidden Artifact attacks are the most used techniques in X/Twitter ads because they only use AI to check for phishings. the AI would see a legitimate page [about some toys], but X users see the phishing [an image and page related to X token or Musk giveaways].
there would be more of these in the future. even VirusTotal can't scan these techniques correctly for at least 10 years that it's happening. there is more on that. like IP based, User-Agent based, or use of famous trackers to separate who can see what.
Thank you for the excellent videos! As a master's student in cybersecurity, could you recommend a thesis topic that addresses one of the current challenges in the field?
My prediction is that we will be able to use Quantum Computing and AI to develop "Cures" for cancer.
AI: way more problems than benefits
Thanks for keeping it simple.
FWIW, grammer and spelling errors in phishing emails are purposely designed that way.
Sooo to summarise!, we’re living in the middle of an Ai shit storm 😳🤔
I’ve had two stage authentication, fishing attempts, deep fakes!, romantic fraud and been locked out of my bank and phone!, thankfully it’s sorted now!.
But these new tools are a pain in the ass.
Thanks for the video, great content 🫡🇬🇧
My prediction for 2025 and beyond is the automation of things we do post online on certain occasions. E.g posting about a certain reminder about a weekly event. Our systems may recognize the consistency of what we post and decide to automate that even when we're offline or forgot about it. That could be dangerous though because an attacker could hack the system or server and alter the message especially in politics or any sensitive situation.
Amazing job Thanks 🙏😊
Good job, thank you
Very detailed and informative.
Wonderful panoramic views of IT Security!
Nice
Hi Sir, From a cybersecurity and privacy perspective, are there any vulnerabilities associated with downloading and using the free versions of Anaconda, Git, and Visual Studio Code from their official websites without purchasing a license?
I really like your video. You give me plenty of knowledge about the Internet.
I predict that the underserved/vulnerable/non-tech savvy end users will be protected using a couple of plug and play & software tools that I am inventing for commodity and legacy hardware. I am just a woman that is trying to solve an existing problem.
What about weaponizing the network against the attacker with AI driven deception?