Discover
David Bombal

David Bombal
Author: David Bombal
Subscribed: 146Played: 2,072Subscribe
Share
© All rights reserved
Description
Want to learn about IT? Want to get ahead in your career? Well, this is the right place!
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
512 Episodes
Reverse
Big thanks to @radware for sponsoring this video.
// Pascal Geenens’ SOCIAL //
LinkedIn: /
Website: https://www.radware.com/
// Report REFERENCE //
Internet of Agents: The Next Threat Surface: https://www.radware.com/pleaseregiste...
ShadowLeak: https://www.radware.com/blog/threat-i...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:45 - Intro
01:15 - Pascals Take on AI and Cybersecurity
05:15 - Security First AI Implementation
06:49 - How Hackers use AI
11:10 - What is an Internet of Agents?
15:43 - The Security Threat of Internet Agents
20:08 - Prompt Injection
26:26 - Indirect Prompt Injection
31:51 - How Hackers can Find your Information
39:46 - What is Vibe Hacking?
43:22 - How to Fight Against Vibe Hacking?
44:46 - Can Young People get into Cyber?
46:50 - Malicious GPTs (Xanthorox)
51:20 - How to Protect yourself (Xbow)
57:31 - Radware's Solution
01:00:12 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#agenticai #radware #llm
Big thanks to Proton VPN for sponsoring this video. To get 64% discount to your Proton VPN Plus subscription, please use the following link: https://protonvpn.com/davidbombal
Want a “hacker” laptop without wasting cash? In this candid breakdown with OTW, we cut through the hype and show you what actually matters for learning pentesting in 2025: prioritising RAM over flashy GPUs, picking VMware (free for personal use) for reliable labs, using refurbs/minis/Raspberry Pi, and planning for where wireless
hacking is going (Bluetooth/BLE/Zigbee) — not just Wi-Fi. We also cover AMD vs Intel vs Apple M-chips/ARM for Linux VMs, when cloud cracking makes sense, and why daily practice beats buying gadgets.
Highlights:
• Best beginner specs (RAM first, SSD nice, storage ≠ speed)
• VMware vs VirtualBox for home labs
• AMD/Intel vs Apple M-chips/ARM for Kali/Parrot VMs
• Alpha adapters & aircrack-ng compatibility; Nordic nRF52 for BLE
• Budget path: used/refurb, mini-PCs, Pi, phone/cloud labs (HTB/THM)
• The 80/20 rule of hacking: skills are greater than gear
If you’re delaying until you can afford a $2 – 3k laptop, don’t. Start now, learn daily, and upgrade later.
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:21 - Proton VPN sponsored segment
03:16 - Get started and start learning
08:39 - Computer specs: CPU, GPU, RAM & Hard drives
16:46 - Time vs Money
17:58 - Virtual machines
19:15 - Computer specs overview
22:17 - Wi-Fi adaptors for Wi-Fi hacking
24:17 - Bluetooth dongles for Bluetooth hacking
26:57 - "80% Person & 20% Machine"
29:17 - Do you need hacking gadgets?
31:57 - Apple vs Intel vs AMD
35:53 - Learn hacking with a smartphone
37:01 - Learn hacking with a Raspberry Pi
39:32 - Kali Linux vs ParrotOS (Which OS to use?)
40:58 - The problem with Chromebooks
42:02 - Using Hack The Box/TryHackMe // Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#hacking #laptop #vm
Big thanks to Juniper for sponsoring this video. To try Juniper Mist please click on the following link: http://juniper.net/trymistyourself
Choppy Zoom calls? Random outages? In this demo with David Bombal and Juniper Networks, you’ll see AI that actually helps: a tunnel-free setup for faster failover and a natural-language chatbot that pinpoints the real issue, client, Wi-Fi, switch, WAN, or cloud—and auto-captures the packets you need.
We also show simple security defaults (deny-by-default) and why double-encrypting traffic can slow you down.
What you’ll learn:
Why “old-school VPN tunnels” add overhead—and how tunnel-free can speed things up
How a chatbot (Marvis) finds root causes and triggers packet captures at the moment of failure
Easy checks for Zoom/Teams quality (latency, jitter, loss) and what to do when it’s not “the Wi-Fi”
Off-hours synthetic tests that catch issues before your day starts
Practical security: sensible defaults and where SASE fits if you want it
// Justin Melloni’s SOCIALS //
LinkedIn: / justin-melloni-54b24a1b
// Andre du Iuri SOCIALS //
LinkedIn: / andre-de-iuri-578391210
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:52 - Introductions
03:28 - What is Mist and SDWAN?
