A big shoutout to Cisco for sponsoring this video. // Kendall McKay // LinkedIn: www.linkedin.com/in/kendallmckay1/ X: x.com/kkmckay22 // Kirsty Paine // LinkedIn: www.linkedin.com/in/kirstykirsty/ // Links mentioned by Kirsty // PQUIP: datatracker.ietf.org/wg/pquip/about/ list of protocols on Github: github.com/ietf-wg-pquip/state-of-protocols-and-pqc?tab=readme-ov-file Quantum Splunk blogs (CRQC): Emperor’s New Clothes: www.splunk.com/en_us/blog/learn/quantum-safe-cryptography-standards.html www.splunk.com/en_us/blog/learn/crqcs-cryptographically-relevant-quantum-computers.html Goldilock’s porridge: www.splunk.com/en_us/blog/learn/quantum-safe-cryptography-migration.html // TH-cam video REFERENCES // Watch a CNN Reporter get hacked: th-cam.com/video/yIG4kTJTZuY/w-d-xo.html Coffee Talk with SURGe: The Interview Series featuring Kirsty Paine: th-cam.com/video/YCevzjRtcXs/w-d-xo.html Hacking ARP with Python and Kali Linux: th-cam.com/video/qMnPgJoF5YE/w-d-xo.html They Took his computer: th-cam.com/video/U5uTRZIEeY0/w-d-xo.html // Talos Blogs and Reports // blog.talosintelligence.com/ir-trends-ransomware-on-the-rise-q2-2024/ blog.talosintelligence.com/category/ctir-trends/ blog.talosintelligence.com/2023-year-in-review/ // Kirsty’s Blogposts // www.splunk.com/en_us/blog/author/kpaine.html // Splunk Reports // www.splunk.com/en_us/form/state-of-security.html www.splunk.com/en_us/form/the-hidden-costs-of-downtime.html // Splunk Research // www.splunk.com/en_us/blog/security/llm-defense-owasp-top-10.html www.splunk.com/en_us/blog/security/a-case-study-in-vulnerability-prioritization-the-lessons-learned-from-large-scale-incidents.html // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: www.x.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal TH-cam: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:09 - Kendall McKay Introduction 03:33 - Kirsty Paine Introduction 05:20 - Ransomware is still a Threat 06:30 - Identity-Based Attacks and Identity Theft 08:27 - Business-Email Compromise 09:24 - Vishing 10:55 - Rachel Tobac and more on Vishing 13:15 - Mistakes Big Companies Make 16:17 - Human Beings are the Common Denominator 17:02 - Self-Reporting 18:05 - What are the Solutions? 19:25 - What’s Old is New 20:45 - MFA Fatigue 23:03 - Is AI helping Attackers or Defenders?26:43 - Phishing with QR Codes 27:26 - Where is Cyber-Security Going? 30:57 - What Advice Would You Give Your Younger Self? 35:57 - Advice for Interviews 39:42 - Should We Worry About Quantum Computing? 42:50 - How to Prepare Against Quantum Computing44:50 - Further Encryption Advice 45:32 - Are Quantum Computers Close? 47:10 - Where to Read More on Quantum Computing 52:20 - Conclusion firewall vpn hash encrypion cisco splunk hypershield ai ebpf voice clone linux dpu gpu cisco nvidia cisco firewall cybersecurity networking artificial intelligence cyber a.i. firewall ai firewall information security ransomware hack hacker hacking offensive security pentester ssl ca kali linux ethical hacker penetration testing chatgpt cisco ai bard chatgtp chat gtp Gemini google gemini chatgpt hack terminator ai robots machine learning cyber cyber ai ai cybersecurity iphone apple Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #splunk #ai
He i need your help i have I seen all the videos that you posted about the installation of the kali Linux mobile device, and I still not able to do it even following the step-by-step that you provide on the video and on the PDF folders everything I have done everything extra details as you say and exactly as it says in the video and your descriptions in your PDF but I still not able to do it can you please help me out I always run into the same problem once and I don't have idea what it is and on how to solve it you make it look so easy to install and to run that I had two comment to see if I could have your help managing the situation
I work in IT for a company that provides IT services to over 200 companies. I take it as my civic duty to keep drilling cyber security into the minds of end users. Just letting them know is so important. No one is too small to be hacked. They want your contacts and conversations even if they don't get money. No matter how well you set up their network, the end user is still responsible for cyber security.
