A big shoutout to Cisco for sponsoring this video. // Kendall McKay // LinkedIn: www.linkedin.com/in/kendallmckay1/ X: x.com/kkmckay22 // Kirsty Paine // LinkedIn: www.linkedin.com/in/kirstykirsty/ // Links mentioned by Kirsty // PQUIP: datatracker.ietf.org/wg/pquip/about/ list of protocols on Github: github.com/ietf-wg-pquip/state-of-protocols-and-pqc?tab=readme-ov-file Quantum Splunk blogs (CRQC): Emperor’s New Clothes: www.splunk.com/en_us/blog/learn/quantum-safe-cryptography-standards.html www.splunk.com/en_us/blog/learn/crqcs-cryptographically-relevant-quantum-computers.html Goldilock’s porridge: www.splunk.com/en_us/blog/learn/quantum-safe-cryptography-migration.html // KZbin video REFERENCES // Watch a CNN Reporter get hacked: kzbin.info/www/bejne/r3qqZZ6Kf7mNq7s Coffee Talk with SURGe: The Interview Series featuring Kirsty Paine: kzbin.info/www/bejne/j3TIp62gh9mWjtU Hacking ARP with Python and Kali Linux: kzbin.info/www/bejne/p37RgZqApKtoj6c They Took his computer: kzbin.info/www/bejne/i2bYhYWQfqqYj5I // Talos Blogs and Reports // blog.talosintelligence.com/ir-trends-ransomware-on-the-rise-q2-2024/ blog.talosintelligence.com/category/ctir-trends/ blog.talosintelligence.com/2023-year-in-review/ // Kirsty’s Blogposts // www.splunk.com/en_us/blog/author/kpaine.html // Splunk Reports // www.splunk.com/en_us/form/state-of-security.html www.splunk.com/en_us/form/the-hidden-costs-of-downtime.html // Splunk Research // www.splunk.com/en_us/blog/security/llm-defense-owasp-top-10.html www.splunk.com/en_us/blog/security/a-case-study-in-vulnerability-prioritization-the-lessons-learned-from-large-scale-incidents.html // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: www.x.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal KZbin: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:09 - Kendall McKay Introduction 03:33 - Kirsty Paine Introduction 05:20 - Ransomware is still a Threat 06:30 - Identity-Based Attacks and Identity Theft 08:27 - Business-Email Compromise 09:24 - Vishing 10:55 - Rachel Tobac and more on Vishing 13:15 - Mistakes Big Companies Make 16:17 - Human Beings are the Common Denominator 17:02 - Self-Reporting 18:05 - What are the Solutions? 19:25 - What’s Old is New 20:45 - MFA Fatigue 23:03 - Is AI helping Attackers or Defenders?26:43 - Phishing with QR Codes 27:26 - Where is Cyber-Security Going? 30:57 - What Advice Would You Give Your Younger Self? 35:57 - Advice for Interviews 39:42 - Should We Worry About Quantum Computing? 42:50 - How to Prepare Against Quantum Computing44:50 - Further Encryption Advice 45:32 - Are Quantum Computers Close? 47:10 - Where to Read More on Quantum Computing 52:20 - Conclusion firewall vpn hash encrypion cisco splunk hypershield ai ebpf voice clone linux dpu gpu cisco nvidia cisco firewall cybersecurity networking artificial intelligence cyber a.i. firewall ai firewall information security ransomware hack hacker hacking offensive security pentester ssl ca kali linux ethical hacker penetration testing chatgpt cisco ai bard chatgtp chat gtp Gemini google gemini chatgpt hack terminator ai robots machine learning cyber cyber ai ai cybersecurity iphone apple Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #splunk #ai
@PeterPiperMaderpaker19 күн бұрын
They went as far as burning the main postal office.
@conspiracy2.013 күн бұрын
He i need your help i have I seen all the videos that you posted about the installation of the kali Linux mobile device, and I still not able to do it even following the step-by-step that you provide on the video and on the PDF folders everything I have done everything extra details as you say and exactly as it says in the video and your descriptions in your PDF but I still not able to do it can you please help me out I always run into the same problem once and I don't have idea what it is and on how to solve it you make it look so easy to install and to run that I had two comment to see if I could have your help managing the situation
@wartlme19 күн бұрын
I work in IT for a company that provides IT services to over 200 companies. I take it as my civic duty to keep drilling cyber security into the minds of end users. Just letting them know is so important. No one is too small to be hacked. They want your contacts and conversations even if they don't get money. No matter how well you set up their network, the end user is still responsible for cyber security.
@Zed008617 күн бұрын
That’s a horrible business model. Now, over 200 companies have a single vulnerability. Also, think of all the jobs that were taken up by one company.
