Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen...
This real-world cybersecurity fail is almost unbelievable. A security audit revealed the Louvre's password was... 'Louvre'. This case study highlights the massive risk of using weak passwords and obsolete OS....
Discover the most common weak passwords of 2025 based on 2 billion leaked credentials. See if your password made the list and learn how to stay secure against hackers. #password...
Companies are hiding massive data breaches, but a new Proton service exposes these infosec cover-ups. We look at what it found, from Qantas to 19M records in France, and why...
Why is the UK government (NCSC) telling companies to use pen and paper for cyber attack plans? We explore if analog password books and offline tech are the real future...
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual...
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal AI can turn weeks of...
Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 60% discount. Cybersecurity icon Mikko...
Cyber attacks are surging. The UK NCSC has a free cyber action toolkit to help small businesses, but does it apply globally? We review this free cybersecurity toolkit and its...
Nearly half of mobile apps contain hardcoded secrets A new Sept. 18 report from Zimperium highlights that once APIs are embedded into app code, they become visible and exploitable, turning...
Google's quantum breakthrough is here. Their new algorithm just surpassed supercomputers, putting all current encryption at risk. Is "quantum safe" computing ready for the threat? #quantum #google #encryption