Discover
David Bombal
David Bombal
Author: David Bombal
Subscribed: 153Played: 2,204Subscribe
Share
© All rights reserved
Description
Want to learn about IT? Want to get ahead in your career? Well, this is the right place!
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
521 Episodes
Reverse
Big thank you to Cisco for sponsoring this video and sponsoring my trip to the Cisco Partner Summit San Diego 2025
Cisco Unified Edge & The Future of Physical AI (w/ Kevin Wolenweber) Kevin Wolenweber reveals Cisco's new Unified Edge device and details the massive Nvidia partnership transforming data centers. We discuss the shift to "Physical AI," the terrifying security challenges of autonomous Agentic AI, and why "Gigawatt" scale clusters are changing the landscape for network engineers in 2025.
// Kevin Wollenweber’s SOCIALS //
Cisco Blogs: https://blogs.cisco.com/author/kevinw...
LinkedIn: / kevin-wollenweber-ba9428
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:00 - New Cisco Unified Edge // What is it?
03:28 - Use cases for the Cisco Unified Edge // Using AI models
08:00 - More traffic and more bandwidth
09:32 - Addressing security issues and solutions
10:44 - What's new on the Cisco Unified Edge
11:41 - Cisco and Nvidia partnership
15:03 - Growing data centers
18:24 - AI in the future
20:03 - Security regarding AI agents
23:08 - Networking and AI
25:35 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit San Diego 2025.
This video is a deep dive with Jeetu Patel on why the real AI revolution is happening in infrastructure and networking, not just in GPUs or chatbots.
Jeetu explains that we are massively underestimating how much AI infrastructure the world will need. Power becomes the core constraint, GPUs are the core asset, and networking is the force multiplier that lets thousands of GPUs act as one system. He walks through how we went from models on a single GPU → 4–8 GPUs in a server → racks with hundreds of GPUs (like NVL-72 with 500+ GPUs) → clusters of racks, and now “scale across” between data centers when power and real estate are scattered across different regions.
The conversation then shifts to edge AI and Cisco Unified Edge: instead of doing all token generation in big data centers, some inference and token generation must move to the edge (branches, factories, hospitals, stadiums, stores) where data is created. Jeetu explains why edge devices need to be plug-and-play, remotely managed, and integrate compute, networking, security and observability in a single platform.
He also introduces the idea that AI is now constrained by three big bottlenecks:
• Infrastructure
• A trust deficit (people don’t trust AI yet)
• A data gap (models are mostly trained on human internet data, not on rich
machine data)
Jeetu explains how security becomes a prerequisite for productivity, not a trade-off, and describes Cisco’s work with Splunk, open-sourced time-series models, and machine data (logs, metrics, traces) to close the data gap by correlating machine data with human-generated data for better insights.
Globally, he talks about the “token generation race” – how every country now cares about having enough AI token generation capacity because it directly links to GDP and national security. He cites huge infrastructure build-outs with partners like G42 in the Middle East, at gigawatt and trillions-of-dollars scale.
Finally, Jeetu tackles the “AI will take my job” fear. He outlines three stages of
thinking:
1. “AI will take my job.”
2. “Someone who uses AI better will take my job.”
3. “Without AI, I won’t be able to do my job.”
His message to younger viewers: be excited, adopt AI as a companion, own your learning, and learn fast because AI compresses the time it takes to build skills.
// Jeetu Patel’s SOCIALS //
LinkedIn: / jeetupatel
Website: https://www.cisco.com/
X: https://x.com/jpatel41
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// Menu //
0:00 - Coming up
0:33 - "Networking is sexy"
02:24 - Scale up, scale out and scale across explained
04:47 - Cisco and Nvidia partnership
05:55 - Cisco and G42 partnership // Addressing the AI bubble
08:11 - New Cisco Unified Edge
11:08 - Agentic AI in the future
13:05 - Huge demand for networking
13:57 - The three constraints
16:38 - AI in the real world
19:26 - How AI will take jobs away
21:38 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit 2025.
Is your encryption safe? Cisco’s Vijoy Pandey reveals why distributed quantum computing is coming in 2-3 years, not 10. Learn about the 'Store Now, Harvest Later' threat and how quantum networking changes everything, including the security of your VPN. This paradigm shift is 100x bigger than the ChatGPT/AI moment, requiring the entire theory of computer science to be rewritten.
Join us as we dive into the imminent future of cybersecurity, qubits, and
entanglement technology from Cisco.