@wartlme17 күн бұрын
@@Zed0086 I wouldn't say over 200 companies have a single vulnerability. But I get it. I wouldn't say I like it either. I only work there and don't own the company. Research MSP, and you will be in for a surprise. Some of my customers could have their IT person, and some did before I took it over. But if I can do their job in 20 hours a month, does it make sense to pay a dude 150K a year for a job I can do for 25? However, most of my customers are SMBs and cannot afford to pay a full-time IT person. It makes perfect sense for them. They get a very experienced person who can quickly solve their problems at a price they can afford.
@nicolasamale908915 күн бұрын
mi😊
@jadedoucette657814 күн бұрын
🎉 good morning my friend have fun today with the boys and girls in school
@Nickalapokis11 күн бұрын
Most businesses aren't big enough to have their own it dept let alone a security component of it. Many small to medium businesses don't have that luxury. Hence why it management companies exist. @@Zed0086
@gamereditor59ner2219 күн бұрын
Yes! I am ready for 2025! Thank you for the video, David!
@davidbombal19 күн бұрын
You are welcome!
@Anyfantis02 күн бұрын
I like those hour long, podcast style videos you are uploading. There are good topics and people on the other side seem well versed in the field.
@lxn740418 күн бұрын
That's an incredible interview and inspiration for communicating 🙏, one point about relying on human awareness though, I've also heard they should be your last line of defense not your first, you cannot expect an executive to be on alert while receiving 50 emails a day
@RushalTripura19 күн бұрын
Love from India David we are ready for 2025 hacking ❤
@davidbombal19 күн бұрын
Welcome India!!! 😀 Only Ethical Hacking please. Make the world a safer place.
@anandvashishtha0719 күн бұрын
You didn't say this to Pakistani guy Why is it so ?@@davidbombal
@mayankbalwan969019 күн бұрын
I'am also from India, Started now by watching your videos from 9 month ago and i am very thankful for that, here i get motivation and lot of free resources thank you very much @@davidbombal
@robertjc60519 күн бұрын
Get hot curry yar
@mayankbalwan969019 күн бұрын
@@robertjc605 what do you mean bro?
@rationalbushcraft19 күн бұрын
I am happy they mentioned critical thinking and communications skills as being the most important thing to have. I can't tell you how many people we have hired that look great on paper but then can't effectively communicate with clients and lack the ability to know good evidence from bad evidence.
@Glowup4Us19 күн бұрын
This is so much helpful information. Thank you so much. I’ve really got to learn as much as I possibly can about ethical hacking techniques.
@OsmanTFenfaquee19 күн бұрын
From Sierra Leone 🇸🇱 I love your work, Bombal.
@aleterra19 күн бұрын
David, you create so much content it is difficult to keep up! thanks a lot !!!!!
@OnTheGaming-hm8zu19 күн бұрын
David u are really inspiring for cyber security and everytime i have any technical issue i choose u....
@stevest1519 күн бұрын
I did a penetration test on a bank recently they had 3 domains that were vulnerable to sql injections, and the nmap scan I did showed 4 ports being outdated.
@Mworldcreeps19 күн бұрын
I've been following your channel and I've learned a lot. Keep it up 👍👍
@sinaighani234919 күн бұрын
Yes sir we ready!! Thank you for the great info and the video as always David.
@desordenpublico19 күн бұрын
Lady is a heavy hitter …. She had worked for the letter agencies and is a senior consultant at cisco …it goes to show you how important it is to have such background…companies would not hesitate to hire you Forget about interviewing you
@seanmonear491719 күн бұрын
Awesome content as always🎉much appreciated brother
@davidbombal19 күн бұрын
Thank you!
@savagepro906019 күн бұрын
29:16 Very funny. By the time she grows up, everyone will be doing their own personal time travel logistics! But the point is clear. There is no way to determine future jobs!
@AaronKai_19 күн бұрын
I‘m a CISO and this educate your users notion makes me go crazy. Of course you can do your phishing simulations and stuff , but if your users stand between getting compromised or not, you doing it wrong. Your users have a different job and deadlines, they don‘t care about any TTPs 😂. When do cybersec people get that. Build your systems in a way that a stupid mistake don‘t harm your company and if you ,can‘t ask your team or step aside from that role. Imagine the roles reversed and Head of Finance asks every employee to understand accounting , how idiotic this would be.
@itista717 күн бұрын
I don't agree, you can't ignore user education, putting safety features in a car doesn't alleviate the need for a "responsible" driver, no matter how a manufacturer makes it safe, it's up to the person on the wheel.
@Nickalapokis11 күн бұрын
But end users have cash handling experience so they might not be accountants but having financial knowledge is useful for every employee in a company. Same as IT security, it's a different time and cyber security is a real thing that affects everyone and that falls on the end user to have the knowledge to protect themselves and in the end, who they work for as well.
