Where People Go When They Want to Hack You

preview_player
Показать описание
What do you need to hack any system on the planet? Whatever it is, you can certainly find it on the Zero-day market: a network that consists of the world’s best hackers trading vulnerabilities with governments, cybercriminals and megacorporations. How does this market appear, how does it work and why nobody talks about it?

🎪 Looking for entertainment and more interesting stories? Check out our playlists filled with captivating content that will keep you entertained for hours:

📰 Stay up-to-date with the latest cybersecurity news and trends by checking out our curated news playlist. We cover the latest threats, trends, and insights from the world of cybersecurity:


0:00 Intro
1:16 Part 1. Cracked bricks
4:14 Part 2. People who already did that
8:45 Part 3. Time to use it
10:45 Part 4. Paying the price
15:38 Part 5. The complicated world
20:10 Part 6. Where it gets even worse
22:56 Part 7. Even worse than that
30:14 Part 8. Those who stare into the wall
33:28 Epilogue

Credits:
Producer: Ignas Žadeikis
Writer: Valius Venckūnas
Video Editing: Matas Paskačimas
Narration: Ben Mitchell
Thumbnail: Domantė Janulevičiūtė
Supervising Producer: Aušra Venckutė

ℹ️ About us:
We are an independent news outlet with a YouTube channel that posts cybersecurity & tech news videos daily. Our foremost concern is the safety and security of our viewers around the world. We remain vigilant on the issue of hacking and will provide updates as they become available. A number of our investigations and reports have been featured by industry-related publications and global news leaders like Forbes, PC mag, and Techradar.

We are affiliated but not sponsored by any service provider. This means we may receive a small commission when you click on the provided links.

Music license:
MB01Y50OJPFYTY0
MB01QHMCQBFMEDE
Рекомендации по теме
Комментарии
Автор

As a Cybersecurity professional, I must say, this complex topic is way much simply explained. The analogy of bricks is really good. Good job and kudos to the creators.

syedibrahimkhalil
Автор

When you randomly bash your keyboard in infinite parallel universes for an infinite amount of time, you'd probably get a fully working exploit chain for the latest ios version some day in Eternity

MoritzDerErste
Автор

Bro seriously, editing something like this takes a long time. Very impressive. Keep these docu’s coming, you can become a big youtuber.

Retrohunter
Автор

As an IT professional, this video does an excellent job of breaking down a very complex subject into terms the average person can easily understand. The brick wall analogy is excellent and one I’ll borrow for future conversations.

trusttech
Автор

This is one of the best Cyber-sec educational videos that I've ever seen on YouTube. Thanks for all the effort you put into this.

x_Frggy
Автор

This was one of those rare videos on YouTube that really open your eyes and are so well done that they just stay with you. Great job and great video!

polk
Автор

6:00 that you made Australia upside down, is pure comedy 😂

zappos
Автор

So if you're a dev at a large software or hardware company, you deliberately sneak in a bug that allows for a very specific 0 day vuln, sell it off to a broker, and the day it's detected by your employer, you come up with a fix and gain a pay rise.

JanBadertscher
Автор

Zero day exploits have always mesmerized me, knowing there is someone out there with a critical piece of info that could have so many implications, practically all being negative, is equal parts scary and fascinating to me.

abysses
Автор

My man, DDoS is an attack, not the way to get "to the other side of the wall". It's a denial of service, not something that will get you information. Fix your video.

izvanzemaljac
Автор

One thing to note about all these walls is that when you buy a 0-day, you don't just pay for knowing about one faulty brick in one wall, you're paying for knowing about such a brick in every single wall of similar design.

lotarion
Автор

I think there's one thing you missed that I think is extremely important: everyday security researchers. There's a lot of hackers out there that are fully public and post about the vulnerabilities they find (after they're patched, usually). However, becoming such a person still requires you to navigate these markets.

They could report it directly to the company, but companies such as Apple have been criticized in the past for low payouts, or not paying at all. This could lead security researchers to go to the grey market instead, hoping for a more guaranteed payday. I think that's a pretty interesting dynamic of the market.

gFamWeb
Автор

I want to know who wrote the Apple OS bug that stops recognizing your passwords four times a year. “Forgot your password?” No.

lisaschuster
Автор

Algorithm pushed this on my feed, and as soon as I was at 0:20, I subbed! May the force be with you CyberNews! 👊

superleggera
Автор

Social engineering, hacking data brokers and bribing corrupt employees are some other ways people get in. *The human will always be the weakest link, like when they setup their servers and their root password is admin*

bSixf
Автор

I loved the animation trying to sell a zero day for TempleOS

daviduper
Автор

These explaining, documentary style videos are soo good! Definitely need more of those.

psstimbatman
Автор

Credit to Kaspersky for operation triangulation, they did some amazing work exposing the attack chain. And the cherry on top, they released everything on Christmas for the jailbreak community.

guinnesstheshep
Автор

This is one of the greatest videos I've ever watched on youtube, you got a new subscriber! awesome content

gabrielresidentevil
Автор

Pplease make more videos like this, I loved every minute, perfect editing, incredible narration...

I loved this bro

AZashr