// Vijoy Pandey SOCIALS //
LinkedIn: / vijoy
X: https://x.com/vijoy
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:36 - Intro
0:48 - Update on Quantum Computing
03:47 - Effects of Practical Quantum Computing
05:08 - Post Quantum Cryptography
06:12 - Why Bother with Quantum Computing
07:57 - How Do We get to Practical Quantum Computing
09:31 - Quantum Protocols and Applications
10:55 - Quantum Computing and Classical-Use Cases
13:28 - Practical Use Case for Quantum Alert
15:03 - Outro
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cisco #sponsored #ciscops25
GrapheneOS expert MetropleX joins David Bombal to bust myths. We cover banking apps, notifications, Play Services, and why GrapheneOS is more secure than iOS's lockdown mode.
// Sponsored Segment
A big thank you to Proton VPN for sponsoring this video. This Black Friday, Save 75% on Proton VPN on the 24 month plan with my link.https://protonvpn.com/davidbombal
// Metroplex’s & GrapheneOS SOCIALS //
X: https://x.com/metroplexgos
X: https://x.com/grapheneos
Website: https://grapheneos.org/
Discord: / discord
GrapheneOS Mastodon: https://grapheneos.social/@GrapheneOS...
Reddit: / hot
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:15 - "First time, huh?"
02:04 - Proton VPN sponsored segment
03:32 - Metroplex introduction
04:14 - Myths and misconceptions about GrapheneOS
05:55 - GrapheneOS + Google Pixel
13:17 - Defining "tracking" // How phones track you
17:28 - GrapheneOS privacy & security features
26:15 - GrapheneOS proxies
27:32 - How to download apps on GrapheneOS phones
32:56 - Addressing the issue with banking apps on GrapheneOS phones
34:52 - Installing Google apps on GrapheneOS phones
38:42 - Creating multiple user profiles with GrapheneOS
41:30 - Addressing notification myths
43:40 - GrapheneOS coming to Pixel 10 // GrapheneOS dedicated devices
53:29 - GrapheneOS updates
55:31 - Will GrapheneOS affect Pixel cameras?
57:16 - Apple's Memory Integrity Enforcement vs GrapheneOS
01:01:14 - GrapheneOS: balance of privacy and security
01:02:58 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen - You’ll also get 20% off and annual premium subscription
Apple says iPhone is extremely hard to hack. OTW says he keeps finding real malware on normal people's iPhones. We talk Pegasus spyware, the Meta vs NSO lawsuit over WhatsApp, Apple's new memory integrity protections, and why a $5M bug bounty still won't stop well-funded spyware. We also get into how one infected phone can take over your entire WiFi and smart home, why your router and VPN box are the weakest link, and what “everything is hackable” really means for you.
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:49 - Intro
01:53 - Brilliant Ad
03:00 - What are Pegasus and the NSO?
08:14 - Isn't Facebook the Same as the NSO?
11:39 - Can Governments Use Pegasus?
14:43 - When is the NSA Allowed to Spy on You?
16:39 - Will the Court Ruling Change Anything?
18:23 - NSO's USA Acquisition
20:06 - Are iPhones Impossible to Hack?
24:21 - IOS vs Android vs Graphene
28:03 - Is it Easy to Hack an iPhone?
29:40 - Apple's Bug Bounty Program
31:57 - IOS vs Android vs Graphene (Cont.)
35:55 - Are Flip Phones Secure?
41:25 - How to Protect yourself?
45:30 - VPN Hacking
46:44 - OTW's Hope for the Future
48:00 - Hackers Arise New Courses (with Discount Code)
50:08 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen - You’ll also get 20% off and annual premium subscription
Two veteran OSINT investigators show how they pull hidden data from TikTok, Telegram, X, Cash App and WordPress using simple browser bookmarklets. No malware, no exploits, just JavaScript in your browser. They also show how to build these tools with AI in minutes, even if you can't code, and how to stay safe with sock puppets, VMs and VPNs. Timestamps below.
// Affiliate LINKS //
Get 10% off our All OSINT Course Bundle and our OSINT Immersion Bundle by using the Coupon Code: bombal-mot-10
Bundle links and descriptions are https://www.myosint.training/pages/bu...
// MOT SOCIAL //
LinkedIn: / my-osint-training
Blueskyhttps://bsky.app/profile/myosint.trai...
X: https://x.com/myosinttrainer
// Micah SOCIAL //
LinkedIn - / micahhoffman
Bluesky - https://bsky.app/profile/webbreacher.com
X - https://x.com/webbreacher
// Griffin SOCIAL //
LinkedIn - / griffin-g
BlueSky - https://bsky.app/profile/hatless1der.com
X - https://x.com/hatless1der
// David’s YouTube PLAYLIST //
OSINT: • OSINT: You can't hide // Your privacy is d...
