Big Thank You to Cisco for sponsoring my trip to Cisco Live and this video! // Omar’s SOCIALS // LinkedIn: www.linkedin.com/in/santosomar/ X: x.com/santosomar Cisco Blogs: blogs.cisco.com/author/omarsantos Website: omarsantos.io/ // Books by Omar REFERENCE // The AI Revolution in Networking, CyberSecurity, and Emerging Technologies, Edition 1: US: amzn.to/3xHFaPT UK: amzn.to/3VN5zDP Beyond the Algorithm: US: amzn.to/3W85fkw UK: amzn.to/3VJcbDg // Specific Blog ARTICLES // blogs.cisco.com/security/enhancing-ai-security-incident-response-through-collaborative-exercises // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal RUclips: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Intro 00:49 - Omar Santos' books 02:59 - AI used for cyber attacks 06:14 - AI used in OSINT 07:14 - The rise of cyber attacks 09:13 - Hackers using AI 11:34 - Opportunities in cybersecurity with AI 18:52 - "It's like the wild west" // AI being accessible 23:16 - Privacy amidst AI 25:18 - Google's Secure AI Framework (SAIF) 27:48 - How to get into AI 31:25 - Constitutional AI 33:09 - Roadmap to learn AI 37:23 - Cisco AI certification 39:46 - Conclusion ai chatgpt wormgpt cybersecurity cyber artificial intelligence cisco talos cisco talos pegasus spyware hacking hacker malware Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cybersecurity #ai #artificialintelligence
I love how David Bombal is willing to listen and let him talk. many interviewers nowadays aren't there to really interview, just there to push their agenda
what is public and what is private : if something is infront of a username and password the it is public and if it is behind a username and password then its private : so the common crawl is only public data ! so if you find you data in the ocmmon crawl its because it is not behind a username and password !! so if you need to protect your data then do ot make it public! if its a picture or sound etc then add a watermark sound or image !!!!! the water mark should be saying skip this item to the crawler and mark the public file as do not copy !
we have large languge models which ca interact with the etwork and they CAN Hack the network ! hence pentration testing with Large neural network can epose the flaws as well as fix them !
Hmm, I thought there would be more on some of the RCE packages many have been seeing and whispering about the last 2+ years, with mini stripped down machine learning engines in them for adaptive intrusion.
The downside of AI is that it cannot learn random patterns. Obfuscated and encrypted malware seems to get a score around 85 on virus total from AI malware recognition. High, but not great. It may start to cause false positives with genuine software using similar methods to make reverse engineering more difficult. Genuine software companies would have to remove those types of prevention to prevent the false positives.
AI will be like us... something that started with one and became two, it too will have to adhere to the reality of duality. As you hear everyone talk, I begin to see the missing piece, "what if AI just creates another level of consciousness, awareness, etc... now we have an AI that is also confined to the same things we are consciously while it is confined by the information which creates the materialistic reality. Or maybe not 😅😅😅 it's a the down side to living in this universe - anything can happen if you can think it !
@@davidbombal most welcome sir! Please do more videos on AI 🔄cybersecurity . AI attack surface , Threats and risk involved in implementation of AI in business operations etc
I see future security issues with Apple Intelligence and being able to execute payloads with its new siri having control of the phone. there is already a command you can paste with writing tools and it won’t rewrite the code in the expected way it responds like chat gpt, conversational.
i wanna learn hacking but im doing Software engineering which takes 3 years for completing it but i wanna learn hacking but idk where to start im none technical person and i have no background Computer
@@anticupid5165 It actually depends on how severe this “hacking” you are doing is. If it is like a prank to make a minor mess or troll to another person, then that would be fine. However, if you go to the point where you actually steal credit card info, and other credentials (keep in mind that this is obviously illegal), or IP tracking a whole business (which is also illegal in states), then that is just not okay. So overall? My answer to your question is: not exactly. You see, it is alright if your way of hacking another person was just to spread humor, however you should also just think twice before you act. Is this type of hacking minor or severe? That is the process that you most likely should follow. Not doing so may end you up in breaking the law one day. Please write down note.
