This real-world cybersecurity fail is almost unbelievable. A security audit revealed the Louvre's password was... 'Louvre'. This case study highlights the massive risk of using weak passwords and obsolete OS....
Discover the most common weak passwords of 2025 based on 2 billion leaked credentials. See if your password made the list and learn how to stay secure against hackers. #password...
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual...
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal AI can turn weeks of...
Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 60% discount. Cybersecurity icon Mikko...
Cyber attacks are surging. The UK NCSC has a free cyber action toolkit to help small businesses, but does it apply globally? We review this free cybersecurity toolkit and its...
X has rolled out “end-to-end encrypted” DMs (XChat), but experts warn the current setup isn’t ready for real privacy. In this breakdown, we explain how public/private key crypto should work,...
Vibe coding is rising fast, but at what cost? We break down AI security risks like prompt injection, code ownership, and hackbots so you can ship safer software, faster. #vibecoding...
Discover how Li-Fi technology is changing wireless communication. In this demo, David Bombal tests AeroLiFi’s Li-Fi starter kit—a system that uses infrared light to transmit data instead of traditional radio-based...
Big thank you to Cisco for sponsoring this video and my trip to Cisco Live San Diego. From driving bulldozers to leading a Network Operations Center in just 3 years,...
Learn Cisco Port Security the right way. In this CCNA-focused lesson I show you: 1) How switches learn MAC addresses: dynamic, static and sticky 2) Where each option stores the...