@@Zed0086 I wouldn't say over 200 companies have a single vulnerability. But I get it. I wouldn't say I like it either. I only work there and don't own the company. Research MSP, and you will be in for a surprise. Some of my customers could have their IT person, and some did before I took it over. But if I can do their job in 20 hours a month, does it make sense to pay a dude 150K a year for a job I can do for 25? However, most of my customers are SMBs and cannot afford to pay a full-time IT person. It makes perfect sense for them. They get a very experienced person who can quickly solve their problems at a price they can afford.
Most businesses aren't big enough to have their own it dept let alone a security component of it. Many small to medium businesses don't have that luxury. Hence why it management companies exist. @@Zed0086
I am happy they mentioned critical thinking and communications skills as being the most important thing to have. I can't tell you how many people we have hired that look great on paper but then can't effectively communicate with clients and lack the ability to know good evidence from bad evidence.
I did a penetration test on a bank recently they had 3 domains that were vulnerable to sql injections, and the nmap scan I did showed 4 ports being outdated.
29:16 Very funny. By the time she grows up, everyone will be doing their own personal time travel logistics! But the point is clear. There is no way to determine future jobs!
That's an incredible interview and inspiration for communicating 🙏, one point about relying on human awareness though, I've also heard they should be your last line of defense not your first, you cannot expect an executive to be on alert while receiving 50 emails a day
Lady is a heavy hitter …. She had worked for the letter agencies and is a senior consultant at cisco …it goes to show you how important it is to have such background…companies would not hesitate to hire you Forget about interviewing you
great video and thank you for the great channel David, I disagree with MFA fatigue being a target, most MFA is now with a time based code which removes fatigue or has a challenge response model.
Love the content David 35:24 . I agree with project building at home and that has worked or me in my IT career which eventually got me into cyber security. Working in your own projects shows dedication innovation desire to learn and you don't wait opportunities to find you rather you go out and create opportunity.
David sir you are good in one word , learn so much from you love from India❤ happy learner by your help i achieved CISCO cyber ops associate certificate
@@davidbombal thank you for the prompt reply. Continued awareness on topics such as AI & IoT driven security. I watch CC such as yourself for awareness of resources and emerging trends regarding these topics. CEH, EC-Counsil, NIST, Cisco, and top entities have amazing resources out there. Thank you for all you do! P.s. blue team, enterprise/consumer, helping to keep aware of APT, Malware, Risk/Threats, TTP, and security awareness fundamentals for the times ahead
I‘m a CISO and this educate your users notion makes me go crazy. Of course you can do your phishing simulations and stuff , but if your users stand between getting compromised or not, you doing it wrong. Your users have a different job and deadlines, they don‘t care about any TTPs 😂. When do cybersec people get that. Build your systems in a way that a stupid mistake don‘t harm your company and if you ,can‘t ask your team or step aside from that role. Imagine the roles reversed and Head of Finance asks every employee to understand accounting , how idiotic this would be.
I don't agree, you can't ignore user education, putting safety features in a car doesn't alleviate the need for a "responsible" driver, no matter how a manufacturer makes it safe, it's up to the person on the wheel.
But end users have cash handling experience so they might not be accountants but having financial knowledge is useful for every employee in a company. Same as IT security, it's a different time and cyber security is a real thing that affects everyone and that falls on the end user to have the knowledge to protect themselves and in the end, who they work for as well.
It's not like they want end user to know how an actor gains root access and diverts to a different network but they do need to understand social engineering and suspicious emails or similar.
@@itista7 this doesn‘t even compare. Everybody has to do a driver license, where you get taught everything and it‘s not like the signs try to trick you or there a Dozent of new ways to deal with a red light. Cybersecurity is highly complex, don‘t trust your users with it. If they click on a phising link and put their credential in, nothing should be compromised. There are ways to do it. I quote cybersecurity guru Sami Laiho that there will be circumstances where even cybersecurity pro‘s would fall for a phish, because it just hits perfectly. Then you better not rely on humans not doing anything wrong. Remember the attacker has only to be successful once.
No! I’m not. I’m 55 and been in computer networking for over 25 years. An Emeritus CCIE that feels like I have to go back and take calculus, linear algebra and statistics in order to have the foundation I need to finish the next 10 years. So much change, so fast
I have a bank application on my phone. Money was stolen out of my account while using the app. After the transfer of funds, the money disappeared , then a lady call me asking how long have I known the person who I was sending money to. I thought everything was okay, found out months later that the money never went to the expected person. 😢
We used to call that 'social engineering.' An example of phishing would be--for instance--creating bait with those "your account is compromised, click here to change your password" emails, leaving Rubber Ducky drives in parking lots, malls, and cafes, and responding to the proverbial line thug.