I have a question if a WiFi network has two AP and you perform an evil twin captive portal attack on one of the bssid s, if I use two Alfa WiFi adapters and use aireplay-ng on the other, will this make the evil twin attack more successful. Also I have just brought the Alfa AWUS036AXML adapter which was detected by Kali latest release straight away, but I tried to death my TV connect to my own WiFi hotspot and it did not do anything, how can I check to see if it is working properly eg. Packet injection, monitor mode , AP mode Thank you David , I'm a massive fan that's still learning
turn it all off unplug it all lmao we did fine for thousandz of yrs without creating something that can obsolete us all . simetimes i think tech savvy people want all this its job security
helo sir i have an idea to make unhackeble opreting system in sanskrit if someone make a opereting system in sanskrit nobudy can hack or brack sanskrit coding
@@Nejtak853 feel bad for your surrounding too if thats how you show interest, a good listener and host is able to show interest without being this audible smh
Big Thank You to Cisco for sponsoring my trip to Cisco Live and this video!
// Omar’s SOCIALS //
LinkedIn: www.linkedin.com/in/santosomar/
X: x.com/santosomar
Cisco Blogs: blogs.cisco.com/author/omarsantos
Website: omarsantos.io/
// Books by Omar REFERENCE //
The AI Revolution in Networking, CyberSecurity, and Emerging Technologies, Edition 1:
US: amzn.to/3xHFaPT
UK: amzn.to/3VN5zDP
Beyond the Algorithm:
US: amzn.to/3W85fkw
UK: amzn.to/3VJcbDg
// Specific Blog ARTICLES //
blogs.cisco.com/security/enhancing-ai-security-incident-response-through-collaborative-exercises
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
X: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
RUclips: www.youtube.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Intro
00:49 - Omar Santos' books
02:59 - AI used for cyber attacks
06:14 - AI used in OSINT
07:14 - The rise of cyber attacks
09:13 - Hackers using AI
11:34 - Opportunities in cybersecurity with AI
18:52 - "It's like the wild west" // AI being accessible
23:16 - Privacy amidst AI
25:18 - Google's Secure AI Framework (SAIF)
27:48 - How to get into AI
31:25 - Constitutional AI
33:09 - Roadmap to learn AI
37:23 - Cisco AI certification
39:46 - Conclusion
ai
chatgpt
wormgpt
cybersecurity
cyber
artificial intelligence
cisco
talos
cisco talos
pegasus
spyware
hacking
hacker
malware
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cybersecurity #ai #artificialintelligence
I love how David Bombal is willing to listen and let him talk. many interviewers nowadays aren't there to really interview, just there to push their agenda
Love your contents. I am trying to change my career and your videos are helpful. Thank you for sharing
The passion.. The knowledge.. we need a season full podcast with Omar just talking about the industry.
Interesting.... Is it possible to use AI to expand the internet while not collecting sensitive information?....🤔 Thank you for the video,David!
what is public and what is private : if something is infront of a username and password the it is public and if it is behind a username and password then its private : so the common crawl is only public data !
so if you find you data in the ocmmon crawl its because it is not behind a username and password !!
so if you need to protect your data then do ot make it public!
if its a picture or sound etc then add a watermark sound or image !!!!! the water mark should be saying skip this item to the crawler and mark the public file as do not copy !
Very enlightening! Great conversation between David and Omar.
Shout out to Omar!! He also started the BSides in Raleigh. Great guy
Interesting and good video. AI, where it has value it also has exploitation. Sounds like a major exploit could take out a huge amount of systems.
we have large languge models which ca interact with the etwork and they CAN Hack the network !
hence pentration testing with Large neural network can epose the flaws as well as fix them !
Holy shit, we literally use this guy’s books as textbooks in my grad school program. Legendary!!
So much to take in.
thank you david, I enjoy your videos
🙂
You are very welcome! Glad you enjoy them 😀
hi david great topic as usual just on thing why don't you lunch channel dedicated to that only security only it will be a pretty good idea
Hmm, I thought there would be more on some of the RCE packages many have been seeing and whispering about the last 2+ years, with mini stripped down machine learning engines in them for adaptive intrusion.
I'm guessing the text on the blue background was added in post. It looks good!
The downside of AI is that it cannot learn random patterns. Obfuscated and encrypted malware seems to get a score around 85 on virus total from AI malware recognition. High, but not great. It may start to cause false positives with genuine software using similar methods to make reverse engineering more difficult. Genuine software companies would have to remove those types of prevention to prevent the false positives.
Thanks for sharing
You're welcome!
Big fan..learnt a lot
Thank you! Glad you enjoyed the video
AI will be like us... something that started with one and became two, it too will have to adhere to the reality of duality. As you hear everyone talk, I begin to see the missing piece, "what if AI just creates another level of consciousness, awareness, etc... now we have an AI that is also confined to the same things we are consciously while it is confined by the information which creates the materialistic reality. Or maybe not 😅😅😅 it's a the down side to living in this universe - anything can happen if you can think it !