@Nickalapokis11 күн бұрын
It's not like they want end user to know how an actor gains root access and diverts to a different network but they do need to understand social engineering and suspicious emails or similar.
@AaronKai_6 күн бұрын
@@itista7 this doesn‘t even compare. Everybody has to do a driver license, where you get taught everything and it‘s not like the signs try to trick you or there a Dozent of new ways to deal with a red light. Cybersecurity is highly complex, don‘t trust your users with it. If they click on a phising link and put their credential in, nothing should be compromised. There are ways to do it. I quote cybersecurity guru Sami Laiho that there will be circumstances where even cybersecurity pro‘s would fall for a phish, because it just hits perfectly. Then you better not rely on humans not doing anything wrong. Remember the attacker has only to be successful once.
@bobbyv319 күн бұрын
We used to call that 'social engineering.' An example of phishing would be--for instance--creating bait with those "your account is compromised, click here to change your password" emails, leaving Rubber Ducky drives in parking lots, malls, and cafes, and responding to the proverbial line thug.
@ambersrivastava711019 күн бұрын
David sir you are good in one word , learn so much from you love from India❤ happy learner by your help i achieved CISCO cyber ops associate certificate
@Glowup4Us19 күн бұрын
I have a bank application on my phone. Money was stolen out of my account while using the app. After the transfer of funds, the money disappeared , then a lady call me asking how long have I known the person who I was sending money to. I thought everything was okay, found out months later that the money never went to the expected person. 😢
@ajones534119 күн бұрын
Can we get more awareness about IoT and OT? keep up the great work as always David! IoT lifecycle, Attack lifecycles, etc. Love the content
@davidbombal19 күн бұрын
Thank you! I've coved IoT and OT in some of my interviews with OTW. Do you want blue team / defender best practices or what type of content?
@ajones534119 күн бұрын
@@davidbombal thank you for the prompt reply. Continued awareness on topics such as AI & IoT driven security. I watch CC such as yourself for awareness of resources and emerging trends regarding these topics. CEH, EC-Counsil, NIST, Cisco, and top entities have amazing resources out there. Thank you for all you do! P.s. blue team, enterprise/consumer, helping to keep aware of APT, Malware, Risk/Threats, TTP, and security awareness fundamentals for the times ahead
@noelrakshit19 күн бұрын
Whenever I see updates for next year especially from David, it feels like I’m a backbencher 😅
@mason3571518 күн бұрын
Love the content David 35:24 . I agree with project building at home and that has worked or me in my IT career which eventually got me into cyber security. Working in your own projects shows dedication innovation desire to learn and you don't wait opportunities to find you rather you go out and create opportunity.
@DailyTuna18 күн бұрын
One threat I can see with all this healthcare hacking is the refund email from the healthcare provider saying that you overpaid. They have basic information they can easily use that attack they provide a portal for refund and then it’s over.
@theditto6919 күн бұрын
No! I’m not. I’m 55 and been in computer networking for over 25 years. An Emeritus CCIE that feels like I have to go back and take calculus, linear algebra and statistics in order to have the foundation I need to finish the next 10 years. So much change, so fast
@RADIUMGLASS12 күн бұрын
Don't overthink it.
@joshuamowdy923019 күн бұрын
Hello. Alot of spaces. Alot of times it's simply a space. Good luck.
@Jomster77719 күн бұрын
Taking the eJPT and this is indeed very insightful
@davidbombal19 күн бұрын
All the best for the eJPT!!!
@JimLennon-cu3vs19 күн бұрын
I am huge fan of your videos. But please if you can create a video of things to do to increase my security. Some video like The Complete Privacy & Security Guide. Like Techlore, The HatedOne, All Things Secured.
@MundaDehatDa19 күн бұрын
Thanks for information ☺️
@davidbombal19 күн бұрын
You're welcome!
@oddassembler19 күн бұрын
'adversary in the middle attack?' lmao the cybersecurity field went woke
@desordenpublico19 күн бұрын
Wait so what is the actual term …black hat hacker?
@blufudgecrispyrice852813 күн бұрын
Man in the middle attack is the original term I think
@miss_nainuu19 күн бұрын
Could you show us practicals also, listening only making me sleepy tbh.
@iamjoymaiti14 күн бұрын
Sir make a video globally Android hacking...
@LeeGleaton-x8v19 күн бұрын
I feel more prepared thanks to this video!
@Zed008617 күн бұрын
So, are internships open to non-student candidates? Are the internships paid with a livable wage?
@extrememike19 күн бұрын
Wonderful content !
@TheJLproducer19 күн бұрын
MFA Fatigue attacks can be countered via number matching based MFA requests right?