I'am also from India, Started now by watching your videos from 9 month ago and i am very thankful for that, here i get motivation and lot of free resources thank you very much @@davidbombal
Can you help me my new MSI laptop is like powershell admin hacked , can't reset or hardly do anything on it . . . Im stuck they took my accs bank accs everything . . .
Cause they do not want to admit that the field is oversaturated with IT tech moving in to the cyber sec industry…and also they weed out candidates by not accepting entry level
Hello, I am following you from TH-cam. I have a problem with my laptop. I download Linux, and when the download is finished, the crdownload file appears. I saw a video in which I change the name of the file to download and it works. You did not show me a box to change the name so I can change it.
I am huge fan of your videos. But please if you can create a video of things to do to increase my security. Some video like The Complete Privacy & Security Guide. Like Techlore, The HatedOne, All Things Secured.
One threat I can see with all this healthcare hacking is the refund email from the healthcare provider saying that you overpaid. They have basic information they can easily use that attack they provide a portal for refund and then it’s over.
“I used to work for the govt in the CIA/NSA…” aka I worked hard for a decade to remove your liberties and suppress free speech. Thanks so much, lady! 😂
Un sub because ad placement wont let me enjoy the perks of premium youtube. If it continues will be canceling youtube premium. Will not be forced to watch ads. Sorry enjoy your stuff.
A big shoutout to Cisco for sponsoring this video.
// Kendall McKay //
LinkedIn: www.linkedin.com/in/kendallmckay1/
X: x.com/kkmckay22
// Kirsty Paine //
LinkedIn: www.linkedin.com/in/kirstykirsty/
// Links mentioned by Kirsty //
PQUIP: datatracker.ietf.org/wg/pquip/about/
list of protocols on Github: github.com/ietf-wg-pquip/state-of-protocols-and-pqc?tab=readme-ov-file
Quantum Splunk blogs (CRQC):
Emperor’s New Clothes: www.splunk.com/en_us/blog/learn/quantum-safe-cryptography-standards.html
www.splunk.com/en_us/blog/learn/crqcs-cryptographically-relevant-quantum-computers.html
Goldilock’s porridge: www.splunk.com/en_us/blog/learn/quantum-safe-cryptography-migration.html
// TH-cam video REFERENCES //
Watch a CNN Reporter get hacked: th-cam.com/video/yIG4kTJTZuY/w-d-xo.html
Coffee Talk with SURGe: The Interview Series featuring Kirsty Paine: th-cam.com/video/YCevzjRtcXs/w-d-xo.html
Hacking ARP with Python and Kali Linux: th-cam.com/video/qMnPgJoF5YE/w-d-xo.html
They Took his computer: th-cam.com/video/U5uTRZIEeY0/w-d-xo.html
// Talos Blogs and Reports //
blog.talosintelligence.com/ir-trends-ransomware-on-the-rise-q2-2024/
blog.talosintelligence.com/category/ctir-trends/
blog.talosintelligence.com/2023-year-in-review/
// Kirsty’s Blogposts //
www.splunk.com/en_us/blog/author/kpaine.html
// Splunk Reports //
www.splunk.com/en_us/form/state-of-security.html
www.splunk.com/en_us/form/the-hidden-costs-of-downtime.html
// Splunk Research //
www.splunk.com/en_us/blog/security/llm-defense-owasp-top-10.html
www.splunk.com/en_us/blog/security/a-case-study-in-vulnerability-prioritization-the-lessons-learned-from-large-scale-incidents.html
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
X: www.x.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
TH-cam: www.youtube.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
01:09 - Kendall McKay Introduction
03:33 - Kirsty Paine Introduction
05:20 - Ransomware is still a Threat
06:30 - Identity-Based Attacks and Identity Theft
08:27 - Business-Email Compromise
09:24 - Vishing
10:55 - Rachel Tobac and more on Vishing
13:15 - Mistakes Big Companies Make
16:17 - Human Beings are the Common Denominator
17:02 - Self-Reporting
18:05 - What are the Solutions?
19:25 - What’s Old is New
20:45 - MFA Fatigue
23:03 - Is AI helping Attackers or Defenders?26:43 - Phishing with QR Codes
27:26 - Where is Cyber-Security Going?