06:23 - Advantages of not using IPsec
12:00 - Mist demo // Dashboard walkthrough
12:49 - Story time
13:58 - Dashboard walkthrough continued
14:49 - Agentic AI in Mist
18:46 - Marvis AI demo & explained
27:42 - Troubleshooting network issues
30:35 - Troubleshooting issues with Marvis demo
36:23 - Troubleshooting something in the cloud
40:22 - Monitoring applications
41:37 - Addressing security concerns
46:42 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#juniper #marvis #networking
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription.
Quantum computing isn’t a far-off sci-fi threat. In a hybrid model (CPU + GPU + quantum), it could land within ~3 years—and that’s enough to break today’s
asymmetric cryptography (RSA/ECC/PKI) used for TLS/HTTPS and VPN key exchange via Shor’s algorithm. Result? Session keys exposed, mass decryption possible, and a risky “post-quantum gap” before new hardware/software are widely deployed.
In this frank discussion, OTW joins David Bombal to explain:
• Why asymmetric key exchange is the weak link for TLS/VPNs
• How hybrid quantum + CUDA-Q accelerates timelines
• Nation-states’ “collect now, decrypt later” strategy
• The painful window before post-quantum cryptography (PQC) rolls out
• Risks of client-side scanning and on-device AI
• NSA backdoors, PGP/Phil Zimmermann, and the San Bernardino iPhone case
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t...
// YouTube video REFERENCE //
• USA stops UK creating Apple backdoor. Why ...
• Will this Tiny Chip Change EVERYTHING in Q...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
01:00 - Intro
01:49 - OTW's Books
02:46 - Brilliant Advert
04:01 - Encryption and Apple Backdoors
05:12 - Nation-states Racing for Quantum Computing
08:35 - Jensen Huang's Hybrid Quantum Computer
10:57 - The Threat of National Agencies
12:10 - China Collecting Encrypted Data
13:56 - Post-Quantum Cryptography
17:58 - The NSA Collecting Data
19:21 - The NSA and Encryption
24:40 - Concerns Against Cryptography
28:09 - Client-Side Scanning
30:46 - Should you Run AI on your Devices?
34:56 - NVIDIA's Role on Cryptography
37:37 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 40% discount
At Black Hat, David Bombal sits down with OSINT pro Mishaal Khan to unpack anti-OSINT, practical steps to regain privacy without pricey services. Mishaal demos his free OperationPrivacy dashboard (400+ actions, 3 tiers: Conscious → Serious → Ghost) and shows how to:
• Freeze credit & use free monitoring
• Opt out of 100+ data brokers (Spokeo, Intelius, LexisNexis, more)
• Blur your home on Google/Bing/Apple Maps + real-world deterrents
• Claim critical accounts (IRS/DMV/USPS/UPS) and your domain
• Nudge page-one results with harmless decoys
• File copyright takedowns (Instagram/Google, etc.)
US-centric but widely applicable. DIY, trackable, and truthful about the time it takes.
// Mishaal Kahn’s SOCIALS //
LinkedIn: / mish-aal
Website: https://www.mishaalkhan.com/
Tool created: https://www.operationprivacy.com/
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 – Coming Up
01:31 – Sponsored by ProtonPass
03:00 – Introduction
05:44 – Operation Privacy Demo
07:49 – How to Freeze Your Credit
08:41 – Credit Monitoring Explained
09:19 – Managing Subscriptions
10:13 – Data Removal (Outbound Requests)
12:40 – Should You Use Automatic Removal?
14:03 – Protecting Your Privacy
15:41 – Why Privacy Takes Time
17:46 – Planting Your Privacy Flag
19:56 – Ghost Mode & SOE Manipulation
22:47 – Getting Content Removal Forms
23:40 – Taking a Holistic Approach to Privacy
25:08 – Final Thoughts / Outro
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription.
In this 2025 deep-dive, David Bombal sits down with John Hammond to map the real state of hacking: classic ransomware/infostealers meet AI-assisted malware (including code that leverages LLMs). We unpack the ClickFix and FileFix social-engineering patterns, fake CAPTCHA and “save/upload” flows that trick users into running payloads, and the practical Windows mitigations (policy/registry ideas) you should know.
