Which Apps, Communication System Was Used in Pahalgam Attack | Cyber Security Podcast | Amit Dubey

Switch · Advanced ·🔐 Cybersecurity ·3d ago
26 innocent lives were lost in the Pahalgam Attack 2025. After a year, Cyber Security expert Amit Dubey analyses how the attack took place and which add the attackers used to communicate. Dont worry, we won't judge you for binge-watching the OG content on @zeeswitch Subscribe and let's have a great time together! SWITCH is a leap in the world of content - raw, uncensored and unfiltered. The platform puts together ground reports, explainers, short films, cricket, roast shows, interviews, entertainment, tech and AI and much more with an attitude that’s about millennials and Gen Z. We believe in the art of sharp and meaningful storytelling with a dollop of wit and satire. Time to shift gears, time to change…it is time to SWITCH! -----------------------------------------------------------------------------------------------------------------------------
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems
Learn about cloud forensics challenges, approaches, and open problems in a meta-study, and understand how to apply this knowledge to improve cloud security and incident response.
Dev.to AI
From Slack Reaction to Threat Summary: Automated Threat Intel with Slack and Gemini
Automate threat intel with Slack and Gemini to streamline security analysis
Medium · Cybersecurity
Why AI-Powered Phishing Is Becoming the Biggest Cybersecurity Threat in 2026
AI-powered phishing is becoming a major cybersecurity threat, making it harder to distinguish legitimate emails from fake ones, and it's crucial to stay vigilant and adapt security measures
Medium · Cybersecurity
Apple Charged You $1399 for an iPhone That Couldn’t Delete a Notification Properly
Learn how a simple bug in iOS affected iPhone users and why it matters for cybersecurity and software engineering
Medium · Cybersecurity
Up next
Learn Ethereum, Smart Contracts & Trading
Coursera
Watch →