30:57 - What Advice Would You Give Your Younger Self?
35:57 - Advice for Interviews
39:42 - Should We Worry About Quantum Computing?
42:50 - How to Prepare Against Quantum Computing44:50 - Further Encryption Advice
45:32 - Are Quantum Computers Close?
47:10 - Where to Read More on Quantum Computing
52:20 - Conclusion
firewall
vpn
hash
encrypion
cisco
splunk
hypershield
ai
ebpf
voice clone
linux
dpu
gpu
cisco
nvidia
cisco firewall
cybersecurity
networking
artificial intelligence
cyber
a.i.
firewall
ai firewall
information security
ransomware
hack
hacker
hacking
offensive security
pentester
ssl
ca
kali linux
ethical hacker
penetration testing
chatgpt
cisco ai
bard
chatgtp
chat gtp
Gemini
google gemini
chatgpt hack
terminator
ai robots
machine learning
cyber
cyber ai
ai cybersecurity
iphone
apple
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cisco #splunk #ai
They went as far as burning the main postal office.
He i need your help i have I seen all the videos that you posted about the installation of the kali Linux mobile device, and I still not able to do it even following the step-by-step that you provide on the video and on the PDF folders everything I have done everything extra details as you say and exactly as it says in the video and your descriptions in your PDF but I still not able to do it can you please help me out I always run into the same problem once and I don't have idea what it is and on how to solve it you make it look so easy to install and to run that I had two comment to see if I could have your help managing the situation
I work in IT for a company that provides IT services to over 200 companies. I take it as my civic duty to keep drilling cyber security into the minds of end users. Just letting them know is so important. No one is too small to be hacked. They want your contacts and conversations even if they don't get money. No matter how well you set up their network, the end user is still responsible for cyber security.
That’s a horrible business model. Now, over 200 companies have a single vulnerability. Also, think of all the jobs that were taken up by one company.
@@Zed0086 I wouldn't say over 200 companies have a single vulnerability. But I get it. I wouldn't say I like it either. I only work there and don't own the company. Research MSP, and you will be in for a surprise. Some of my customers could have their IT person, and some did before I took it over. But if I can do their job in 20 hours a month, does it make sense to pay a dude 150K a year for a job I can do for 25? However, most of my customers are SMBs and cannot afford to pay a full-time IT person. It makes perfect sense for them. They get a very experienced person who can quickly solve their problems at a price they can afford.
mi😊
🎉 good morning my friend have fun today with the boys and girls in school
Most businesses aren't big enough to have their own it dept let alone a security component of it. Many small to medium businesses don't have that luxury. Hence why it management companies exist. @@Zed0086
I like those hour long, podcast style videos you are uploading. There are good topics and people on the other side seem well versed in the field.
Yes! I am ready for 2025! Thank you for the video, David!
You are welcome!
I am happy they mentioned critical thinking and communications skills as being the most important thing to have. I can't tell you how many people we have hired that look great on paper but then can't effectively communicate with clients and lack the ability to know good evidence from bad evidence.
David, you create so much content it is difficult to keep up! thanks a lot !!!!!
From Sierra Leone 🇸🇱
I love your work, Bombal.
Yes sir we ready!! Thank you for the great info and the video as always David.
I did a penetration test on a bank recently they had 3 domains that were vulnerable to sql injections, and the nmap scan I did showed 4 ports being outdated.
29:16
Very funny. By the time she grows up, everyone will be doing their own personal time travel logistics!
But the point is clear. There is no way to determine future jobs!
This is so much helpful information. Thank you so much. I’ve really got to learn as much as I possibly can about ethical hacking techniques.
Awesome content as always🎉much appreciated brother
Thank you!
That's an incredible interview and inspiration for communicating 🙏, one point about relying on human awareness though, I've also heard they should be your last line of defense not your first, you cannot expect an executive to be on alert while receiving 50 emails a day
David u are really inspiring for cyber security and everytime i have any technical issue i choose u....
Thank you David. On my path to this career field and you’ve helped a ton every step!
Lady is a heavy hitter …. She had worked for the letter agencies and is a senior consultant at cisco …it goes to show you how important it is to have such background…companies would not hesitate to hire you Forget about interviewing you
I've been following your channel and I've learned a lot. Keep it up 👍👍
great video and thank you for the great channel David, I disagree with MFA fatigue being a target, most MFA is now with a time based code which removes fatigue or has a challenge response model.
