SecureNinjaTV
SecureNinjaTV
  • Видео 309
  • Просмотров 2 218 003
RMCS 2024 Colorado ▶︎ Next-Gen KVM
In this final SNTV episode from the Rocky Mountain Cyberspace Symposium 2024, Andrew delves into the crucial role of secure, high-performance KVM (Keyboard, Video, Mouse) systems with Jon Litt from G&D North America.
They discuss the intricacies of KVM extension, switches, and matrix switching, vital components that enable operators to seamlessly manage multiple computers while upholding stringent data security protocols. KVM technology facilitates remote control and monitoring of systems, which is essential for mission-critical operations in various industries, including cybersecurity, finance, and government. Jon provides a demonstration to show the efficiency and reliability of KVM sys...
Просмотров: 452

Видео

RMCS 2024 Colorado ▶︎ Emerging AI Capabilities
Просмотров 954 месяца назад
SecureNinjaTV's Andrew Howard speaks with Steve Heibein of HP Enterprise during the Rocky Mountain Cyberspace Symposium. Steve shares his expert insights on the latest advancements and applications of generative AI across various sectors, including cybersecurity, evidence processing, and predictive maintenance for critical equipment. The conversation also navigates through the intriguing aspect...
RMCS 2024 Colorado ▶︎ Open Source Software: A Double-Edged Sword?
Просмотров 1514 месяца назад
SecureNinjaTV's Andrew Howard interviews Dr. Ben Amaba at the Rocky Mountains Cyberspace Symposium 2024, exploring the challenges and opportunities of open source software in cybersecurity. Dr. Amaba discusses the vulnerabilities inherent in open source software, alongside the significant benefits it offers in terms of collaboration, innovation, and economic savings. The conversation delves int...
RMCS 2024 Colorado ▶︎ Data Center to Desktop with Fiber
Просмотров 5114 месяца назад
SecureNinja's Andrew Howard is in Colorado Springs at the Rocky Mountain Cyberspace Symposium and gets a rare hands-on look at how fiber is used for distribution and connectivity in a modern data center. Corning's Kevin Miller gives us a lot of practical information about key components like LC duplex and Uniboot connectors, single mode and multimode fiber, MPO/MTP connectors, fiber cassettes, ...
RMCS 2024 Colorado ▶︎ Quantum Resistance & Post-Quantum Cryptography
Просмотров 865 месяцев назад
SNTV is at the Rocky Mountain Cyberspace Symposium 2024, in Colorado Springs, Colorado. Andrew Howard interviews Cisco's Andrew Benhaze to discuss the future of digital security in the quantum era. Benhaze explains the differences between quantum computing, quantum resistance, and post-quantum cryptography. Today's encryption methods are adapting to resist potential future threats from quantum ...
Black Hat MEA Saudi Arabia 2023 ▶︎AI & LLMs in Cyber Attacks
Просмотров 4207 месяцев назад
We continue our coverage from Black Hat Middle East and Africa 2023 in Riyadh, Saudi Arabia where this year, the spotlight is on the rapidly evolving world of Artificial Intelligence and its implications in cybersecurity. Andrew speaks with Mustafa Islam, a senior digital forensics engineer at EG-Cert and a participant in the Black Hat CTF. Islam shares his insights on how AI is revolutionizing...
Black Hat MEA Saudi Arabia 2023 ▶︎New Phishing Attacks: Quishing and Turnstile Attacks
Просмотров 2347 месяцев назад
SecureNinjaTV is at the Black Hat Middle East and Africa 2023 conference in Riyadh, Saudi Arabia. SNTV's Andrew Howard speaks with Mr. Mohammad Alamri, a digital forensic and incident response expert about Quishing Attacks and Turnstile Attacks. Alamri sheds light on these emerging threats and how they exploit QR codes and legitimate Cloudflare services to deceive and compromise users. Quishing...
Black Hat MEA Saudi Arabia 2023 ▶︎SCADA HACKING: Stuxnet Demo & RF Replay Attack
Просмотров 8947 месяцев назад
SecureNinjaTV is at the Black Hat Middle East and Africa 2023 conference in Riyadh, Saudi Arabia. SNTV's Andrew Howard explores Black Hat's Smart City Zone, checking out demonstrations of vulnerabilities in smart city infrastructure through hacking simulations. Andrew speaks with Rana from Red Alert Labs who demonstrates a radio frequency attack on a crane, showing how cranes, though not tradit...
Inforsecurity Europe - London 2023 ▶︎ Securing Software Development
Просмотров 18311 месяцев назад
SecureNinjaTV speaks with Daniel Berman from Snyk at the InfoSecurity Europe 2023 Conference in London to discover how Snyk's developer security platform ensures secure coding throughout the entire software development life cycle. Andrew and Daniel talk about best practices, challenges faced by developers, and Snyk's unique approach to supporting the increasing complexity of modern applications...
Inforsecurity Europe - London 2023 ▶︎ Honing Your Skills with Hack the Box
Просмотров 23911 месяцев назад