// My OSINT Training SOCIAL //
OSINT Training: https://myosint.training
OSINT Newsletter: https://myosint.link/newsletter
Twitter: / myosinttrainer
LinkedIn: / my-osint-training
YouTube: / @myosinttraining
// Resources SHARED //
My OSINT Training (MOT) free courses:
Introduction to OSINT - https://www.myosint.training/courses/...
Careers Using OSINT Skills https://www.myosint.training/courses/...
or on YouTube • Careers in OSINT
Griffin's Start.me page: https://myosint.link/hatless or https://start.me/p/DPYPMz/the-ultimat...
Newsletter – My OSINT News (through My OSINT Training): https://myosint.link/newsletter (https://link.myosint.training/my-osin...)
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
0:41 - Updates with Griffin and Micah
02:44 - Brilliant sponsored segment
03:42 - Bookmarklet explained
08:16 - Real-world use cases of bookmarklets
11:11 - How do bookmarklets work
13:17 - Free tools // Tools walkthrough
16:55 - Using AI for safe bookmarklets // Protecting your system
21:24 - Using AI for safe bookmarklets demo
23:56 - More bookmarklet demos
31:20 - Efficiency with bookmarklets
33:09 - More bookmarklet demos
39:31 - Making a bookmarklet with AI
43:38 - Easter egg bookmarklet
44:56 - OSINT online training academy
48:32 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to Cisco for Sponsoring this video. For more information about the topic being discussed follow the following link: https://blogs.cisco.com/news/the-thir...
Cisco’s Martin Lund joins David Bombal to unpack how AI-scale networking really works - and why a 51.2 Tbps, 64×800G, post-quantum–ready router matters. We break down scale-up vs scale-out vs scale-across, deep buffers to prevent drops on long-haul links, line-rate IPsec/MACsec, SONiC vs IOS XR, P4 programmability, coherent optics for ~1000 km DCI, and how these pieces enable exabit-class fabrics for AI clusters.
What you’ll learn
• Why GPUs are useless without massive, reliable interconnects
• 51.2 Tbps with 64×800G ports and what that enables for AI training
• Deep buffers vs shallow buffers and when each wins
• Line-rate encryption today and post-quantum readiness tomorrow
• SONiC on Cisco Silicon One, P4, and automation at hyperscale
If you found this useful, hit subscribe and share with your favorite network nerd. It’s always the network.
// Martin Lund’s SOCIALS //
LinkedIn: / martinlundca
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:54 - Intro
0:59 - Martin's Background
02:15 - Martin's Advice
02:48 - Cisco's Announcement
06:12 - Data Center Scaling
07:02 - Data Centres Scaling Across
11:08 - New Router Speeds
13:24 - Securing the Data Center (Quantum Computing)
17:57 - Are Deep Buffers Efficient?
19:25 - New Protocols
22:50 - Data Center Infrastructure
24:07 - 8804 Router Innovations
25:33 - The Future of Data Centers
27:50 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cisco #networking #ai
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription.
Think you’ve been hacked? In this video, David Bombal and OTW (OccupyTheWeb)
walk you through OSQuery - a free, open-source tool that lets you query your
operating system like a database. You’ll learn the exact SQL-style commands to find:
• Listening processes & remote connections (spot command-and-control)
• Suspicious services and misspelled look-alikes
• Persistence via registry startup items and scheduled tasks
• Fileless malware (on_disk = 0) running only in RAM
OTW draws from real digital forensics cases (200+ inquiries/month),
including harassment, divorce disputes, and business rivalries. We also
explain why antivirus often fails once malware is resident—and what you can
do next (kill the process, remove the file, and harden startup entries).
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// YouTube video REFERENCE //
Have you been hacked? Hacker explains how to find out: • Have you been hacked? Hacker explains how ...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:35 - Introduction
01:08 - The New Python Book
01:41 - Sponsored Section
02:49 - OTW Shares a Cool Tool
05:11 - Why This Tool is Powerful
06:45 - Latest Hacking Trends
09:59 - Who Should Use This Tool (and When)
10:54 - What Happens When You’re Hacked
11:20 - Why Hackers Need Access First
12:02 - After Installing the Software
12:39 - How to Query a Database
14:43 - Exploring OS Query’s Page
16:14 - Finding Unwanted Services on Your Computer
18:06 - Narrowing Down the Data
22:06 - Tracing the Hacker’s Footsteps
23:11 - The Case of the Husband Who Hacked His Wife
24:31 - Are You Being Hacked by the CIA?
