Why are hackers winning the ransomware war? A very big thank you to Cisco for sponsoring my Cisco Live trip and this video. In this video I interview Tom Gillis about why hackers are winning and how to protect ourselves against the attacks. Go here for more information about the announcements: newsroom.cisco.com Cisco Talos Video: ua-cam.com/video/SyaP9GDNIug/v-deo.html // Tom's Socials// Twitter: twitter.com/_tomgillis LinkedIn: www.linkedin.com/in/tomgillis1 Cisco Newsroom: newsroom.cisco.com/c/r/newsroom/en/us/executives/tom-gillis.html // David's Social // Discord: discord.gg/davidbombal Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // MENU // 00:00 - Coming Up 00:39 - Intro 01:03 - How to Win Against Attackers 04:00 - Ransomware Attacks 07:09 - Zero Trust Network Access 15:35 - Cisco Multi-Cloud Defense 19:29 - The Role of A.I 22:10 - Summary 23:20 - Outro cisco cisco firewall cybersecurity networking ai artificial intelligence hacker hacking hack Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Hey david can you bring someone who can do a workshop or atleast guide us on using machine learning to prevent cyberattacks or analyse malware and show that with practical example or even better give us a code sample to code along with , what i am saying is we need a AIML tutorial project video specifically for cyberscurity. It would look good on resume and also we newbies will gain some skills .
I'm glad to have you as mentor I have been following you for almost a year the more you dropped video I picked challenges to learn. Thank you Mr. David right here in Nigeria
This guy describes what Cisco just announced, however top leading security vendors have all of this for years, the first one for more than 4 years. Unfortunately Cisco lost its security leadership with old good ASA a decade ago and now is even struggling to go in top 5 or 10. This is what happen when you create an Academy to support your hardware.
The reality is: Companies do not want to invest into their security. I worked in such a company a while ago. So naturally, they more often than not face the consequences in the form of phishing and ransomware as well as a buttload of (government) backdoors. Not having to look at a problem doesn't make it go away. Sadly, in Germany many small and medium businesses have this exact attitude. I would even call it "expectation". They expect the problem to go away if they ignore it.
Top tips for cyber security Back up your data. ... Keep your devices and your apps up-to-date. ... Choose unique passwords. ... Turn on two-factor authentication. ... Be creative with the answers to your account recovery questions. ... Avoid sensitive transactions on free wifi. ... Install an antivirus and scan for viruses regularly.
So then only "identity approved" processes will be allowed to run? Similar to DRM? Thereby enabling the lockdown of computing to only government-corporate licensing approved functions? Is there a bigger picture here?
Your comment about our guest today is 100 percent real. I dont know much about security by I easily would follow his explanations. I am not intrested. CISCO is going big
Hello ! Because you are a very good teatcher ! by the way can you make some vids about ssh injection and things like that since i"m learnig web dev it will be good to know how to protect a site web tank you !
Yes Hacking is moving fast and so knowledge that you have to get, in ordet to be at the level and MR BOMBAL is providing us with a great contents as usual thx for all your efforts sir God bless u
The Windows operating system is the #1 root of all hacking evil, not Powershell. Of all the issues cies suffer from getting hacked, the common thing among all them and that cyber security experts keep their heads in the sand and not seeing it is (willingly): things happens when someone clicked on "something bad", then that "something bad" could exectute because Windows is behind. Security Experts are all still using Windows themselves and are afraid of *nix style operating systems. I was at a Cybersecurity conference last week and what I get from it is that the secyrity experts themselves are also a problem by avoiding to say "stop using Windows" in the enterprise.
Bad guys are going to target whatever is used. Everyone could switch to Linux tomorrow and the intrusions/attacks would keep coming. IT is a damn security failure for the same reason the US tax code is unintelligible... It's all overcomplicated.
