DiscoverDavid Bombal
David Bombal
Claim Ownership

David Bombal

Author: David Bombal

Subscribed: 159Played: 2,338
Share

Description

Want to learn about IT? Want to get ahead in your career? Well, this is the right place!

On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.

This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.

David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal

All the best!
David
532 Episodes
Reverse
Big thank you to DeleteMe for sponsoring this video. Use my link http://joindeleteme.com/Bombal to receive a 20% discount or use the QR Code in the video. In this interview, David Bombal sits down with Dr. Mike Pound (Computerphile) to clear up one of the biggest crypto misconceptions on the Internet: hashing is not encryption, and hash functions are not reversible. In this video you’ll learn what a hash function actually does (a deterministic, fixed-length, “random-looking” summary of data) and why the whole point is that you cannot take a hash and reconstruct the original file. Dr Mike explains the key properties of secure hashing, including the avalanche effect (tiny input change, massive output change), and why older algorithms like MD5 and SHA-1 became unsafe due to collisions. We also cover what “collisions” really mean, why they must exist in theory (the pigeonhole principle) and why they can appear sooner than expected (the birthday paradox). Then we tackle the YouTube-comments classic: rainbow tables. If hashes are one-way, how do attackers “crack” passwords? The answer: they don’t reverse hashes. They guess passwords, hash them forward, and match the results. Mike breaks down how rainbow tables speed this up with precomputed hashes, and why salting makes those precomputations far less effective by forcing attackers to redo work per user. Finally, we zoom out into modern cryptography: why SHA-2 is widely used today, why SHA-3 exists as a structurally different backup option, what length extension attacks are, and what quantum computing changes (and doesn’t change) for hashing and encryption. We also touch on how hashes power digital signatures, file integrity checks (like verifying an ISO download), and why AES dominates symmetric encryption. // Mike's SOCIAL // X: / _mikepound // YouTube Video REFERENCE // SHA: Secure Hashing Algorithm: • SHA: Secure Hashing Algorithm - Computerphile Birthday Paradox: • Hash Collisions & The Birthday Paradox - C... The Next Big SHA? SHA3 Sponge Function Explained: • The Next Big SHA? SHA3 Sponge Function Exp... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:09 - DeleteMe sponsored segment 02:54 - Hashing is not Encryption // Encryption and Hashing explained 09:47 - Hash functions are irreversible 15:22 - How hashing works 17:23 - Why MD5 is bad 20:09 - Recommended hashing function 21:47 - Birthday paradox explained 23:39 - Rainbow table explained 29:44 - Salting explained 33:35 - Pigeon Hole principle explained 36:35 - SHA-2 is the answer 37:17 - SHA-3 vs SHA-2 40:42 - The effect of quantum computing 42:47 - Quick summary 43:52 - Sign-In with private key 45:21 - Avalanche effect explained 49:10 - Where to learn more about hash functions 50:27 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cryptography #hashing #encryption
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal to start your 30 day free trial or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription Stephen Sims joins David Bombal to discuss Operational Security (OpSec) through the lens of the "Darknet Marketplace Bible" (DNM Bible). While this document is originally designed to help criminals evade law enforcement while buying illegal goods, Stephen argues it is an excellent resource for cybersecurity professionals, journalists, and privacy advocates to learn high-level anonymity and encryption techniques. Disclaimer: Both David and Stephen repeatedly emphasize that this content is for educational, privacy, and cybersecurity research purposes only. They do not advocate illegal activity. // Stephen's Social // Twitter: / steph3nsims YouTube: / @offbyonesecurity // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:08 - Brilliant sponsored segment 03:04 - Disclaimer 03:07 - The Dark Web 07:44 - What is the Dark Web? 09:14 - The Dark Net Marketplace Bible 11:42 - DOs and DON'Ts 22:49 - Dark Net Directory 26:09 - Dread walkthrough 31:04 - Recommended Operating systems 42:07 - VPNs, Tor & PGP 53:23 - PGP // Creating key pairs 01:03:53 - How to access Dark Net Marketplaces // Black Ops marketplace 01:12 :39 - Recommended cryptocurrency for the Dark Web 01:18:43 - Shipping 01:21:12 - Communication methods 01:27:28 - JavaScript warnings 01:28:13 - Never trust external links 01:29:29 - DNM Bible summary 01:31:01 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #darkweb #opsec #tor