25:31 - The Attacker’s Go-To Move
26:25 - Understanding the Windows Registry
29:55 - Investigating Scheduled Tasks
30:48 - Common Hacker Techniques
32:11 - Checking the Processes Running on Your System
33:48 - Is Chrome Malicious?
35:05 - Why Most Home Users Get Hacked
36:16 - Should You Rely on Anti-Virus?
37:48 - Windows vs Mac: Which Gets Hacked More?
38:30 - Getting Hacked Through a Friend’s Link
39:10 - Tutorials for Finding Malware on Your System
39:34 - Outro & Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#hacked #osquery #cybersecurity
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal
In this interview from Black Hat 2025, David Bombal sits down with two cybersecurity legends: David Cowen (Digital Forensics Expert) and Evan Anderson (Red Team Operator and Tool Builder). They give an unfiltered look at the real world of hacking, forensics, and career-building in cybersecurity.
What we'll cover:
• How the SolarWinds hack was discovered with never-before-heard forensics insight
• Real-world red teaming using HVAC exploits, USB pivots, and AWS chaos
• The Oculus vs. Carmack lawsuit story from the expert who worked the case
• How to start your career in cybersecurity, even without a degree
• What the CCDC program is and why it leads to 3 job offers instantly
• How AI is changing the game for hackers and defenders alike
// David Cowen’s SOCIALS //
SANS Profile: https://www.sans.org/profiles/david-c...
LinkedIn: / dcowen
X: / dcowen
// Evan Anderson SOCIALS //
Offensive Context: https://blog.offensivecontext.com/aut...
LinkedIn: / syndrowm
GitHub: https://github.com/syndrowm
// Website REFERENCE //
https://www.nationalccdc.org/
https://www.sans.org/emea
https://ctftime.org/
https://www.uscyberpatriot.org/
// YouTube Channel REFERENCE //
13Cubed: / @13cubed
// David Cowen’s Books REFERENCE //
Computer Forensics:
US: https://amzn.to/47yeH70
UK: https://amzn.to/460ErGs
Hacking Exposed Computer Forensics: Secrets and Solutions
US: https://amzn.to/4mYevCW
UK: https://amzn.to/46q07NH
Hacking Exposed Computer Forensics: Secrets and Solutions:
US: https://amzn.to/4mT3T8k
UK: https://amzn.to/4m8zaCS
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// Menu //
0:00 - Coming up
0:49 - Intro
01:13 - Sponsored Section
01:29 - (AWS) Amazon Web Services
03:04 - David Cowen’s Background
03:46 - Evan Anderson’s Background
05:18 - Advice for young people To Get A Job In this Space
05:56 - The Solar Winds Hack?
10:43 - Finding a needle in a Haystack
11:08 - The Oculus Story
13:00 - Evan in Red Teaming
15:55 - Advice To Younger self
16:51 - Recommended Courses
19:42 - Importance of Networking
20:19 - Recommended Certifications
24:13 - Is AI Taking All The Jobs ?
24:57 - Connect With David & Evan online
25:12 - Conclusion & Outro
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to @radware for sponsoring this video.
// Pascal Geenens’ SOCIAL //
LinkedIn: /
Website: https://www.radware.com/
// Report REFERENCE //
Internet of Agents: The Next Threat Surface: https://www.radware.com/pleaseregiste...
ShadowLeak: https://www.radware.com/blog/threat-i...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:45 - Intro
01:15 - Pascals Take on AI and Cybersecurity
05:15 - Security First AI Implementation
06:49 - How Hackers use AI
11:10 - What is an Internet of Agents?
15:43 - The Security Threat of Internet Agents
20:08 - Prompt Injection
26:26 - Indirect Prompt Injection
31:51 - How Hackers can Find your Information
39:46 - What is Vibe Hacking?
43:22 - How to Fight Against Vibe Hacking?
44:46 - Can Young People get into Cyber?
46:50 - Malicious GPTs (Xanthorox)
51:20 - How to Protect yourself (Xbow)
57:31 - Radware's Solution
01:00:12 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#agenticai #radware #llm
Big thanks to Proton VPN for sponsoring this video. To get 64% discount to your Proton VPN Plus subscription, please use the following link: https://protonvpn.com/davidbombal
Want a “hacker” laptop without wasting cash? In this candid breakdown with OTW, we cut through the hype and show you what actually matters for learning pentesting in 2025: prioritising RAM over flashy GPUs, picking VMware (free for personal use) for reliable labs, using refurbs/minis/Raspberry Pi, and planning for where wireless
hacking is going (Bluetooth/BLE/Zigbee) — not just Wi-Fi. We also cover AMD vs Intel vs Apple M-chips/ARM for Linux VMs, when cloud cracking makes sense, and why daily practice beats buying gadgets.