My customer is one of the 3 big Dutch banks. And although I loathe it, every month we need to have a certain percentage on a ongoing course that you need to do questions on that teaches you awareness. And there are some nice situational and technical awareness questions on there. That actually recently made me think twice. I got a letter from the “IRS” telling them my payment had not arrived. And if I didn’t pay in 2 days the legal fine would be added. And one of the important ones is recognizing phishing attacks and reporting them. That way they can do active prevention (like blocking that domain) or let the cops start an investigation. And the default way of working is, it’s better to delete an email or hang up on a call. And to never ever share colleagues or customer’s details. That’s not to us as most employees. Those who can know what and to whom the can let go that information. Because it can be used for “Speer phishing” attacks. The funny thing was the new CEO send an email to everyone telling to make an appointment to meet with him. The overwhelming majority deleted that email thinking it was some sort of phishing attack - and they do actually make entrapment calls to see who doesn’t follow producer to see who needs extra lessons on security. Which is good.
If you’re siem aggregates logs and correlates disparate activity properly, good alerting and follow up analysis do find the bad. An experienced analyst could have told you that years ago. But management just buys the “best of breed” in individual domains expecting a silver bullet. When the decision makers understand, the tools will be implemented correctly. We’re all waiting… nice talk.
It's going to be interesting to see what happens. At the moment, so many companies are getting hacked and so many data breaches are occurring that it looks like something needs to change.
Great video. Part of the problem is that users are by default admins on their machines. Your default access should NOT be running as admin. Microsoft UAC is not an answer, just click OK. Admin access needs to be an actual separate account, require user, password AND MFA. Take away the ability to admin anything without another flow being kicked off by default. fix default permissions. Pay attention to login patterns. What SHOULD you being logging into, versus what you SHOULDN"T be logging into.
It really depends on many factors. Did you recently install something new or click on some link, are there programs that requires Power Shell to run then... Many factors really.
To whoever gets into hacking they should focus their efforts on the IRS, CIA, NATO, IMF, World Bank, random corporations killing the world, etc etc, you know. Why defend the networks of governments? Why defend the networks of corporations?
Bcoz of you today i am doing hacking ..thank tou for your support, you are Godfather for me in this hacking world .❤ Great respect 🙏🏻💕for you in my heart.
Why are hackers winning the ransomware war?
A very big thank you to Cisco for sponsoring my Cisco Live trip and this video.
In this video I interview Tom Gillis about why hackers are winning and how to protect ourselves against the attacks.
Go here for more information about the announcements: newsroom.cisco.com
Cisco Talos Video: ua-cam.com/video/SyaP9GDNIug/v-deo.html
// Tom's Socials//
Twitter: twitter.com/_tomgillis
LinkedIn: www.linkedin.com/in/tomgillis1
Cisco Newsroom: newsroom.cisco.com/c/r/newsroom/en/us/executives/tom-gillis.html
// David's Social //
Discord: discord.gg/davidbombal
Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// MENU //
00:00 - Coming Up
00:39 - Intro
01:03 - How to Win Against Attackers
04:00 - Ransomware Attacks
07:09 - Zero Trust Network Access
15:35 - Cisco Multi-Cloud Defense
19:29 - The Role of A.I
22:10 - Summary
23:20 - Outro
cisco
cisco firewall
cybersecurity
networking
ai
artificial intelligence
hacker
hacking
hack
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
I think we need one episode where the talks about Open Source security tools. Possibly with examples.
Yes a walk through step by step dont skip anything and explain everything especially the think behind the decision making!!!
Hey david can you bring someone who can do a workshop or atleast guide us on using machine learning to prevent cyberattacks or analyse malware and show that with practical example or even better give us a code sample to code along with , what i am saying is we need a AIML tutorial project video specifically for cyberscurity. It would look good on resume and also we newbies will gain some skills .
Great suggestion! I'll see what I can do.
keep it up. this kind of deep talk interviews from experts is just gold. we like it 😊
Biggest problem is greed, security has like everything else been moniterised. Licensing training etc are cash cows for the big security players.
Massive facts there.
This
Hi thank you for this video can you make a video about the AMD( Platform Security Processor ) and Intel ( intel management engine)
I'm glad to have you as mentor I have been following you for almost a year the more you dropped video I picked challenges to learn. Thank you Mr. David right here in Nigeria
Let connect bro
At 13:16 he’s wrong that you can’t run a zero trust with a VPN together with Palo Alto. Not sure what he’s talking about.
How can one upload virus to alien space ships? I’m asking for a Nigerian friend.