@aboilynna660819 күн бұрын
Hello, I am following you from KZbin. I have a problem with my laptop. I download Linux, and when the download is finished, the crdownload file appears. I saw a video in which I change the name of the file to download and it works. You did not show me a box to change the name so I can change it.
@Didi-hh9hx19 күн бұрын
why companies still don't hire entry level cybersecurity folks to do the patching and boring backup management instead of getting hacked?
@desordenpublico19 күн бұрын
Cause they do not want to admit that the field is oversaturated with IT tech moving in to the cyber sec industry…and also they weed out candidates by not accepting entry level
@oddassembler19 күн бұрын
If the video lives up to the title then this is great content
@DiamondTech1118 күн бұрын
We are ready sir, Thanks for the video😊
@Ckstar-yo9ww19 күн бұрын
Can I meet you sir
@davidbombal19 күн бұрын
Cisco live or another conference is a great place to meet 😀
@divinelove-vo7zv19 күн бұрын
Hey David I want that SVPN Book man...I can't afford it right now...already bought and read few others SCOR SISE CSF...
@alexandreneiva18 күн бұрын
if you investment a lot of many into security, but a single user click one link malicious it's everything losted.
@ZambeziSentinel19 күн бұрын
Great interviews, thanks
@barma130919 күн бұрын
Summary: 1. Make backups 2.Checks backups
@IamLookingforWoody_________78618 күн бұрын
I rarely use my PC because today's phones are much smarter.
@ZambeziSentinel19 күн бұрын
Ai has helped me build some cool defence tools
@barma130919 күн бұрын
Thank you!
@mytechnotalent19 күн бұрын
It is going to be a year where we must leverage automation in our defenses in a way never before seen.
@davidbombal19 күн бұрын
Agreed - we need to. Attackers are using AI, so defenders need to use AI and Automation to protect
@meisterblack980619 күн бұрын
didnt cisco just have a breach?
@trueinformationvlog18 күн бұрын
Hi sir how are you doing today I’m very big fan of you and I want to learn buy you
@newfaith91219 күн бұрын
Let me boot up my quantum arduino to yoink some wifi traffic.
@rami.009218 күн бұрын
Thanks a lot, sir.
@deanwhite841317 күн бұрын
Thank you.
@PeterPiperMaderpaker19 күн бұрын
This comment is to show my support ❤
@gageferguson950619 күн бұрын
If my password doesn't automatically go there I'm not typing it in lol
@zenobikraweznick19 күн бұрын
Plot twist: both ladies are AI driven CGI
@davidbombal19 күн бұрын
Not sure why everyone thinks I'm talking to AI's 😂
@ryankitching593619 күн бұрын
Hahaha, how would even be able to know, David 😅
@desordenpublico19 күн бұрын
@@davidbombaltheir background are soooo perfect 😂
@dennisantwiboasiako538419 күн бұрын
Very ready Mr. Bombal
@thomasmangwiro745019 күн бұрын
Ready
@Rv9977br19 күн бұрын
Yes. In some case she is right. To prove that. Just Chang the system time and yei to log in to a bank 🏧🏦. 😂😂😂😂. I tried. Ended in hell .😅
@carsonjamesiv251219 күн бұрын
Another good vid.😃👍
@OBITOUCHIHA-q2u19 күн бұрын
Love from PAKISTAN DAVID BOMBAL sir
@Buoyant-m5f19 күн бұрын
Yes, I am ready for 2025! Get rid of the internet and stop using technology! Problem solved! 😅
Ok passwords will be stolen in the Future ln windows and mac os
@johnthomas4551Күн бұрын
Un sub because ad placement wont let me enjoy the perks of premium youtube. If it continues will be canceling youtube premium. Will not be forced to watch ads. Sorry enjoy your stuff.
@peterventer535513 күн бұрын
Yes
@onlineincomework826719 күн бұрын
❤❤ from Bangladesh
@davidbombal19 күн бұрын
Welcome Bangladesh!!!!
@hack_123-anonymous19 күн бұрын
Love from Pakistan Hacker❤😊
@davidbombal19 күн бұрын
Welcome Pakistan!! Ethical hacking only please
@sushantkumarmishra553819 күн бұрын
😂@@davidbombal
@sreejithjithu40719 күн бұрын
😂😂😂😂@@davidbombal
@GoogleAIccount119 күн бұрын
almost
@nabiel22019 күн бұрын
500 like 👍
@pope108919 күн бұрын
micro soft taking screen shots every 15 seconds, reach that what they call it.
@hacktechnology843519 күн бұрын
Upload short videos
@davidbombal19 күн бұрын
What length of videos do you like? I am posting a lot of shorts (59 seconds) and will be posting 3 minutes shorts as well. Are those short enough?