Highlights:
• Best beginner specs (RAM first, SSD nice, storage ≠ speed)
• VMware vs VirtualBox for home labs
• AMD/Intel vs Apple M-chips/ARM for Kali/Parrot VMs
• Alpha adapters & aircrack-ng compatibility; Nordic nRF52 for BLE
• Budget path: used/refurb, mini-PCs, Pi, phone/cloud labs (HTB/THM)
• The 80/20 rule of hacking: skills are greater than gear
If you’re delaying until you can afford a $2 – 3k laptop, don’t. Start now, learn daily, and upgrade later.
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:21 - Proton VPN sponsored segment
03:16 - Get started and start learning
08:39 - Computer specs: CPU, GPU, RAM & Hard drives
16:46 - Time vs Money
17:58 - Virtual machines
19:15 - Computer specs overview
22:17 - Wi-Fi adaptors for Wi-Fi hacking
24:17 - Bluetooth dongles for Bluetooth hacking
26:57 - "80% Person & 20% Machine"
29:17 - Do you need hacking gadgets?
31:57 - Apple vs Intel vs AMD
35:53 - Learn hacking with a smartphone
37:01 - Learn hacking with a Raspberry Pi
39:32 - Kali Linux vs ParrotOS (Which OS to use?)
40:58 - The problem with Chromebooks
42:02 - Using Hack The Box/TryHackMe // Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#hacking #laptop #vm
Big thanks to Juniper for sponsoring this video. To try Juniper Mist please click on the following link: http://juniper.net/trymistyourself
Choppy Zoom calls? Random outages? In this demo with David Bombal and Juniper Networks, you’ll see AI that actually helps: a tunnel-free setup for faster failover and a natural-language chatbot that pinpoints the real issue, client, Wi-Fi, switch, WAN, or cloud—and auto-captures the packets you need.
We also show simple security defaults (deny-by-default) and why double-encrypting traffic can slow you down.
What you’ll learn:
Why “old-school VPN tunnels” add overhead—and how tunnel-free can speed things up
How a chatbot (Marvis) finds root causes and triggers packet captures at the moment of failure
Easy checks for Zoom/Teams quality (latency, jitter, loss) and what to do when it’s not “the Wi-Fi”
Off-hours synthetic tests that catch issues before your day starts
Practical security: sensible defaults and where SASE fits if you want it
// Justin Melloni’s SOCIALS //
LinkedIn: / justin-melloni-54b24a1b
// Andre du Iuri SOCIALS //
LinkedIn: / andre-de-iuri-578391210
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:52 - Introductions
03:28 - What is Mist and SDWAN?
06:23 - Advantages of not using IPsec
12:00 - Mist demo // Dashboard walkthrough
12:49 - Story time
13:58 - Dashboard walkthrough continued
14:49 - Agentic AI in Mist
18:46 - Marvis AI demo & explained
27:42 - Troubleshooting network issues
30:35 - Troubleshooting issues with Marvis demo
36:23 - Troubleshooting something in the cloud
40:22 - Monitoring applications
41:37 - Addressing security concerns
46:42 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#juniper #marvis #networking
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription.
Quantum computing isn’t a far-off sci-fi threat. In a hybrid model (CPU + GPU + quantum), it could land within ~3 years—and that’s enough to break today’s
asymmetric cryptography (RSA/ECC/PKI) used for TLS/HTTPS and VPN key exchange via Shor’s algorithm. Result? Session keys exposed, mass decryption possible, and a risky “post-quantum gap” before new hardware/software are widely deployed.
In this frank discussion, OTW joins David Bombal to explain:
• Why asymmetric key exchange is the weak link for TLS/VPNs
• How hybrid quantum + CUDA-Q accelerates timelines
• Nation-states’ “collect now, decrypt later” strategy
• The painful window before post-quantum cryptography (PQC) rolls out
• Risks of client-side scanning and on-device AI
• NSA backdoors, PGP/Phil Zimmermann, and the San Bernardino iPhone case
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t...
// YouTube video REFERENCE //
• USA stops UK creating Apple backdoor. Why ...
• Will this Tiny Chip Change EVERYTHING in Q...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
01:00 - Intro
01:49 - OTW's Books
02:46 - Brilliant Advert
04:01 - Encryption and Apple Backdoors
05:12 - Nation-states Racing for Quantum Computing
08:35 - Jensen Huang's Hybrid Quantum Computer
10:57 - The Threat of National Agencies
12:10 - China Collecting Encrypted Data
13:56 - Post-Quantum Cryptography
17:58 - The NSA Collecting Data
19:21 - The NSA and Encryption
24:40 - Concerns Against Cryptography
28:09 - Client-Side Scanning
30:46 - Should you Run AI on your Devices?