🛸 🦠 🇳🇬 👑
David Bombal, Nigerian Prince again? That is an attack. Lol!!!
This video really I like it Coz its increase the information thank u David i wish some day meet you .
Thank you Ali! Glad to hear that you enjoyed the video!
This guy describes what Cisco just announced, however top leading security vendors have all of this for years, the first one for more than 4 years.
Unfortunately Cisco lost its security leadership with old good ASA a decade ago and now is even struggling to go in top 5 or 10.
This is what happen when you create an Academy to support your hardware.
was said in 1990s complexity is insecure
The reality is: Companies do not want to invest into their security. I worked in such a company a while ago. So naturally, they more often than not face the consequences in the form of phishing and ransomware as well as a buttload of (government) backdoors. Not having to look at a problem doesn't make it go away. Sadly, in Germany many small and medium businesses have this exact attitude. I would even call it "expectation". They expect the problem to go away if they ignore it.
You can’t make a solution that’s the problem you implement a cert system it will result in device robbery’s
Ah yes. Let's get AI to control the network and firewalls
I don't like how PS or CMD run in the background for like 2 seconds and never stays open long enough for me to see what commands were run!
This is what us going on in the world today!
It's a huge problem!
Hello sir, I'm following you from 6 months. I'm glad that i found your channel at the beginning of my cybersecurity coureer. LOVE FROM INDIA❤❤❤
Very happy to hear that! All the best for your journey :)
Top tips for cyber security
Back up your data. ...
Keep your devices and your apps up-to-date. ...
Choose unique passwords. ...
Turn on two-factor authentication. ...
Be creative with the answers to your account recovery questions. ...
Avoid sensitive transactions on free wifi. ...
Install an antivirus and scan for viruses regularly.
As good as it always.👍🏻
Thank you!
So then only "identity approved" processes will be allowed to run? Similar to DRM? Thereby enabling the lockdown of computing to only government-corporate licensing approved functions? Is there a bigger picture here?
Your comment about our guest today is 100 percent real. I dont know much about security by I easily would follow his explanations. I am not intrested. CISCO is going big
Hello ! Because you are a very good teatcher ! by the way can you make some vids about ssh injection and things like that since i"m learnig web dev it will be good to know how to protect a site web tank you !
Another interesting topic. 🤟
Glad you think so!
People will always be the biggest threat to security.
So... the solution is a centralized application with full access to what people do on their devices? LUL
@davidbombai I'm super interested. In being specifically a sock designer, can you give me any advice or Direction please?
Hello I am from Myanmar ❤ I love your video❤
Awesome! Thank you!
Yes Hacking is moving fast and so knowledge that you have to get, in ordet to be at the level and MR BOMBAL is providing us with a great contents as usual thx for all your efforts sir God bless u
Thank you so much Majid!
hello i'm from indonesia ❤ i like you ❤
Thank you!
So AI is taking over SOCs? I bet attackers are training their own custom models on what worked in the past too. I'm grabbing the popcorn
Humans will always be first vulnerability everything after that is machine and software.
Very clear presentation of what's going around networking today and yesterday. Thank you guys.
Hello
Hello Adil!
Wanna fight cyber security? Disconnect your computer from the internet😅
any job offers in field?
I love taking David's courses. I love his voice and the way he talks.
The Windows operating system is the #1 root of all hacking evil, not Powershell. Of all the issues cies suffer from getting hacked, the common thing among all them and that cyber security experts keep their heads in the sand and not seeing it is (willingly): things happens when someone clicked on "something bad", then that "something bad" could exectute because Windows is behind.
Security Experts are all still using Windows themselves and are afraid of *nix style operating systems. I was at a Cybersecurity conference last week and what I get from it is that the secyrity experts themselves are also a problem by avoiding to say "stop using Windows" in the enterprise.
Bad guys are going to target whatever is used. Everyone could switch to Linux tomorrow and the intrusions/attacks would keep coming. IT is a damn security failure for the same reason the US tax code is unintelligible... It's all overcomplicated.
@@vram1974They will keep ciming, but will not succeed. That’s the main difference.
@@Traumatree I read more everyday about Linux malware. It's not the impenetrable fortress it's made out to be.