John shares why he estimates 20–30% of attacks now have some AI touch, how social engineering scales, and where defenders can push back. For your career, he argues opportunities are expanding: use CTFs, show your work on GitHub/video, and consider OSCP for signaling. He also introduces Just Hacking Training (JHT), handson hack-alongs, archived CTFs, free upskill challenges, and pay-what-you-want courses with industry all-stars.
What you’ll learn:
• How ClickFix/FileFix actually trick users
• Realistic mitigation tactics you can apply
• The current role of AI in malware
• Career roadmap: CTFs → OSCP → portfolio
• Where to get hands-on: JHT resources
// John Hammond’s SOCIALS //
YouTube: / @_johnhammond
X: https://x.com/_johnhammond
LinkedIn: / johnhammond010
Discord: / discord
Instagram: / _johnhammond
TikTok: / johnhammond010
GitHub: https://github.com/JohnHammond
Humble Bundle: https://www.humblebundle.com/?partner...
Just Hacking Training: https://www.justhacking.com/
ClickFix Website: https://clickfix-wiki.github.io/
// YouTube video REFERENCE //
Linux got hacked with this AI Image: • Linux got Hacked with this AI image!
Hackers trick everyone to run malware (FileFix): • hackers trick everyone to run malware (Fil...
OSINT Tools to track you down: • OSINT tools to track you down. You cannot ...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
0:58 - Intro & Current State of Hacking
03:42 - Brilliant Advert
05:14 - The Wave of AI Attacks
07:43 - Click(Fix) Hack
10:10 - FileFix: The Future Hacks
11:14 - Current Affairs & Social Engineering
15:17 - Raising Awareness
19:18 - Security Research
20:51 - Is There a Future for Younger People in This Industry?
22:54 - What Should I Do to Get There?
24:11 - Recommended Certifications
26:34 - Where Do I Start?
28:26 - About John Hammond’s Work
31:12 - Outro
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
In this ethical lab demo, David Bombal and Kyle Winters connect Claude (LLM) to Metasploit through an MCP (Model Context Protocol) server to automate real attacks. Watch AI perform recon, generate a risk report, and execute VSFTPD backdoor, EternalBlue (SMBv1), and UnrealIRCD—dropping benign files on Linux and Windows with simple prompts.
Educational use only on intentionally vulnerable VMs. Do not attack systems you don’t own or lack permission to test.
What you’ll see
• How MCP bridges an AI to real tools (Metasploit RPC)
• AI-driven scanning + auto security report (services, versions, risks)
• Prompted exploits: VSFTPD, EternalBlue, UnrealIRCD
• Why this lowers barriers for red teams—and what blue teams should do
// Sponsored SEGMENT //
Big thanks to Cisco for sponsoring this video.
// Kyle Winters SOCIAL //
LinkedIn: / kyle-m-winters
Cisco Blogs: https://blogs.cisco.com/author/kylewi...
// Websites REFERENCE //
MetasploitMCP by GH05TCREW: https://github.com/GH05TCREW/Metasplo...
Kareem Iskander's MCP blogs: https://blogs.cisco.com/author/kareem...
Cisco U.: https://u.cisco.com?ccid=cisco-u&dtid...
// Video REFERENCE //
MCP Demo using Pythong: • MCP Demo using Python, AI and a self heali...
Brute Force SSH: • Brute Force SSH & Build a Honeypot Now (Hy...
Hacking LLMs: • Hacking LLMs Demo and Tutorial (Explore AI...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// Menu //
0:00 - Coming up
0:58 - Disclaimer
01:00 - Introducing Metasploit MCP Server (by GH05TCREW)
03:01 - Metasploit MCP Demo 1
05:12 - Metasploit MCP Demo 2
10:59 - Metasploit MCP Demo 3
16:18 - Metasploit MCP Demo 4
19:15 - Metasploit MCP Demo 5
21:45 - How AI is changing cybersecurity
23:07 - Metasploit MCP Demo 5 continued
26:51 - Metasploit MCP server summary
28:00 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal
AI can turn weeks of coding into seconds, but at what cost? Katie Paxton-Fear demonstrates how to use Gemini to generate a sprint plan and Cursor to build a Python port scanner from natural language. It works… and that’s the problem. We unpack how “vibe coding” blinds even pros to security, why these tools aren’t production-ready, and the guardrails you need for ethical hacking and internal tooling.