34:56 - NVIDIA's Role on Cryptography
37:37 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 40% discount
At Black Hat, David Bombal sits down with OSINT pro Mishaal Khan to unpack anti-OSINT, practical steps to regain privacy without pricey services. Mishaal demos his free OperationPrivacy dashboard (400+ actions, 3 tiers: Conscious → Serious → Ghost) and shows how to:
• Freeze credit & use free monitoring
• Opt out of 100+ data brokers (Spokeo, Intelius, LexisNexis, more)
• Blur your home on Google/Bing/Apple Maps + real-world deterrents
• Claim critical accounts (IRS/DMV/USPS/UPS) and your domain
• Nudge page-one results with harmless decoys
• File copyright takedowns (Instagram/Google, etc.)
US-centric but widely applicable. DIY, trackable, and truthful about the time it takes.
// Mishaal Kahn’s SOCIALS //
LinkedIn: / mish-aal
Website: https://www.mishaalkhan.com/
Tool created: https://www.operationprivacy.com/
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 – Coming Up
01:31 – Sponsored by ProtonPass
03:00 – Introduction
05:44 – Operation Privacy Demo
07:49 – How to Freeze Your Credit
08:41 – Credit Monitoring Explained
09:19 – Managing Subscriptions
10:13 – Data Removal (Outbound Requests)
12:40 – Should You Use Automatic Removal?
14:03 – Protecting Your Privacy
15:41 – Why Privacy Takes Time
17:46 – Planting Your Privacy Flag
19:56 – Ghost Mode & SOE Manipulation
22:47 – Getting Content Removal Forms
23:40 – Taking a Holistic Approach to Privacy
25:08 – Final Thoughts / Outro
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription.
In this 2025 deep-dive, David Bombal sits down with John Hammond to map the real state of hacking: classic ransomware/infostealers meet AI-assisted malware (including code that leverages LLMs). We unpack the ClickFix and FileFix social-engineering patterns, fake CAPTCHA and “save/upload” flows that trick users into running payloads, and the practical Windows mitigations (policy/registry ideas) you should know.
John shares why he estimates 20–30% of attacks now have some AI touch, how social engineering scales, and where defenders can push back. For your career, he argues opportunities are expanding: use CTFs, show your work on GitHub/video, and consider OSCP for signaling. He also introduces Just Hacking Training (JHT), handson hack-alongs, archived CTFs, free upskill challenges, and pay-what-you-want courses with industry all-stars.
What you’ll learn:
• How ClickFix/FileFix actually trick users
• Realistic mitigation tactics you can apply
• The current role of AI in malware
• Career roadmap: CTFs → OSCP → portfolio
• Where to get hands-on: JHT resources
// John Hammond’s SOCIALS //
YouTube: / @_johnhammond
X: https://x.com/_johnhammond
LinkedIn: / johnhammond010
Discord: / discord
Instagram: / _johnhammond
TikTok: / johnhammond010
GitHub: https://github.com/JohnHammond
Humble Bundle: https://www.humblebundle.com/?partner...
Just Hacking Training: https://www.justhacking.com/
ClickFix Website: https://clickfix-wiki.github.io/
// YouTube video REFERENCE //
Linux got hacked with this AI Image: • Linux got Hacked with this AI image!
Hackers trick everyone to run malware (FileFix): • hackers trick everyone to run malware (Fil...
OSINT Tools to track you down: • OSINT tools to track you down. You cannot ...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
0:58 - Intro & Current State of Hacking
03:42 - Brilliant Advert
05:14 - The Wave of AI Attacks
07:43 - Click(Fix) Hack
10:10 - FileFix: The Future Hacks
11:14 - Current Affairs & Social Engineering
15:17 - Raising Awareness
19:18 - Security Research
20:51 - Is There a Future for Younger People in This Industry?
22:54 - What Should I Do to Get There?
24:11 - Recommended Certifications
26:34 - Where Do I Start?
28:26 - About John Hammond’s Work
31:12 - Outro
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
In this ethical lab demo, David Bombal and Kyle Winters connect Claude (LLM) to Metasploit through an MCP (Model Context Protocol) server to automate real attacks. Watch AI perform recon, generate a risk report, and execute VSFTPD backdoor, EternalBlue (SMBv1), and UnrealIRCD—dropping benign files on Linux and Windows with simple prompts.