Thanks David and Tom for this interview!
David bombal firearms 👍 looks like military veteran
Sir I have failed in 12th I want to build a career in Cybersecurity what I can do sir please help me
Get security+ cert to start and that will teach you a path to go on
“Have you ever been inside a firewall?”
Is water wet? :)
Great video. Learnt way more than I expected.
My customer is one of the 3 big Dutch banks. And although I loathe it, every month we need to have a certain percentage on a ongoing course that you need to do questions on that teaches you awareness. And there are some nice situational and technical awareness questions on there.
That actually recently made me think twice. I got a letter from the “IRS” telling them my payment had not arrived. And if I didn’t pay in 2 days the legal fine would be added.
And one of the important ones is recognizing phishing attacks and reporting them. That way they can do active prevention (like blocking that domain) or let the cops start an investigation.
And the default way of working is, it’s better to delete an email or hang up on a call. And to never ever share colleagues or customer’s details. That’s not to us as most employees. Those who can know what and to whom the can let go that information. Because it can be used for “Speer phishing” attacks.
The funny thing was the new CEO send an email to everyone telling to make an appointment to meet with him. The overwhelming majority deleted that email thinking it was some sort of phishing attack - and they do actually make entrapment calls to see who doesn’t follow producer to see who needs extra lessons on security. Which is good.
If you’re siem aggregates logs and correlates disparate activity properly, good alerting and follow up analysis do find the bad. An experienced analyst could have told you that years ago. But management just buys the “best of breed” in individual domains expecting a silver bullet. When the decision makers understand, the tools will be implemented correctly. We’re all waiting… nice talk.
It's going to be interesting to see what happens. At the moment, so many companies are getting hacked and so many data breaches are occurring that it looks like something needs to change.
@@davidbombal 100% It would interesting to see the correlation between improvements and the rise of the CSO who doesn’t sit under the CIO.
Love from India❤❤
Thank you!
Great video. Part of the problem is that users are by default admins on their machines. Your default access should NOT be running as admin. Microsoft UAC is not an answer, just click OK. Admin access needs to be an actual separate account, require user, password AND MFA. Take away the ability to admin anything without another flow being kicked off by default. fix default permissions. Pay attention to login patterns. What SHOULD you being logging into, versus what you SHOULDN"T be logging into.
Well explained .. a good one !!
I am from India , love 💕 from India 🙏🏻❤️🥰
Welcome India!!
Will pentesters be replaced by ai one day?
In the worst case scenario
Brilliant, I love this kind of content !!! You make an excellent job, thank you for your time and effort to make it real.
Sending thanks from the Gold Coast in Aus giving me motivation to keep going with the start of my cyber security career
The persistence of threat actors is good for our job security at least. Every college is churning out cyber workers now
First
Then lock down power Shell with layers of securety
The evil trinity : complexity, scalability, connectivity
Is this video about powershell and its evil nature?
Still using the Why Files jingle, can't get used to it dude :)
Great video. Exciting stuff!
Hey Sir My kali linux problem for osintgram tool error Error parsing error response: Expecting value: line 1 column 1 (char 0)
Wrong place script kiddie
Such an amazing video.
cat and mouse. that's all
Hello Mr. Bombal,
What should you do when Powershell is running on your machine?
It really depends on many factors. Did you recently install something new or click on some link, are there programs that requires Power Shell to run then... Many factors really.
Best man in the field 💓💎
That. Now that was a great talk. Thank you very much for this.
Glad you enjoyed it Nathan!
Good to see Cisco becoming relevant again
To whoever gets into hacking they should focus their efforts on the IRS, CIA, NATO, IMF, World Bank, random corporations killing the world, etc etc, you know. Why defend the networks of governments? Why defend the networks of corporations?
Bcoz of you today i am doing hacking ..thank tou for your support, you are Godfather for me in this hacking world .❤ Great respect 🙏🏻💕for you in my heart.
How did you do it? Is IT a basic background? I have a background in mathematics and statistics but I'd love to switch over to cyber security
@@Okwach_Kich bro , it's not hard as you think , it a game of logic . Aslo need intrest and way of building logic ..
Big fan from India sir❤❤❤❤❤
Nice interview!