In this video, I sit down with OTW (author of Linux Basics for Hackers) to reveal the definitive list of top hacking and cybersecurity tools for 2026. We cover everything from the essential foundations like Linux and Python to the "state of the art" in wireless hacking with DragonOS and SDRs. // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:00 - Top hacking tools for 2026 04:07 - Hacking tool #1: The hacking OS 07:10 - Hacking tool #2: Discovering systems on the network 08:31 - Hacking tool #3: Monitoring network traffic 10:25 - Hacking tool #4: Web app hacking 11:24 - Hacking tool #5: Vulnerability scanner 16:35 - Hacking tool #6: Basic hacking 18:11 - Hacking tool #7: The cybersecurity scripting language 19:38 - Hacking tool #8: Hacking wireless signals 25:27 - Hacking tool #9: Virtual machines 27:38 - Hacking tool #10: IDS (Intrusion Detection System) 32:08 - Hacking tool #11: Learning firewalls 37:07 - Hacking tool #12: Using AI 42:45 - Hacking tools summary 43:25 - The era of AI 45:34 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
In this interview David and Dr Mike Pound discuss Agentic AI and how powerful it is powerful, but prompt injection and untrusted PDFs can leak data or alter records. Learn least privilege, input and output filtering, and model trust risks. // Sponsored SEGMENT // Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 40% discount // Mike SOCIAL // X: / _mikepound // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - Proton Pass sponsored segment 02:15 - AI & cybersecurity // Vulnerabilities of AI 12:56 - Direct & Indirect Prompt Injection explained 17:52 - Input & Output Filtering explained 20:20 - AI having access to private data 25:24 - Reactions to AI & cybersecurity 27:06 - Risks of downloading open-source AI models 36:02 - The good and bad of AI models 40:23 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cybersecurity #ai #promptinjection
Security researchers Dor Attias and Ofek Itach demonstrate a critical CVSS 10.0 n8n vulnerability (CVE-2026-21858). Watch the full RCE exploit demo using type confusion to bypass authentication and read sensitive local files. // Dor Attias SOCIAL // LinkedIn: / dor-attias-740758155 // Ofek Itach SOCIAL // LinkedIn: / ofek-it // N8N Hack Blog https://www.cyera.com/research-labs/n... // Cyera Blog // https://www.cyera.com/blog // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - n8n vulnerability explained 02:33 - n8n hacking demo // How the vulnerability works 09:13 - How bad is it? 11:51 - Vulnerability summary 13:28 - More explained on Cyera blog // Webhooks 16:59 - Webhooks explained 18:09 - Formidable 19:18 - Formidable explained 20:01 - Handling uploaded files in n8n 22:32 - The form webhook node 24:28 - How to exploit 25:54 - Exploit summary 26:46 - How to mitigate 27:37 - How to become a security researcher 32:36 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Dr. Mike Pound returns to discuss the reality check AI needs in 2026. We dive into why the scaling laws are plateauing, the truth about "Agentic AI," and why "Vibe Coding" might be slower than you think. // Mike SOCIAL // X: / _mikepound // Courses Reference // https://www.coursera.org/specializati... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:57 - Hype vs. Real Life // The AI bubble 04:08 - Levels of AI 07:58 - Agentic AI explained 11:28 - MCP servers explained 12:46 - The future of AI 16:10 - Which career path to take 21:04 - The risks of vibe coding 24:17 - How efficient is AI? 25:41 - How to get into AI // What to learn 32:20 - Is it too late to get into AI? 37:10 - Is AI scaling over? 41:49 - AI and privacy 48:52 - Where to start 53:15 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #ai #llm #aibubble