What you’ll learn
• How to turn ideas → sprint plan → working code (Gemini + Cursor)
• Why silent vulnerabilities make AI-built apps risky
• Ethical hacker use cases (agents, scanners) without shipping insecure code
• Policy tips: disclosure, internal use, avoiding shadow IT
Tools mentioned: Gemini, Cursor (AI IDE), Claude (briefly), v0
// Katie Paxton-Fear SOCIALS //
Website: https://insiderphd.dev/
LinkedIn: https://www.linkedin.com/in/katiepf/?...
YouTube: / insiderphd
X: https://x.com/InsiderPhD
// YouTube video REFERENCE //
• Vibe Coding in Cursor for Cyber Security
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// Menu //
0:00 - Coming Up: AI Vibe Coding Explained
01:08 - Intro with Katie Paxton-Fear (Cybersecurity Expert)
02:53 - ThreatLocker Security Overview
03:06 - What is Vibe Coding in AI Development?
04:51 - Live Demo Example of Vibe Coding
05:20 - Google Gemini and Gems for Coding
08:22 - Cursor AI and Writing Code Faster
09:59 - Coffee Break (Quick Pause)
10:02 - Risks of Vibe Coding in Cybersecurity
11:24 - Port Scanner Explained
11:34 - Vibe Coding Pros and Cons (Full Breakdown)
14:02 - Port Scan Results Analysis
14:22 - Why AI Code Isn’t Production Ready Yet
15:53 - Katie’s Final Advice & Outro
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Key topics: vibe coding, AI coding, port scanning, secure-by-design
If you’re experimenting with AI coding, watch this before you deploy anything.
#blackhat #vibecoding #security
Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 60% discount.
Cybersecurity icon Mikko Hyppönen sits down with David Bombal at Black Hat to explain his bold move from antivirus to anti-drone defense after 34 years. He breaks down why mobile operating systems are the biggest security improvement of the past 15 years, how attackers have shifted from device exploits to human scams, and why he believes defenders currently have the edge with AI.
They unpack the rise of fiber-tethered drones that evade RF detection, the coming reality of autonomous “killer robots” (not yet here—but inevitable), and the grim state of privacy as everyday IoT devices go online by default—his “internet asbestos” warning. Mikko also reflects on achieving keynote goals at DEF CON, RSA, and Black Hat, and shares career advice: set goals, don’t drift.
Topics: mobile OS security, social engineering, AI for defense, zero-day research, drone warfare, privacy and encryption policy, IoT risks, career pivot.
// Mikko Hypponen’s SOCIALS //
X: https://x.com/mikko
Website: https://mikko.com/
LinkedIn: https://www.linkedin.com/in/hypponen/...
// Books REFERENCE //
If it’s smart it’s vulnerable:
US: https://amzn.to/41lkSaG
UK: https://amzn.to/4oTpOgN
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
0:56 - Mikko Hyppönen keynote talks
01:51 - Proton Pass sponsored segment
04:09 - Pivoting from cybersecurity to anti-drone
09:28 - Humanoid robots are near
09:54 - How cybersecurity has improved
12:11 - Defenders have the advantage with AI
15:26 - Pros and Cons of the AI revolution
16:57 - Privacy is dying
21:36 - Advice for your future // Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription.
Recorded at Black Hat with David Bombal, this conversation with Caitlin Sarian (@CybersecurityGirl) traces her path from aerospace engineering and LA Galaxy cheerleading to cybersecurity leader and viral creator. She explains how posting 3×daily on TikTok led to ~500K followers and a role at TikTok (global cybersecurity advocacy & culture), why she left after a year, and how she’s now helping others via Cyber Career Club.
// Caitlin Sarian’s SOCIALS //
Website: https://www.cybersecuritygirl.com/
Instagram: / cybersecuritygirl
YouTube: / cybersecuritygirl
LinkedIn: / caitlin-sarian
TikTok: / cybersecuritygirl
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:29 - Intro
01:01 - Brilliant Ad
02:22 - Caitlin's History with TikTok
06:25 - Caitlin's Story
10:19 - Caitlin's Professional Journey
18:09 - How to be an Influencer
19:42 - Why you Need a Team
21:22 - Why you Need to Network
23:58 - All the Areas of Cyber
24:49 - Caitlin's Advice to her Younger Self
27:22 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cybersecurity #blackhat #cybersecuritygirl
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription
AI hype meets harsh reality. In this Black Hat interview, David Bombal talks with Gary Marcus (Professor Emeritus of Psychology and Neural Science at New York University, and AI Expert) just minutes after GPT-5’s announcement. Marcus explains why GPT-5 is only a small step forward, the truth about hallucinations, why AI coding agents pose massive cybersecurity risks, and why we may be years away from true AGI. If you want the unfiltered truth about AI progress, safety, and the future of large language models, watch this.