SecureNinjaTV is still in London at Infosecurity Europe where Andrew interviews Soti (r0adrunn3r) and Dimi from Hack The Box, a renowned platform for honing cyber skills. They discuss the various platforms offered by Hack The Box, including the Academy, the main platform, Capture the Flag competitions and their certifications. Soti explains how the Academy provides self-paced learning for begin...
Inforsecurity Europe - London 2023 ▶︎ Yubico's New YubiKeys and the Benefits of Hardware Keys
Просмотров 2,9 тыс.Год назад
SecureNinjaTV speaks with Per Erngard from Yubico for a glimpse at the advancements in the YubiKey range, the "Swiss Army knife" of authentication. Per provides an overview of the YubiKey's versatility, supporting protocols such as FIDO, PIV, and TOTP, with the latest models offering comprehensive functionality. They discuss the superior security offered by hardware keys, highlighting their res...
Inforsecurity Europe - London 2023 ▶︎ Botnets, Human Click Farms & Circumventing 2FA with Dan Woods
Просмотров 151Год назад
At Infosecurity Europe 2023, Andrew Howard speaks with Dan Woods, the Global Head of Bot and Risk Management at F5, about the evolving threat of botnets. Woods explains that botnets, far from being limited to launching DDoS attacks, are becoming increasingly used for a multitude of cyber threats, such as credential stuffing, creating fake accounts, and data scraping. He underscores the dynamic ...
Inforsecurity Europe - London 2023 ▶︎ SCADA Systems: Backup and Recovery
Просмотров 272Год назад
At the Infosecurity Europe conference in London, we speak with Chris Wright from Solutions PT, a reseller for Salvador Technologies to discuss the increasing threats faced by SCADA (Supervisory Control and Data Acquisition) systems, which protect critical infrastructure worldwide and a backup and recovery solution. SCADA systems control various infrastructural operations, from manufacturing to ...
Inforsecurity Europe - London 2023 ▶︎ 24/7 Offensive Security Testing & Monitoring
Просмотров 167Год назад
At the Infosecurity Europe conference in London, we speak with Roger Fisher, CEO of Hadrian, to discuss the importance of continuous security testing and monitoring in today's threat landscape, where threat actors target technologies rather than specific companies. Fisher explains how Hadrian's platform assimilates attacks and categorizes them into reconnaissance, contextualization, and risk si...
GISEC - Dubai 2023 ▶︎Evolving Cyber Security Challenges with Shakeel Tufail
Просмотров 694Год назад
SecureNinjaTV is in Dubai, in the United Arab Emirates at the GISEC 2023 conference and our CEO, Shakeel Tufail, was invited to present at the GISEC Cyber Stars stage where he addressed the evolving challenges in cybersecurity. With the exponential growth of internet users, which now exceeds 5 billion people worldwide, protecting against potential threats becomes increasingly complex. Tufail hi...
GISEC - Dubai 2023 ▶︎Medical Device Security
Просмотров 210Год назад
GISEC - Dubai 2023 ▶︎Medical Device Security
GISEC - Dubai 2023 ▶︎Malware Detection on a SWITCH??
Просмотров 214Год назад
GISEC - Dubai 2023 ▶︎Malware Detection on a SWITCH??
GISEC - Dubai 2023 ▶︎Industrial Control Systems & SCADA Security
Просмотров 477Год назад
GISEC - Dubai 2023 ▶︎Industrial Control Systems & SCADA Security
GISEC - Dubai 2023 ▶︎ Cryptocurrency Security and CCSS
Просмотров 299Год назад
GISEC - Dubai 2023 ▶︎ Cryptocurrency Security and CCSS
GISEC - Dubai 2023 ▶︎ Prove Your Skills and Win $6000 in the DESC 100 Days Challenge
Просмотров 234Год назад
GISEC - Dubai 2023 ▶︎ Prove Your Skills and Win $6000 in the DESC 100 Days Challenge
Prague 2022 ▶︎ Czech Cyber Competitons and Fairytales
Просмотров 137Год назад
Prague 2022 ▶︎ Czech Cyber Competitons and Fairytales
Prague 2022 ▶︎ Real-Time Situational Awareness Using Virtual Reality
Просмотров 253Год назад
Prague 2022 ▶︎ Real-Time Situational Awareness Using Virtual Reality
Prague 2022 ▶︎ Quantum Computing
Просмотров 318Год назад
Prague 2022 ▶︎ Quantum Computing
Prague 2022 ▶︎ Advanced DNS Hacking with DNS Exfiltration
Просмотров 843Год назад
Prague 2022 ▶︎ Advanced DNS Hacking with DNS Exfiltration
Hacker Highschool ▶︎ Soup Can Comms & The OSSTMM
Просмотров 293Год назад
Hacker Highschool ▶︎ Soup Can Comms & The OSSTMM
Hacker Highschool ▶︎ Human Interface Device Exploits
Просмотров 586Год назад
Hacker Highschool ▶︎ Human Interface Device Exploits
Hacker Highschool ▶︎ Honeypots, Honeynets and Canary Tokens
Просмотров 9012 года назад
Hacker Highschool ▶︎ Honeypots, Honeynets and Canary Tokens
Hacker Highschool ▶︎ WiFi Attacks
Просмотров 8972 года назад
Hacker Highschool ▶︎ WiFi Attacks
TechNet Indo-Pacific - Hawaii ▶︎ Format-Preserving Encryption
Просмотров 3252 года назад
TechNet Indo-Pacific - Hawaii ▶︎ Format-Preserving Encryption
TechNet Indo-Pacific - Hawaii ▶︎ AT&T's Robot Dogs & Flying COWs: The Future of Emergency Comms?
Просмотров 3292 года назад
TechNet Indo-Pacific - Hawaii ▶︎ AT&T's Robot Dogs & Flying COWs: The Future of Emergency Comms?

