У нас вы можете посмотреть бесплатно Your Home Is Launching Cyber Attacks! (And You Don't Know It) или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
(05:22) Brought to you by Cyberhaven AI is exfiltrating your data in fragments. Not one big breach — a prompt here, a screenshot there, a quiet export into a shadow AI tool. Every week, AI makes your team faster… and your data harder to see. Files are moved to new SaaS apps, models are trained on sensitive inputs, and legacy DLP is blind to the context that matters most. On February 3rd at 11 am Pacific, Cyberhaven is unveiling a unified DSPM and DLP platform, built on the original data lineage, so security teams get X-ray vision into how data actually moves — and can stop risky usage in real time. Watch the launch live at cyberhaven.com/techleadjournal. --- Did you know Singapore is one of the world’s top countries launching cyberattacks? Not as a victim, but as the source. Your routers, smart TVs, robot vacuums, or network-attached storage could be part of a massive botnet right now. In this eye-opening episode, Joseph Yap, founder of Otonata and cybersecurity expert, reveals the hidden cyber threat lurking in our homes. He reveals how everyday devices from routers to smart TVs become attack weapons. He explains why Singapore’s excellent infrastructure ironically makes it attractive for hackers and shares practical steps to protect your network. From residential proxies renting out your internet connection to teenagers running ransomware gangs, this conversation exposes the gap between our connected lives and our digital security practices. Key topics discussed: Why Singapore, Indonesia, and Vietnam are top cyberattack source countries Why Singapore’s infrastructure makes it attractive for hackers How 700,000+ compromised devices launch 30 terabits per second DDoS attacks The rise of residential proxies and dark web rental of home networks How hackers exploit publicly disclosed vulnerabilities in outdated firmware Why AI is lowering the barrier to entry for hackers What makes executives and high-net-worth individuals attractive targets Practical steps to audit and protect your home network Timestamps: (00:00:00) Trailer & Intro (00:02:40) How Can I Apply Journalism Skills to Tech (00:06:14) Why is Curiosity Essential for Tech Leaders? (00:08:48) Why is Singapore a Top Source for Cyber Attacks? (00:12:11) What Makes Singapore Attractive for Cyber Attacks? (00:16:39) How Many Devices in Singapore are Already Compromised? (00:20:40) How Can I Tell if My Home Network is Compromised? (00:30:13) Which Devices are Hackers’ Favorite Entry Points? (00:33:18) What is a Residential Proxy and Why Should I Care? (00:36:27) How do Hackers Actually Break into My Network? (00:47:47) Why are Executives and High-Net-Worth Individuals Prime Target? (00:55:12) Why isn’t Singapore’s Cyber Attack Problem in the News? (00:59:26) Can Internet Providers Stop These Attacks? (01:02:16) What Can I Do to Protect My Home Network? (01:05:19) How Do I Protect My Network-Attached Storage (NAS)? (01:10:41) How is AI Changing the Cyber Attack Landscape? (01:17:35) How Can Otonata Help Protect My Home Network? (01:23:39) What are Real-World Examples of Home Network Compromises? (01:28:20) 3 Tech Lead Wisdom _____ Joseph Yap’s Bio Joseph Yap possesses over two decades of experience in Operations and Supply Chain for large corporate businesses, where he leveraged IT and data to make strategic decisions. Having seen first hand the disruption and damage that came with security breaches and realising how at-risk the home network environment was, he put his energy into tailoring corporate-grade cybersecurity practices to the endless variety of home environments, with the goal to build a system that could scale and protect more people. His cybersecurity practice is called Otonata ( https://otonata.com ) (named after the dragonfly, a silent bug catcher) The current trends are working against home users - More AI, more computing power, more ‘smart’ technology and shorter attention spans. These have resulted in an unprecedented growth in ‘attack surfaces’ for hackers to weaponise against outmatched victims. Otonata builds on basic principles such as digital hygiene and lean management, augmenting automation and AI to enhance cybersecurity. While each house differs by attractiveness and vulnerability, Otonata has already protected dozens of households and aims to expand its protective umbrella to cover many more. Follow Joseph: LinkedIn – linkedin.com/in/-joseph-yap Otonata – https://otonata.com/ Free Hack Check – https://otonata.com/hack-check Like this episode? 📝 Show notes – https://techleadjournal.dev/episodes/245 ☕ Buy me a coffee – https://techleadjournal.dev/tip 😎 Become a patron – https://techleadjournal.dev/patron Follow @techleadjournal: LinkedIn – / techleadjournal Twitter – / techleadjournal Instagram – / techleadjournal Newsletter – https://techleadjournal.dev