Educational use only on intentionally vulnerable VMs. Do not attack systems you don’t own or lack permission to test.
What you’ll see
• How MCP bridges an AI to real tools (Metasploit RPC)
• AI-driven scanning + auto security report (services, versions, risks)
• Prompted exploits: VSFTPD, EternalBlue, UnrealIRCD
• Why this lowers barriers for red teams—and what blue teams should do
// Sponsored SEGMENT //
Big thanks to Cisco for sponsoring this video.
// Kyle Winters SOCIAL //
LinkedIn: / kyle-m-winters
Cisco Blogs: https://blogs.cisco.com/author/kylewi...
// Websites REFERENCE //
MetasploitMCP by GH05TCREW: https://github.com/GH05TCREW/Metasplo...
Kareem Iskander's MCP blogs: https://blogs.cisco.com/author/kareem...
Cisco U.: https://u.cisco.com?ccid=cisco-u&dtid...
// Video REFERENCE //
MCP Demo using Pythong: • MCP Demo using Python, AI and a self heali...
Brute Force SSH: • Brute Force SSH & Build a Honeypot Now (Hy...
Hacking LLMs: • Hacking LLMs Demo and Tutorial (Explore AI...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// Menu //
0:00 - Coming up
0:58 - Disclaimer
01:00 - Introducing Metasploit MCP Server (by GH05TCREW)
03:01 - Metasploit MCP Demo 1
05:12 - Metasploit MCP Demo 2
10:59 - Metasploit MCP Demo 3
16:18 - Metasploit MCP Demo 4
19:15 - Metasploit MCP Demo 5
21:45 - How AI is changing cybersecurity
23:07 - Metasploit MCP Demo 5 continued
26:51 - Metasploit MCP server summary
28:00 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal
AI can turn weeks of coding into seconds, but at what cost? Katie Paxton-Fear demonstrates how to use Gemini to generate a sprint plan and Cursor to build a Python port scanner from natural language. It works… and that’s the problem. We unpack how “vibe coding” blinds even pros to security, why these tools aren’t production-ready, and the guardrails you need for ethical hacking and internal tooling.
What you’ll learn
• How to turn ideas → sprint plan → working code (Gemini + Cursor)
• Why silent vulnerabilities make AI-built apps risky
• Ethical hacker use cases (agents, scanners) without shipping insecure code
• Policy tips: disclosure, internal use, avoiding shadow IT
Tools mentioned: Gemini, Cursor (AI IDE), Claude (briefly), v0
// Katie Paxton-Fear SOCIALS //
Website: https://insiderphd.dev/
LinkedIn: https://www.linkedin.com/in/katiepf/?...
YouTube: / insiderphd
X: https://x.com/InsiderPhD
// YouTube video REFERENCE //
• Vibe Coding in Cursor for Cyber Security
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// Menu //
0:00 - Coming Up: AI Vibe Coding Explained
01:08 - Intro with Katie Paxton-Fear (Cybersecurity Expert)
02:53 - ThreatLocker Security Overview
03:06 - What is Vibe Coding in AI Development?
04:51 - Live Demo Example of Vibe Coding
05:20 - Google Gemini and Gems for Coding
08:22 - Cursor AI and Writing Code Faster
09:59 - Coffee Break (Quick Pause)
10:02 - Risks of Vibe Coding in Cybersecurity
11:24 - Port Scanner Explained
11:34 - Vibe Coding Pros and Cons (Full Breakdown)
14:02 - Port Scan Results Analysis
14:22 - Why AI Code Isn’t Production Ready Yet
15:53 - Katie’s Final Advice & Outro
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Key topics: vibe coding, AI coding, port scanning, secure-by-design
If you’re experimenting with AI coding, watch this before you deploy anything.
#blackhat #vibecoding #security
Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 60% discount.
Cybersecurity icon Mikko Hyppönen sits down with David Bombal at Black Hat to explain his bold move from antivirus to anti-drone defense after 34 years. He breaks down why mobile operating systems are the biggest security improvement of the past 15 years, how attackers have shifted from device exploits to human scams, and why he believes defenders currently have the edge with AI.
They unpack the rise of fiber-tethered drones that evade RF detection, the coming reality of autonomous “killer robots” (not yet here—but inevitable), and the grim state of privacy as everyday IoT devices go online by default—his “internet asbestos” warning. Mikko also reflects on achieving keynote goals at DEF CON, RSA, and Black Hat, and shares career advice: set goals, don’t drift.
Topics: mobile OS security, social engineering, AI for defense, zero-day research, drone warfare, privacy and encryption policy, IoT risks, career pivot.