Great content!
Thank you!
@@davidbombal most welcome sir! Please do more videos on AI 🔄cybersecurity . AI attack surface , Threats and risk involved in implementation of AI in business operations etc
Thank you sir for your great advice video i am from India
You're welcome! And thank you for watching!
Thanks you sir🎉🎉❤
You're welcome!
I see future security issues with Apple Intelligence and being able to execute payloads with its new siri having control of the phone. there is already a command you can paste with writing tools and it won’t rewrite the code in the expected way it responds like chat gpt, conversational.
i can see it already, if it's a kind AI it will publish its results, here are 10 million new zero day exploits :L)
It's a real worry ☹️
@@davidbombal indeed it is, Metasploit then becomes obsolete :)
i wanna learn hacking but im doing Software engineering which takes 3 years for completing it but i wanna learn hacking but idk where to start im none technical person and i have no background Computer
Try hack me. It's a good starting point
@@anticupid5165 It actually depends on how severe this “hacking” you are doing is. If it is like a prank to make a minor mess or troll to another person, then that would be fine. However, if you go to the point where you actually steal credit card info, and other credentials (keep in mind that this is obviously illegal), or IP tracking a whole business (which is also illegal in states), then that is just not okay.
So overall? My answer to your question is: not exactly. You see, it is alright if your way of hacking another person was just to spread humor, however you should also just think twice before you act. Is this type of hacking minor or severe? That is the process that you most likely should follow. Not doing so may end you up in breaking the law one day.
Please write down note.
Hack the box is good too.
oh gosh, they will train an AI for hacking, and they will call it a defensive action, how ironic :)
Attackers are using their own AIs. Defenders are forced to use their own AIs to protect themselves. Really feels a bit like a wild west at the moment.
@@davidbombal even though i'm a tech guy, have been all my life, i'm surprised by the recent developments, i think even the developers are :)
True. I think next few years we should move to wild mountains and avoid cyberattacks by AI 😂
Thanks a lot sir
There is no dark side. It's all rainbows and jelly gumdrops.
Take backups often and backups are immutable AI can't change something that's immutable.
I have a question if a WiFi network has two AP and you perform an evil twin captive portal attack on one of the bssid s, if I use two Alfa WiFi adapters and use aireplay-ng on the other, will this make the evil twin attack more successful. Also I have just brought the Alfa AWUS036AXML adapter which was detected by Kali latest release straight away, but I tried to death my TV connect to my own WiFi hotspot and it did not do anything, how can I check to see if it is working properly eg. Packet injection, monitor mode , AP mode
Thank you David , I'm a massive fan that's still learning
How many times did he say YEP. Lmao such great info thanks for the video
I love him
Does anyone incorporate AI into their jobs?
Is it me or their voice sounded like AI
...seems AI already became a prob...
Wtf was that at 29:27??
Hi
FLOW OF NEURONES AND TIME ..... 😂
David, I expected some type of commentary about Crowd Strike, is there no opinion or just nothing to add. Give ;your fans a short.
You REALLY don't need to say yep after almost EVERYTHING your guest says. Did you do a line before the interview, wtf?!?
if i still drinked this video would had killed me is used as a game.
turn it all off unplug it all lmao we did fine for thousandz of yrs without creating something that can obsolete us all . simetimes i think tech savvy people want all this its job security
I like turtles.
😃👍
helo sir i have an idea to make unhackeble opreting system in sanskrit if someone make a opereting system in sanskrit nobudy can hack or brack sanskrit coding
Hi
Why not, everything is hackable
Literal AI task
Bro, what are you even saying, Are u in school? 😂
It's the best way but it can too be hacked ..... Everything which is connected to computer can be hacked😂😂😂
YUP
YEAH
YE
YEAYEA
unbearable to listen to, i cant imagine being the interviewee.. man mute yourself or shut up
He is just a active listener, chill man
@@Nejtak853 feel bad for your surrounding too if thats how you show interest, a good listener and host is able to show interest without being this audible smh
STOP SAYING YEP!!! OH MY GOD
Sorry David but to many "yup" from you. Which was surprising because normally you don't interrupt a guest very often, even if it's to agree.
Agent based era sounds like living in Matrix and many agent Smith will be chasing us 😜
Good evening 😎Mr. Anderson 😳👉👈
Hi