Комментарии

  • @jimmyalsado2685
    @jimmyalsado2685 11 дней назад

    i am 33 years old and im struggling to make a powerpoint presentation in school

  • @vectoralphaSec
    @vectoralphaSec Месяц назад

    Youre competing with criminals and the criminals dont rest, not when they are making bank money.

  • @MotionrunSuperSerious
    @MotionrunSuperSerious Месяц назад

    get this man a pineapple because hes probably using only Linux with some basic wifi things

  • @nkosimfinley
    @nkosimfinley 2 месяца назад

    🤓

  • @caravaz
    @caravaz 3 месяца назад

    Good honest review

  • @sirk3v
    @sirk3v 3 месяца назад

    cool stuff

  • @SomenathChakraborty
    @SomenathChakraborty 6 месяцев назад

    Astounding!

    • @SecureNinjaTV
      @SecureNinjaTV 6 месяцев назад

      It was great fun to have it all to ourselves!

  • @SomenathChakraborty
    @SomenathChakraborty 6 месяцев назад

    Impressive, Thank you for making this tour video of computing History.

  • @CyberHAC100k
    @CyberHAC100k 6 месяцев назад

    the production is great but why so low views...youtube

    • @SecureNinjaTV
      @SecureNinjaTV 6 месяцев назад

      We appreciate you watching! Check out our archive--we've been producing content since 2011!

  • @ChibiKeruchan
    @ChibiKeruchan 6 месяцев назад

    I wish they can add a very small storage in it like an encrypted 500mb storage perfect for storing notepads.

