Whatsapp Hack Exposes Millions

555,962
0
Published 2019-05-20
Breakdown of the recent Whatsapp buffer overflow vulnerability (CVE-2019-3568) that allowed for a remote code execution and was exploited in the wild to install Pegasus, the famous spyware made by the NSO Group.
---------------------------------------------------------------
✳️ Subscribe and use this link to opt-in to the course giveaway 👇
forms.gle/987ViTu4tH6Ah3PcA
---------------------------------------------------------------
🧠 My hacking courses 👇
zsecurity.org/courses/
---------------------------------------------------------------
Website - zsecurity.org/
Facebook - www.facebook.com/ZSecurity-1453250781458287/
Twitter - twitter.com/_zSecurity_
Instagram - www.instagram.com/zsecurity_org/
Linkedin - www.linkedin.com/company/zsecurity-org/
-----------------
⚠️ This video is made for educational purposes only, we only test devices and systems that we own or have permission to test, you should not test the security of devices that you do not own or do not have permission to test.

All Comments (21)
  • @OrlandoKemp
    Y’all should stop calling everything “the bare minimum” when it’s literally not. Respect is the bare minimum, actually going out of your way to comfort and have an open ear for someone isn’t. Doing something like this is truly very nice and a great thing of him to do. I hope shit gets better for you and I salute Incredible Cybers for being mature when it’s needed!
  • @Joe222..
    This channel is the sole exception where I haven't skipped the promo ads. Your finesse in effortlessly integrating promotional content within your videos is genuinely impressive. Sometimes, it takes a moment to recognize that you're endorsing anything; I commend incredible cybers for your adept execution in this aspect!
  • @Emily23437
    A muchos canales les hace eso, pero no es creíble y menos creíble con una persona como tú, que estando arriba sigas con los pies en la tierra y ayudando a la gente siempre que puedas, gran incredible cybers
  • @JackiePhillipss
    It’s a pleasure to work with someone who knows how social media ethics works and inspiring work spirit incredible cybers . I’m glad that a position opened up for you that is a great next step in your career. You will never find out your real worth until you give life your best shot. Work hard and give it all you’ve got. You will find more success than you had ever thought.
  • @anirbanshow8653
    I think we all at least need to know how protect ourselves from those social engineering Technic, malware etc...also sir thank you for share us the deep knowledge in ethical hacking on your course...I seen many course on udemy but none of them are good as ur courses, Your course is another level as the way you teach us that is best technique I ever seen.
  • @dir188tandele9
    thanks dude. George here. There is something going on down there with the whatsapp team. They made end to end encryption, now government monitoring people. Surely they are up to something. We are not save anymore. Our data is at risk.
  • @MeNow-dm6yk
    Great work on the recent project. Your brilliant problem-solving skills helped us to reach our targets much more quickly.
  • @Code-Matters
    As I know, no application is bug free. So It may be a simple mistake coz while programming we mainly focus on our goal not the security system. So even though they use any encryption or sth else to protect user data later phase. The programmers also should be aware and cure full while developing every single unit or module and while integrating them.
  • @ehabefctw2344
    After I read "No Place to Hide" book, I can tell such vulnerabilties are not a mistake, it intended as a back door.
  • @thomashouhou
    HQ work and video, you're the best teacher Zaid !
  • @ahmedfalih473
    I love your videos . im trying to find a router that would work on my mac ad allow me to create the WEP access points.. i bought 2 brands but they both only support the spa/wpa2.. any suggestions? Thank you
  • @KS-kr4ok
    There is no such thing as privacy. So just behave and limit your online presence as best you can.
  • @lightyagami1456
    You are the next generation of hacking tuts. Keep going man!
  • @donhoyt2363
    @zSecurity. Do you have mobile hacking courses
  • @karkig9935
    Love ur courses on udemy and ur utube video .Lots of love from the top of the world Nepal.
  • Hey Z! Thanks for this information, I think something bigger is going on behind the scenes and we are not aware