This is your path to becoming successful in Cybersecurity in 2026. From zero to getting the skills you need to be successful. Master Hacker OTW tells us what we need to do (and there are some surprises here). // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://davidbombal.wiki/otw // Occupy The Web SOCIAL // X: / three_cube Certification website: https://www.white-hat-hacker.com/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // Playlists to check out // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Hack Like Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise/Occupy the Web Hacks: • WiFi hacking like Mr Robot (with OTW) // MENU // 0:00 - Coming Up 0:55 - Introductions 01:52 - OTW New Book 02:28 - Starting the Path to Cybersecurity in 2026 05:14 - Understand Your Tools 11:15 - Learn Linux 13:53 - Understand Networking 16:35 - Learn to Write Scripts 21:18 - Understand Virtualisation Systems 24:14 - Understand AI 30:32 - Defence vs Offence 34:52 - How to Gain Experience 46:11 - Get Involved and Get Connected 50:53 - Be a Team Player 53:49 - Which Industries to Start in 57:37 - Outro // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com cybersecurity cybersecurity jobs hacking comptia kali linux 2026 roadmap cybersecurity roadmao kali linux Disclaimer: This video is for educational purposes only. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel #kalilinux #hacking #cybersecurity
Get these skills in 2026! Or at least get started. Do you agree? Casey Neistat video: • DO IT ANYWAY // MENU // 0:00 - Intro 0:18 - What are you doing to do? 0:38 - Excuses 0:56 - Be like Logan 2:47 - Jump 4:00 - Do the work 4:50 - Atomic Habits 5:10 - Goals 6:11 - Voices in your head 8:06 - You need to study 8:48 - 5 Paths (AI and Robotics) 11:46 - Quantum Computing 12:34 - Cybersecurity 13:45 - Software Development 15:43 - Cloud 16:51 - Networking 18:10 - IoT 19:34 - 5 Core Skills (AI) 19:56 - Linux 20:31 - Programming 21:22 - Networking 21:53 - Cloud 22:02 - Virtualization 22:30 - Final Thoughts // BOOKS // Deep Work by Cal Newport https://amzn.to/3Veeiwp The 4-hour work week by Timothy Ferriss https://amzn.to/3FyT5ro Atomic Habits by James Clear https://amzn.to/3YzEOmX The 1% Rule by Tommy Baker https://amzn.to/3G2RxY0 // Videos mentioned // Casey Neistat: • DO IT ANYWAY Dr Chuck: • AI just replaced us with Devin... seriousl... // SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // Monitor: https://amzn.to/3yyF74Y More stuff: https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #linux #python #ai
A big thank you to Proton VPN for sponsoring this video. Save 75% on Proton VPN on the 24 month plan with my link.https://protonvpn.com/davidbombal More reading about Badbox: Google: https://blog.google/technology/safety... EFF: https://www.eff.org/deeplinks/2025/06... Bitdefender: https://www.bitdefender.com/en-gb/blo... // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:05 - Sponsored Section 03:15 - Intro 04:28 - Are IOT Devices Safe to Have ? 07:56 - How They Hack your Home 09:19 - What They Do With Access To Your Data 10:30 - Bad Box 2 - They Ship Products With Malware 14:06 - The Intentions of Modern Day Hackers 15:01 - CloudFlare Blocking The Biggest DDOS Attack in The World 19:00 - How Vulnerable are IOT Devices 21:09 - TP- Link are the easiest to hack 24:20 - How Do They Get Into Your Devices ? 27:34 - Smart Bed Malfunctions 30:27 - Should Companies Be Held Responsible For Hacks 32:41 - How Bad is the Internet today? The amount of Hate in the World 35:19 - How People Allow Hackers into their Homes, Through Their Phones 38:00 - How Can Non-Technical People Protect Themselves 40:30 - The Internet is like A Jungle 43:03 - Mikko Hyppönen’s Prediction 47:53 - The Privacy Threat We are all facing 49:39 - What Companies are doing Now with Their devices 51:37 - People Using Hacking to Hurt People 52:48 - Conclusion & Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cybersecurity #hack #hacker
Big thank you to Cisco for sponsoring this video and sponsoring my trip to the Cisco Partner Summit San Diego 2025 Chatbots are out; AI Agents are in. But are your networks ready for the massive traffic spikes, and is your data secure? In this interview from Cisco Partner Summit, we discuss the critical security flaws in the Model Context Protocol (MCP), why 99% of these servers are exposed, and how Cisco’s new MCP Scanner and Silicon One P200 chip aim to fix the infrastructure gap. // DJ Sampath’s SOCIAL // LinkedIn: / djsampath X: https://x.com/djsampath // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:35 - The 3 trends of AI: infrastructure constraints explained 03:29 - Data gap explained 04:14 - Trust deficit explained // AI safety 05:22 - Solutions for the trends // Open source projects 08:56 - Addressing the problem with AI agents 10:22 - Reassuring the AI skeptics 12:22 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