  • @xelerated
    @xelerated 8 месяцев назад

    oh my, Ive used DNS for exfil in pen test for like nearly 15 years. and in those 15 years only 1 company made it difficult, but not impossible to do it. its a massive blind spot, so are Zero Trust network layer tools. I also use 1 in my deployed linux systems to customers internal networks. They never have to whitelist any IP or port and I have full access. Zero Trust is a sham.

  • @radolfrj7136
    @radolfrj7136 8 месяцев назад

    Hello sir/madam i'm from srilanka In srilanka my life alone life with sounds in my ears both face in srilanka famous people enter my family life and put sounds in my ears in my room president ranil wikrmasinha?singer romesh sugathapala? Singer amal perera?only mind brain use find my ears and body daily find unknown human body machine user actress harshi rasanga,actress dishni rajapaksha, singer Justin Beiber?Singer rukantha gunathilaka,singer sanuka wikrmasinha,actor randika gunathilaka ,actor mahendra perera,singer kanchana anuradhi,actress winu siriwardhana,singer dinesh tharanga Himasha h asanthika 1999.02.16

  • @kevinkawchak
    @kevinkawchak 8 месяцев назад

    Thank you

  • @nerajjha2875
    @nerajjha2875 8 месяцев назад

    Noice i loved it

  • @fotografm
    @fotografm 8 месяцев назад

    Nice video but it's a shame they didn't share his screen !

  • @atracamoniusvlogs
    @atracamoniusvlogs 8 месяцев назад

    Dubai cybersceurity al barsha south en ebuedfvtv dominicano

  • @buttercat4642
    @buttercat4642 9 месяцев назад

    womp

  • @RedStoneRealm_official
    @RedStoneRealm_official 9 месяцев назад

    One day he will be come a master of Ethical hacking system!

  • @rootedwithgod
    @rootedwithgod 9 месяцев назад

    Avoid . You will end up with headache among headaches and zero support.

  • @deidresowerby4687
    @deidresowerby4687 9 месяцев назад

    Still so revelant

  • @jvianneyjr
    @jvianneyjr 9 месяцев назад

    What's the Best yubikey 5 NFC or yubikey security key NFC? Whats the diference?

  • @momo_hit
    @momo_hit 10 месяцев назад

    And he is our descent. Sanatan Dharma! Bring betterment for the world. May you always be blessed.

  • @user-nt9mq7rt2z
    @user-nt9mq7rt2z 10 месяцев назад

    bro i can do more than that at age of 13

  • @gran-roan
    @gran-roan 10 месяцев назад

    7 years ago. Totally missed it

  • @Leilasworld
    @Leilasworld 11 месяцев назад

    Hello, thank you for the closer look at the yubikey! I was wondering if you might be able to clarify something for me? , I have purchased some yubikeys and set them up from home for my various online accounts, what happens if I travel internationally, on vacation for example, will the keys still work if I am now logging online with my same laptop BUT from a different internet address (different ISP address)? Also, what about if I am logging online from a different internet address, in the same travel scenario above, BUT also with a different device? Thank you!

  • @mithunpranav9506
    @mithunpranav9506 11 месяцев назад

    being a kid myself this is my actual dream im nine years old by the way

  • @salahmimito5080
    @salahmimito5080 11 месяцев назад

    gooooooooooooooooooooooooooooooooooooooooooodddddddd

  • @lee_carter
    @lee_carter Год назад

    What a great piece of tech.... thanks for sharing

    • @SecureNinjaTV
      @SecureNinjaTV Год назад

      Thanks for watching! Agreed, it is an elegant solution.

  • @WN_Byers
    @WN_Byers Год назад

    Interesting how they utilize the same cide names for many projects; I assume to cause confusion and muddy any trails. Example: PRISM

  • @my-rules
    @my-rules Год назад

  • @apprenticebill7116
    @apprenticebill7116 Год назад

    how bout just not throttling the fire fighters. "customer service error" , how many jobs i would still have if all my screw ups were simply a "customer service error"

  • @michaelconstable8400
    @michaelconstable8400 Год назад

    Why is this self important woman with the big tits involved?

  • @roywastaken
    @roywastaken Год назад

    nice!

  • @jagathfernando934
    @jagathfernando934 Год назад

    Family looks like srilankans

  • @abhijteoebhtuji
    @abhijteoebhtuji Год назад

    I really like his hacking and Reuben Paul give me a cloud pet I really like it

  • @reylove33
    @reylove33 Год назад

    This guy is dark. Dangerous.

