<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Your Firewall Won't Save You From This 😱</title>
        <link>https://stream.echo6.co/videos/watch/44077e48-fcea-4c36-b79f-d5ea8c56b06b</link>
        <description>Big thanks to Radware for sponsoring this video and sharing technical insights with us! David Bombal talks with Michael Geller (Radware) and Tim Sherman (Cisco) about how smart devices like fridges, cars, and cameras are being hijacked for DDoS attacks. They explain Web DDoS, encrypted Layer 7 threats, and how attackers bypass traditional firewalls. The discussion covers IoT botnets, API abuse, 5G core vulnerabilities, and how Cisco and Radware are defending cloud and edge infrastructure. //  Radware’s SOCIALS // X:  https://x.com/radware LinkedIn:  https://www.linkedin.com/company/radware/posts/ Website:  https://www.radware.com/ // Web page REFERENCE // http://livethreatmap.radware.com https://www.radware.com/security/ddos-knowledge-center/ddospedia/mirai/ https://www.radware.com/solutions/web-ddos-protection/ // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb X: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/@davidbombal Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ SoundCloud:  https://soundcloud.com/davidbombal Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532 // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 – Coming Up 00:53 – Introduction 02:01 – What Is Radware? 04:30 – Today’s Most Common Cyberattack Types 13:08 – 5G Packet Core Vulnerabilities 14:53 – Real-World Cyberattack Examples 19:05 – Devices That Can Launch Attacks 22:19 – Hacking Vehicles: Is It Possible? 23:47 – IoT Device Security Challenges 25:27 – Lowering the Barrier to Entry with AI Tools 27:31 – How Easy Is It to Get Hacking Software? 28:32 – Radware &amp; Cisco: Strategic Partnership 29:24 – Where Radware Is Being Used Today 31:37 – Firewalls: Applications and Weaknesses 34:41 – WAF Explained: Web Application Firewalls 37:16 – Securing APIs: API Security Overview 38:05 – The Role of Bots in Modern Attacks 40:23 – Cloud Security: Radware’s Secure Cloud Control 42:10 – Final Thoughts &amp; Outro Your Firewall Won’t Save You From This Stop Is Your Car Launching Cyberattacks Your Home Appliances Weaponized by Cybercriminals DDoS Just Got Smarter Layer 7 Is Nightmare How Default Bots Cripple Hospitals and Systems Electric Cars Under Siege from Smart Devices Cybersecurity Blind Spot Your Car Is Compromised The Hidden Threat Everyday Devices Hacked Now Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #ddos #hacker  #cybersecurity</description>
        <lastBuildDate>Mon, 13 Apr 2026 20:40:13 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>PeerTube - https://stream.echo6.co</generator>
        <image>
            <title>Your Firewall Won't Save You From This 😱</title>
            <url>https://stream.echo6.co/client/assets/images/icons/icon-512x512.png</url>
            <link>https://stream.echo6.co/videos/watch/44077e48-fcea-4c36-b79f-d5ea8c56b06b</link>
        </image>
        <copyright>All rights reserved, unless otherwise specified in the terms specified at https://stream.echo6.co/about and potential licenses granted by each content's rightholder.</copyright>
        <atom:link href="https://stream.echo6.co/feeds/video-comments.xml?videoId=44077e48-fcea-4c36-b79f-d5ea8c56b06b" rel="self" type="application/rss+xml"/>
    </channel>
</rss>