A big thank you to Proton Pass for sponsoring this video. Proton Pass’ Black Friday Special is $1.99 per month on a 12 month plan https://proton.me/davidbombal Save 60%. Rob Braxman reveals the dangers of Windows Recall, Apple Intelligence, and client-side scanning. Discover why AI surveillance and TPM chips mark the end of privacy in 2025. // Rob Braxman’s SOCIAL// YouTube: / @robbraxmantech Website: https://brax.me/home/rob GitHub: https://github.com/robbraxman X: https://x.com/robbraxmantech // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:20 - Proton Pass sponsored segment 02:54 - Digital IDs and security chips on devices 05:24 - Client-side scanning 12:40 - Client-side scanning with AI 22:05 - Embedded AI for client-side scanning 27:32 - Microsoft + Windows Recall 35:51 - Microsoft vs Apple // Cloud storage 39:31 - Moving to Linux & dual boot 44:27 - TPM & EKI explained 49:28 - Restrictions with digital IDs 54:15 - Linux phones 56:00 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thank you to Cisco for sponsoring this video and sponsoring my trip to the Cisco Partner Summit San Diego 2025 Cisco Unified Edge & The Future of Physical AI (w/ Kevin Wolenweber) Kevin Wolenweber reveals Cisco's new Unified Edge device and details the massive Nvidia partnership transforming data centers. We discuss the shift to "Physical AI," the terrifying security challenges of autonomous Agentic AI, and why "Gigawatt" scale clusters are changing the landscape for network engineers in 2025. // Kevin Wollenweber’s SOCIALS // Cisco Blogs: https://blogs.cisco.com/author/kevinw... LinkedIn: / kevin-wollenweber-ba9428 // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:00 - New Cisco Unified Edge // What is it? 03:28 - Use cases for the Cisco Unified Edge // Using AI models 08:00 - More traffic and more bandwidth 09:32 - Addressing security issues and solutions 10:44 - What's new on the Cisco Unified Edge 11:41 - Cisco and Nvidia partnership 15:03 - Growing data centers 18:24 - AI in the future 20:03 - Security regarding AI agents 23:08 - Networking and AI 25:35 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit San Diego 2025. This video is a deep dive with Jeetu Patel on why the real AI revolution is happening in infrastructure and networking, not just in GPUs or chatbots. Jeetu explains that we are massively underestimating how much AI infrastructure the world will need. Power becomes the core constraint, GPUs are the core asset, and networking is the force multiplier that lets thousands of GPUs act as one system. He walks through how we went from models on a single GPU → 4–8 GPUs in a server → racks with hundreds of GPUs (like NVL-72 with 500+ GPUs) → clusters of racks, and now “scale across” between data centers when power and real estate are scattered across different regions. The conversation then shifts to edge AI and Cisco Unified Edge: instead of doing all token generation in big data centers, some inference and token generation must move to the edge (branches, factories, hospitals, stadiums, stores) where data is created. Jeetu explains why edge devices need to be plug-and-play, remotely managed, and integrate compute, networking, security and observability in a single platform. He also introduces the idea that AI is now constrained by three big bottlenecks: • Infrastructure • A trust deficit (people don’t trust AI yet) • A data gap (models are mostly trained on human internet data, not on rich machine data) Jeetu explains how security becomes a prerequisite for productivity, not a trade-off, and describes Cisco’s work with Splunk, open-sourced time-series models, and machine data (logs, metrics, traces) to close the data gap by correlating machine data with human-generated data for better insights. Globally, he talks about the “token generation race” – how every country now cares about having enough AI token generation capacity because it directly links to GDP and national security. He cites huge infrastructure build-outs with partners like G42 in the Middle East, at gigawatt and trillions-of-dollars scale. Finally, Jeetu tackles the “AI will take my job” fear. He outlines three stages of thinking: 1. “AI will take my job.” 2. “Someone who uses AI better will take my job.” 3. “Without AI, I won’t be able to do my job.” His message to younger viewers: be excited, adopt AI as a companion, own your learning, and learn fast because AI compresses the time it takes to build skills. // Jeetu Patel’s SOCIALS // LinkedIn: / jeetupatel Website: https://www.cisco.com/ X: https://x.com/jpatel41 // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming up 0:33 - "Networking is sexy" 02:24 - Scale up, scale out and scale across explained 04:47 - Cisco and Nvidia partnership 05:55 - Cisco and G42 partnership // Addressing the AI bubble 08:11 - New Cisco Unified Edge 11:08 - Agentic AI in the future 13:05 - Huge demand for networking 13:57 - The three constraints 16:38 - AI in the real world 19:26 - How AI will take jobs away 21:38 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit 2025. Is your encryption safe? Cisco’s Vijoy Pandey reveals why distributed quantum computing is coming in 2-3 years, not 10. Learn about the 'Store Now, Harvest Later' threat and how quantum networking changes everything, including the security of your VPN. This paradigm shift is 100x bigger than the ChatGPT/AI moment, requiring the entire theory of computer science to be rewritten. Join us as we dive into the imminent future of cybersecurity, qubits, and entanglement technology from Cisco. // Vijoy Pandey SOCIALS // LinkedIn: / vijoy X: https://x.com/vijoy // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:36 - Intro 0:48 - Update on Quantum Computing 03:47 - Effects of Practical Quantum Computing 05:08 - Post Quantum Cryptography 06:12 - Why Bother with Quantum Computing 07:57 - How Do We get to Practical Quantum Computing 09:31 - Quantum Protocols and Applications 10:55 - Quantum Computing and Classical-Use Cases 13:28 - Practical Use Case for Quantum Alert 15:03 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #sponsored #ciscops25
GrapheneOS expert MetropleX joins David Bombal to bust myths. We cover banking apps, notifications, Play Services, and why GrapheneOS is more secure than iOS's lockdown mode. // Sponsored Segment A big thank you to Proton VPN for sponsoring this video. This Black Friday, Save 75% on Proton VPN on the 24 month plan with my link.https://protonvpn.com/davidbombal // Metroplex’s & GrapheneOS SOCIALS // X: https://x.com/metroplexgos X: https://x.com/grapheneos Website: https://grapheneos.org/ Discord: / discord GrapheneOS Mastodon: https://grapheneos.social/@GrapheneOS... Reddit: / hot // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:15 - "First time, huh?" 02:04 - Proton VPN sponsored segment 03:32 - Metroplex introduction 04:14 - Myths and misconceptions about GrapheneOS 05:55 - GrapheneOS + Google Pixel 13:17 - Defining "tracking" // How phones track you 17:28 - GrapheneOS privacy & security features 26:15 - GrapheneOS proxies 27:32 - How to download apps on GrapheneOS phones 32:56 - Addressing the issue with banking apps on GrapheneOS phones 34:52 - Installing Google apps on GrapheneOS phones 38:42 - Creating multiple user profiles with GrapheneOS 41:30 - Addressing notification myths 43:40 - GrapheneOS coming to Pixel 10 // GrapheneOS dedicated devices 53:29 - GrapheneOS updates 55:31 - Will GrapheneOS affect Pixel cameras? 57:16 - Apple's Memory Integrity Enforcement vs GrapheneOS 01:01:14 - GrapheneOS: balance of privacy and security 01:02:58 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen - You’ll also get 20% off and annual premium subscription Apple says iPhone is extremely hard to hack. OTW says he keeps finding real malware on normal people's iPhones. We talk Pegasus spyware, the Meta vs NSO lawsuit over WhatsApp, Apple's new memory integrity protections, and why a $5M bug bounty still won't stop well-funded spyware. We also get into how one infected phone can take over your entire WiFi and smart home, why your router and VPN box are the weakest link, and what “everything is hackable” really means for you. // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:49 - Intro 01:53 - Brilliant Ad 03:00 - What are Pegasus and the NSO? 08:14 - Isn't Facebook the Same as the NSO? 11:39 - Can Governments Use Pegasus? 14:43 - When is the NSA Allowed to Spy on You? 16:39 - Will the Court Ruling Change Anything? 18:23 - NSO's USA Acquisition 20:06 - Are iPhones Impossible to Hack? 24:21 - IOS vs Android vs Graphene 28:03 - Is it Easy to Hack an iPhone? 29:40 - Apple's Bug Bounty Program 31:57 - IOS vs Android vs Graphene (Cont.) 35:55 - Are Flip Phones Secure? 41:25 - How to Protect yourself? 