  • @leeduhart105
    @leeduhart105 Год назад

    aren't you worried about the water snake?

  • @KenSherman
    @KenSherman Год назад

    This guy's doing at a significantly young age what took professionals years, decade(s), or career(s) to do. Particularly, I can('t) imagine all the haters he's getting & would get in addition to the admirers.😅 I hope our society would continue to encourage him & others alike & I hope the very best for this bright mind! 2:17-3:05 What a very intelligent & wise response!🤓🦉

  • @kartikgitm
    @kartikgitm Год назад

    Fair play!

  • @EngMohammedNagieb
    @EngMohammedNagieb Год назад

    The types of countermeasures and safeguards used to protect against emanation attacks are known as TEMPEST countermeasures. TEMPEST was originally a government research study aimed at protecting electronic equipment from the electromagnetic pulse (EMP) emitted during nuclear explosions. It has since expanded to a general study of monitoring emanations and preventing their interception. Simply because of the kinds of electronic components from which they’re built, many computer hardware devices emit electromagnetic (EM) radiation during normal operation. The process of communicating with other machines or peripheral equipment creates emanations that can be intercepted. These emanation leaks can cause serious security issues but are generally easy to address. TEMPEST-derived technology allows the electronic emanations that devices produce (known as Van Eck radiation) to be read from a distance (this process is known as Van Eck phreaking). TEMPEST eavesdropping or Van Eck phreaking countermeasures include the following: Faraday Cage A Faraday cage is a box, mobile room, or entire building designed with an external metal skin, often a wire mesh that fully surrounds an area on all sides. This metal skin acts as an EM absorbing capacitor that prevents electromagnetic signals (emanations) from exiting or entering the area that the cage encloses. Faraday cages can be designed to block specific frequencies while allowing others-for example, blocking Wi-Fi while allowing walkie talkies and mobile phones. White Noise White noise simply means broadcasting false traffic to mask and hide the presence of real emanations. White noise can consist of a real signal from another source that is not confidential, a constant signal at a specific frequency, a randomly variable signal, or even a jam signal that causes interception equipment to fail. Although this is similar to jamming devices, the purpose is to convolute the signal only for the eavesdropper, not the authorized user, rather than stopping even valid uses of emanations. White noise describes any random sound, signal, or process that can drown out meaningful information. This can vary from audible frequencies to inaudible electronic transmissions, and it may even involve the deliberate act of creating line or traffic noise to disguise origins or disrupt listening devices.

  • @deadguydontcomeback
    @deadguydontcomeback Год назад

    But who else having electronic teddy bear?

  • @deadguydontcomeback
    @deadguydontcomeback Год назад

    Now i realised that why my teddy bear was looking at me when I was taking bath

  • @samueljoshuaowusu
    @samueljoshuaowusu Год назад

    pretty good

  • @VRKtaka
    @VRKtaka Год назад

    🙌👍👍

  • @elliott2971
    @elliott2971 Год назад

    ❗ Promo SM!!

  • @albertma413
    @albertma413 Год назад

    Technically I was a hacker at 5 but who is counting lmao. When I was in preschool my parents thought I was watching too much Sesame Street so what they did was put a lock on the Light switch the kind that are used in commercial buildings. What I did was lockpicked it. Lol

  • @stephjackson
    @stephjackson Год назад

    Embarrassing for a few fishing adult males who keep telling their wives they need psychological help for this while young kids are getting ahead of mine in safety and knowledge..so embarrassing!!! I feel so bad for my children ..go on young ones educate yourself on this! Proud of them!

  • @johnreinermarcos
    @johnreinermarcos Год назад

    Ggh

  • @mr_trojan
    @mr_trojan Год назад

    how i can learn wifi hacking.

  • @marklampo8164
    @marklampo8164 Год назад

    The lore is growing like "tales of PCP and DMT!" Those "six figure jobs" quickly become 40K jobs because you're "just not worth that kind of money!" Deja Vu all over again, Yogi! A flood of "talent" into a vacuum makes for the new lore; "The more you know in this biz, the LESS you get paid! How the F did that happen?!"