Love the content David 35:24 . I agree with project building at home and that has worked or me in my IT career which eventually got me into cyber security. Working in your own projects shows dedication innovation desire to learn and you don't wait opportunities to find you rather you go out and create opportunity.
David sir you are good in one word , learn so much from you love from India❤ happy learner by your help i achieved CISCO cyber ops associate certificate
Thanks for information ☺️
You're welcome!
Can we get more awareness about IoT and OT? keep up the great work as always David!
IoT lifecycle, Attack lifecycles, etc. Love the content
Thank you! I've coved IoT and OT in some of my interviews with OTW. Do you want blue team / defender best practices or what type of content?
@@davidbombal thank you for the prompt reply. Continued awareness on topics such as AI & IoT driven security.
I watch CC such as yourself for awareness of resources and emerging trends regarding these topics.
CEH, EC-Counsil, NIST, Cisco, and top entities have amazing resources out there.
Thank you for all you do!
P.s. blue team, enterprise/consumer, helping to keep aware of APT, Malware, Risk/Threats, TTP, and security awareness fundamentals for the times ahead
Wonderful content !
I‘m a CISO and this educate your users notion makes me go crazy. Of course you can do your phishing simulations and stuff , but if your users stand between getting compromised or not, you doing it wrong. Your users have a different job and deadlines, they don‘t care about any TTPs 😂. When do cybersec people get that. Build your systems in a way that a stupid mistake don‘t harm your company and if you ,can‘t ask your team or step aside from that role. Imagine the roles reversed and Head of Finance asks every employee to understand accounting , how idiotic this would be.
I don't agree, you can't ignore user education, putting safety features in a car doesn't alleviate the need for a "responsible" driver, no matter how a manufacturer makes it safe, it's up to the person on the wheel.
But end users have cash handling experience so they might not be accountants but having financial knowledge is useful for every employee in a company. Same as IT security, it's a different time and cyber security is a real thing that affects everyone and that falls on the end user to have the knowledge to protect themselves and in the end, who they work for as well.
It's not like they want end user to know how an actor gains root access and diverts to a different network but they do need to understand social engineering and suspicious emails or similar.
@@itista7 this doesn‘t even compare. Everybody has to do a driver license, where you get taught everything and it‘s not like the signs try to trick you or there a Dozent of new ways to deal with a red light. Cybersecurity is highly complex, don‘t trust your users with it. If they click on a phising link and put their credential in, nothing should be compromised. There are ways to do it. I quote cybersecurity guru Sami Laiho that there will be circumstances where even cybersecurity pro‘s would fall for a phish, because it just hits perfectly. Then you better not rely on humans not doing anything wrong. Remember the attacker has only to be successful once.
No! I’m not. I’m 55 and been in computer networking for over 25 years. An Emeritus CCIE that feels like I have to go back and take calculus, linear algebra and statistics in order to have the foundation I need to finish the next 10 years. So much change, so fast
Don't overthink it.
Hello.
Alot of spaces.
Alot of times it's simply a space.
Good luck.
Taking the eJPT and this is indeed very insightful
All the best for the eJPT!!!
I have a bank application on my phone. Money was stolen out of my account while using the app. After the transfer of funds, the money disappeared , then a lady call me asking how long have I known the person who I was sending money to. I thought everything was okay, found out months later that the money never went to the expected person. 😢
Can I meet you sir
Cisco live or another conference is a great place to meet 😀
We used to call that 'social engineering.' An example of phishing would be--for instance--creating bait with those "your account is compromised, click here to change your password" emails, leaving Rubber Ducky drives in parking lots, malls, and cafes, and responding to the proverbial line thug.
Great interviews, thanks
Love from India David we are ready for 2025 hacking ❤
Welcome India!!! 😀 Only Ethical Hacking please. Make the world a safer place.
You didn't say this to Pakistani guy
Why is it so ?@@davidbombal
I'am also from India, Started now by watching your videos from 9 month ago and i am very thankful for that, here i get motivation and lot of free resources thank you very much @@davidbombal
Get hot curry yar
@@robertjc605 what do you mean bro?
Can you help me my new MSI laptop is like powershell admin hacked , can't reset or hardly do anything on it . . . Im stuck they took my accs bank accs everything . . .
I feel more prepared thanks to this video!
why companies still don't hire entry level cybersecurity folks to do the patching and boring backup management instead of getting hacked?