45:30 - VPN Hacking 46:44 - OTW's Hope for the Future 48:00 - Hackers Arise New Courses (with Discount Code) 50:08 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen - You’ll also get 20% off and annual premium subscription Two veteran OSINT investigators show how they pull hidden data from TikTok, Telegram, X, Cash App and WordPress using simple browser bookmarklets. No malware, no exploits, just JavaScript in your browser. They also show how to build these tools with AI in minutes, even if you can't code, and how to stay safe with sock puppets, VMs and VPNs. Timestamps below. // Affiliate LINKS // Get 10% off our All OSINT Course Bundle and our OSINT Immersion Bundle by using the Coupon Code: bombal-mot-10 Bundle links and descriptions are https://www.myosint.training/pages/bu... // MOT SOCIAL // LinkedIn: / my-osint-training Blueskyhttps://bsky.app/profile/myosint.trai... X: https://x.com/myosinttrainer // Micah SOCIAL // LinkedIn - / micahhoffman Bluesky - https://bsky.app/profile/webbreacher.com X - https://x.com/webbreacher // Griffin SOCIAL // LinkedIn - / griffin-g BlueSky - https://bsky.app/profile/hatless1der.com X - https://x.com/hatless1der // David’s YouTube PLAYLIST // OSINT: • OSINT: You can't hide // Your privacy is d... // My OSINT Training SOCIAL // OSINT Training: https://myosint.training OSINT Newsletter: https://myosint.link/newsletter Twitter: / myosinttrainer LinkedIn: / my-osint-training YouTube: / @myosinttraining // Resources SHARED // My OSINT Training (MOT) free courses: Introduction to OSINT - https://www.myosint.training/courses/... Careers Using OSINT Skills https://www.myosint.training/courses/... or on YouTube • Careers in OSINT Griffin's Start.me page: https://myosint.link/hatless or https://start.me/p/DPYPMz/the-ultimat... Newsletter – My OSINT News (through My OSINT Training): https://myosint.link/newsletter (https://link.myosint.training/my-osin...) // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:41 - Updates with Griffin and Micah 02:44 - Brilliant sponsored segment 03:42 - Bookmarklet explained 08:16 - Real-world use cases of bookmarklets 11:11 - How do bookmarklets work 13:17 - Free tools // Tools walkthrough 16:55 - Using AI for safe bookmarklets // Protecting your system 21:24 - Using AI for safe bookmarklets demo 23:56 - More bookmarklet demos 31:20 - Efficiency with bookmarklets 33:09 - More bookmarklet demos 39:31 - Making a bookmarklet with AI 43:38 - Easter egg bookmarklet 44:56 - OSINT online training academy 48:32 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thanks to Cisco for Sponsoring this video. For more information about the topic being discussed follow the following link: https://blogs.cisco.com/news/the-thir... Cisco’s Martin Lund joins David Bombal to unpack how AI-scale networking really works - and why a 51.2 Tbps, 64×800G, post-quantum–ready router matters. We break down scale-up vs scale-out vs scale-across, deep buffers to prevent drops on long-haul links, line-rate IPsec/MACsec, SONiC vs IOS XR, P4 programmability, coherent optics for ~1000 km DCI, and how these pieces enable exabit-class fabrics for AI clusters. What you’ll learn • Why GPUs are useless without massive, reliable interconnects • 51.2 Tbps with 64×800G ports and what that enables for AI training • Deep buffers vs shallow buffers and when each wins • Line-rate encryption today and post-quantum readiness tomorrow • SONiC on Cisco Silicon One, P4, and automation at hyperscale If you found this useful, hit subscribe and share with your favorite network nerd. It’s always the network. // Martin Lund’s SOCIALS // LinkedIn: / martinlundca // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:54 - Intro 0:59 - Martin's Background 02:15 - Martin's Advice 02:48 - Cisco's Announcement 06:12 - Data Center Scaling 07:02 - Data Centres Scaling Across 11:08 - New Router Speeds 13:24 - Securing the Data Center (Quantum Computing) 17:57 - Are Deep Buffers Efficient? 19:25 - New Protocols 22:50 - Data Center Infrastructure 24:07 - 8804 Router Innovations 25:33 - The Future of Data Centers 27:50 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #networking #ai