// Mikko Hypponen’s SOCIALS //
X: https://x.com/mikko
Website: https://mikko.com/
LinkedIn: https://www.linkedin.com/in/hypponen/...
// Books REFERENCE //
If it’s smart it’s vulnerable:
US: https://amzn.to/41lkSaG
UK: https://amzn.to/4oTpOgN
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
0:56 - Mikko Hyppönen keynote talks
01:51 - Proton Pass sponsored segment
04:09 - Pivoting from cybersecurity to anti-drone
09:28 - Humanoid robots are near
09:54 - How cybersecurity has improved
12:11 - Defenders have the advantage with AI
15:26 - Pros and Cons of the AI revolution
16:57 - Privacy is dying
21:36 - Advice for your future // Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription.
Recorded at Black Hat with David Bombal, this conversation with Caitlin Sarian (@CybersecurityGirl) traces her path from aerospace engineering and LA Galaxy cheerleading to cybersecurity leader and viral creator. She explains how posting 3×daily on TikTok led to ~500K followers and a role at TikTok (global cybersecurity advocacy & culture), why she left after a year, and how she’s now helping others via Cyber Career Club.
// Caitlin Sarian’s SOCIALS //
Website: https://www.cybersecuritygirl.com/
Instagram: / cybersecuritygirl
YouTube: / cybersecuritygirl
LinkedIn: / caitlin-sarian
TikTok: / cybersecuritygirl
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:29 - Intro
01:01 - Brilliant Ad
02:22 - Caitlin's History with TikTok
06:25 - Caitlin's Story
10:19 - Caitlin's Professional Journey
18:09 - How to be an Influencer
19:42 - Why you Need a Team
21:22 - Why you Need to Network
23:58 - All the Areas of Cyber
24:49 - Caitlin's Advice to her Younger Self
27:22 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cybersecurity #blackhat #cybersecuritygirl
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription
AI hype meets harsh reality. In this Black Hat interview, David Bombal talks with Gary Marcus (Professor Emeritus of Psychology and Neural Science at New York University, and AI Expert) just minutes after GPT-5’s announcement. Marcus explains why GPT-5 is only a small step forward, the truth about hallucinations, why AI coding agents pose massive cybersecurity risks, and why we may be years away from true AGI. If you want the unfiltered truth about AI progress, safety, and the future of large language models, watch this.
// Gary Marcus’ SOCIALS //
X: https://x.com/garymarcus
Website: https://garymarcus.substack.com/
// Books REFERENCE //
Mikko Hypponen: If it’s smart it’s vulnerable
US: https://amzn.to/45Rc9PV
UK: https://amzn.to/3V1tJdP
Gary Marcus’ books:
The Algebraic Mind
US: https://amzn.to/4lxsca5
UK: https://amzn.to/45ASH8C
Kluge: The Haphazard evolution of the human mind
US: https://amzn.to/3V0gZnE
UK: https://amzn.to/4mlzrn0
Rebooting AI: Building Artificial Intelligence We Can Trust
US: https://amzn.to/45RhZRh
UK: https://amzn.to/4lt7WGC
Taming Silicon Valley: How we can ensure AI works for us
US: https://amzn.to/4mH0Jnk
UK: https://amzn.to/4oHO5GM
Guitar Zero: The science of becoming musical at any age
US: https://amzn.to/47uF2Ta
UK: https://amzn.to/4oygoYd
The birth of the mind: How a tiny number of genes create the complexities of human thought
US: https://amzn.to/4oBnafB
UK: https://amzn.to/3JimD1Y
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
01:00 - Intro
03:30 - Brilliant Ad
05:16 - Understanding the AI Hype
07:51 - Are Agents Writing Secure Code?
10:34 - Vibe Coding
11:56 - Should Agents Run Everything?
14:56 - Why do LLMs Hallucinate?
18:30 - Are AIs Intelligent?
20:21 - Will LLMs Stop Hallucinating?
24:50 - AI Security
29:24 - Will AGI Ever Happen?
31:48 - The Future of AI
35:08 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
























It's really important to be cautious when buying a used car. One of the most crucial steps you can take is to check the vehicle’s history using its VIN, or Vehicle Identification Number. I recently came across a website called VIN check https://www.vindecoderz.com , and it’s a fantastic resource for anyone in your situation. By simply entering the VIN, you can access a comprehensive report that includes details about the car's past ownership, any accidents it may have been involved in, and its overall maintenance history.
💚WATCH>>ᗪOᗯᑎᒪOᗩᗪ>>👉https://co.fastmovies.org