Cause they do not want to admit that the field is oversaturated with IT tech moving in to the cyber sec industry…and also they weed out candidates by not accepting entry level
Thank you!
MFA Fatigue attacks can be countered via number matching based MFA requests right?
Summary:
1. Make backups
2.Checks backups
if you investment a lot of many into security, but a single user click one link malicious it's everything losted.
Hello, I am following you from TH-cam. I have a problem with my laptop. I download Linux, and when the download is finished, the crdownload file appears. I saw a video in which I change the name of the file to download and it works. You did not show me a box to change the name so I can change it.
If the video lives up to the title then this is great content
So, are internships open to non-student candidates? Are the internships paid with a livable wage?
I am huge fan of your videos. But please if you can create a video of things to do to increase my security. Some video like The Complete Privacy & Security Guide. Like Techlore, The HatedOne, All Things Secured.
Whenever I see updates for next year especially from David, it feels like I’m a backbencher 😅
'adversary in the middle attack?' lmao the cybersecurity field went woke
Wait so what is the actual term …black hat hacker?
Man in the middle attack is the original term I think
One threat I can see with all this healthcare hacking is the refund email from the healthcare provider saying that you overpaid. They have basic information they can easily use that attack they provide a portal for refund and then it’s over.
What happened to the Commodore 128 ?
Ai has helped me build some cool defence tools
I rarely use my PC because today's phones are much smarter.
Could you show us practicals also, listening only making me sleepy tbh.
Plot twist: both ladies are AI driven CGI
Not sure why everyone thinks I'm talking to AI's 😂
Hahaha, how would even be able to know, David 😅
@@davidbombaltheir background are soooo perfect 😂
Ready
Hey David I want that SVPN Book man...I can't afford it right now...already bought and read few others SCOR SISE CSF...
We are ready sir, Thanks for the video😊
Another good vid.😃👍
David please my Gmail account got hacked since some months andi don't know what to do to get it back
“I used to work for the govt in the CIA/NSA…” aka I worked hard for a decade to remove your liberties and suppress free speech.
Thanks so much, lady!
😂
Let me boot up my quantum arduino to yoink some wifi traffic.
Thanks a lot, sir.
Sir make a video globally Android hacking...
Hi sir how are you doing today I’m very big fan of you and I want to learn buy you
didnt cisco just have a breach?
Thank you.
Very ready Mr. Bombal
nice information, im sorry i kept starring her eyes cause i though it used filter
This comment is to show my support ❤
If my password doesn't automatically go there I'm not typing it in lol
It is going to be a year where we must leverage automation in our defenses in a way never before seen.
Agreed - we need to. Attackers are using AI, so defenders need to use AI and Automation to protect
2025 threat pegasus apyware,permutations numbers phone
Love from PAKISTAN DAVID BOMBAL sir
Yes. In some case she is right. To prove that. Just Chang the system time and yei to log in to a bank 🏧🏦. 😂😂😂😂. I tried. Ended in hell .😅
David Sir❤
❤❤ from Bangladesh
Welcome Bangladesh!!!!
almost
😎
Yes
Yes, I am ready for 2025! Get rid of the internet and stop using technology! Problem solved! 😅
❤❤
Thank you!
Love from Pakistan Hacker❤😊
Welcome Pakistan!! Ethical hacking only please
😂@@davidbombal
😂😂😂😂@@davidbombal
Un sub because ad placement wont let me enjoy the perks of premium youtube. If it continues will be canceling youtube premium. Will not be forced to watch ads. Sorry enjoy your stuff.
500 like 👍
Ok passwords will be stolen in the Future ln windows and mac os
❤❤❤
micro soft taking screen shots every 15 seconds, reach that what they call it.
🪽🦅
Yesss am first person to watch this thanks sir
Thank you for your support!
Upload short videos
What length of videos do you like? I am posting a lot of shorts (59 seconds) and will be posting 3 minutes shorts as well. Are those short enough?
Can you hellp mee pleas
First like by me 🎉
Thank you!
First comment too and even 2nd 😅🎉
Thank you for your support!
First me
Thank you for your support! Much appreciated! 😀
Sir make a video globally Android hacking...
Sir make a video globally Android hacking...
Sir make a video globally Android hacking...
Sir make a video globally Android hacking...
Sir make a video globally Android hacking...
Sir make a video globally Android hacking...
Sir make a video globally Android hacking...
Sir make a video globally Android hacking...
Sir make a video globally Android hacking...