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription. Think you’ve been hacked? In this video, David Bombal and OTW (OccupyTheWeb) walk you through OSQuery - a free, open-source tool that lets you query your operating system like a database. You’ll learn the exact SQL-style commands to find: • Listening processes & remote connections (spot command-and-control) • Suspicious services and misspelled look-alikes • Persistence via registry startup items and scheduled tasks • Fileless malware (on_disk = 0) running only in RAM OTW draws from real digital forensics cases (200+ inquiries/month), including harassment, divorce disputes, and business rivalries. We also explain why antivirus often fails once malware is resident—and what you can do next (kill the process, remove the file, and harden startup entries). // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // YouTube video REFERENCE // Have you been hacked? Hacker explains how to find out: • Have you been hacked? Hacker explains how ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:35 - Introduction 01:08 - The New Python Book 01:41 - Sponsored Section 02:49 - OTW Shares a Cool Tool 05:11 - Why This Tool is Powerful 06:45 - Latest Hacking Trends 09:59 - Who Should Use This Tool (and When) 10:54 - What Happens When You’re Hacked 11:20 - Why Hackers Need Access First 12:02 - After Installing the Software 12:39 - How to Query a Database 14:43 - Exploring OS Query’s Page 16:14 - Finding Unwanted Services on Your Computer 18:06 - Narrowing Down the Data 22:06 - Tracing the Hacker’s Footsteps 23:11 - The Case of the Husband Who Hacked His Wife 24:31 - Are You Being Hacked by the CIA? 25:31 - The Attacker’s Go-To Move 26:25 - Understanding the Windows Registry 29:55 - Investigating Scheduled Tasks 30:48 - Common Hacker Techniques 32:11 - Checking the Processes Running on Your System 33:48 - Is Chrome Malicious? 35:05 - Why Most Home Users Get Hacked 36:16 - Should You Rely on Anti-Virus? 37:48 - Windows vs Mac: Which Gets Hacked More? 38:30 - Getting Hacked Through a Friend’s Link 39:10 - Tutorials for Finding Malware on Your System 39:34 - Outro & Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacked #osquery #cybersecurity
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal In this interview from Black Hat 2025, David Bombal sits down with two cybersecurity legends: David Cowen (Digital Forensics Expert) and Evan Anderson (Red Team Operator and Tool Builder). They give an unfiltered look at the real world of hacking, forensics, and career-building in cybersecurity. What we'll cover: • How the SolarWinds hack was discovered with never-before-heard forensics insight • Real-world red teaming using HVAC exploits, USB pivots, and AWS chaos • The Oculus vs. Carmack lawsuit story from the expert who worked the case • How to start your career in cybersecurity, even without a degree • What the CCDC program is and why it leads to 3 job offers instantly • How AI is changing the game for hackers and defenders alike // David Cowen’s SOCIALS // SANS Profile: https://www.sans.org/profiles/david-c... LinkedIn: / dcowen X: / dcowen // Evan Anderson SOCIALS // Offensive Context: https://blog.offensivecontext.com/aut... LinkedIn: / syndrowm GitHub: https://github.com/syndrowm // Website REFERENCE // https://www.nationalccdc.org/ https://www.sans.org/emea https://ctftime.org/ https://www.uscyberpatriot.org/ // YouTube Channel REFERENCE // 13Cubed: / @13cubed // David Cowen’s Books REFERENCE // Computer Forensics: US: https://amzn.to/47yeH70 UK: https://amzn.to/460ErGs Hacking Exposed Computer Forensics: Secrets and Solutions US: https://amzn.to/4mYevCW UK: https://amzn.to/46q07NH Hacking Exposed Computer Forensics: Secrets and Solutions: US: https://amzn.to/4mT3T8k UK: https://amzn.to/4m8zaCS // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming up 0:49 - Intro 01:13 - Sponsored Section 01:29 - (AWS) Amazon Web Services 03:04 - David Cowen’s Background 03:46 - Evan Anderson’s Background 05:18 - Advice for young people To Get A Job In this Space 05:56 - The Solar Winds Hack? 10:43 - Finding a needle in a Haystack 11:08 - The Oculus Story 13:00 - Evan in Red Teaming 15:55 - Advice To Younger self 16:51 - Recommended Courses 19:42 - Importance of Networking 20:19 - Recommended Certifications 24:13 - Is AI Taking All The Jobs ? 24:57 - Connect With David & Evan online 25:12 - Conclusion & Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
loading
Comments (2)

Aaron Jacobs

It's really important to be cautious when buying a used car. One of the most crucial steps you can take is to check the vehicle’s history using its VIN, or Vehicle Identification Number. I recently came across a website called VIN check https://www.vindecoderz.com , and it’s a fantastic resource for anyone in your situation. By simply entering the VIN, you can access a comprehensive report that includes details about the car's past ownership, any accidents it may have been involved in, and its overall maintenance history.

Oct 29th
Reply

Paja Storec

💚WATCH>>ᗪOᗯᑎᒪOᗩᗪ>>👉https://co.fastmovies.org

Jan 16th
Reply
loading