Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 40% discount Cyber Action Toolkit...
Big thank you to DeleteMe for sponsoring this video. Use my link http://joindeleteme.com/Bombal to receive a 20% discount or use the QR Code in the video. // David's Social //...
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an...
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal In this interview from Black...
Want a privacy-first Windows 11 setup? In this step-by-step, I show how to create a local account during OOBE (no Microsoft login), then use Chris Titus Tech Windows Toolbox to...
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen...
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual...
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal AI can turn weeks of...
Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 60% discount. Cybersecurity icon Mikko...
Cyber attacks are surging. The UK NCSC has a free cyber action toolkit to help small businesses, but does it apply globally? We review this free cybersecurity toolkit and its...
Nearly half of mobile apps contain hardcoded secrets A new Sept. 18 report from Zimperium highlights that once APIs are embedded into app code, they become visible and exploitable, turning...