// Gary Marcus’ SOCIALS //
X: https://x.com/garymarcus
Website: https://garymarcus.substack.com/
// Books REFERENCE //
Mikko Hypponen: If it’s smart it’s vulnerable
US: https://amzn.to/45Rc9PV
UK: https://amzn.to/3V1tJdP
Gary Marcus’ books:
The Algebraic Mind
US: https://amzn.to/4lxsca5
UK: https://amzn.to/45ASH8C
Kluge: The Haphazard evolution of the human mind
US: https://amzn.to/3V0gZnE
UK: https://amzn.to/4mlzrn0
Rebooting AI: Building Artificial Intelligence We Can Trust
US: https://amzn.to/45RhZRh
UK: https://amzn.to/4lt7WGC
Taming Silicon Valley: How we can ensure AI works for us
US: https://amzn.to/4mH0Jnk
UK: https://amzn.to/4oHO5GM
Guitar Zero: The science of becoming musical at any age
US: https://amzn.to/47uF2Ta
UK: https://amzn.to/4oygoYd
The birth of the mind: How a tiny number of genes create the complexities of human thought
US: https://amzn.to/4oBnafB
UK: https://amzn.to/3JimD1Y
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
01:00 - Intro
03:30 - Brilliant Ad
05:16 - Understanding the AI Hype
07:51 - Are Agents Writing Secure Code?
10:34 - Vibe Coding
11:56 - Should Agents Run Everything?
14:56 - Why do LLMs Hallucinate?
18:30 - Are AIs Intelligent?
20:21 - Will LLMs Stop Hallucinating?
24:50 - AI Security
29:24 - Will AGI Ever Happen?
31:48 - The Future of AI
35:08 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal
Discover “Chasing Your Tail,” an open-source surveillance detection tool you can build with a Raspberry Pi. In this exclusive Black Hat interview, creator Matt explains how it tracks Wi-Fi, Bluetooth, and even tire sensors to spot if you’re being followed, then flips the script to map where your followers spend time. Learn the origins of this tool, from avoiding surprise visits to protecting informants and aiding search & rescue. We cover the tech stack (Kismet, Python, GPS integration), real-world success stories, and how you can set it up yourself for under $100. Perfect for security pros, privacy
advocates, and tech enthusiasts.
// Matt Edmondson SOCIALS //
SANS: https://www.sans.org/profiles/matt-ed...
LinkedIn: / matt-edmondson-759aab2b
X: https://x.com/matt0177
Matt’s Block: https://www.digitalforensicstips.com/
// GitHub Code REFERENCE //
https://github.com/ArgeliusLabs/Chasi...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// Menu //
0:00 - Coming up
0:35 - Chasing your tail update // How it started
03:27 - Threatlocker sponsored segment
03:45 - What's in the box and how it works
07:37 - "It's basically free to build it" // Components used
09:20 - What coding language it runs on
11:25 - Unique network IDs in real life
12:47 - Tracking MAC addresses
14:51 - How to know who is tailing you
15:36 - How the device have helped people
16:49 - Tracking Bluetooth
18:23 - Reach out to Matthew Edmondson
19:04 - Black Hat Arsenal explained
19:52 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
David Bombal is joined by Gerald Combs, the creator of Wireshark, and Chris Greer, a well-known Wireshark trainer, for a comprehensive discussion about the past, present, and future of the world’s most popular network protocol analyzer.
They explore how Wireshark was originally created as an open-source alternative to expensive packet sniffers, the evolution from its first release in 1998 (as Ethereal), and the community-driven development that led to over 2,300 contributors worldwide. The video also dives into the transition to the Wireshark Foundation, a nonprofit organization dedicated to supporting the tool and educating users globally.
Topics covered include:
The early days of Wireshark and why it was built
The story behind the name change from Ethereal to Wireshark
How Windows compatibility helped Wireshark go mainstream
The launch of SharkFest and what makes it unique as a community-driven conference
What attendees can expect from SharkFest in the US and Europe, including beginner-friendly tracks, expert sessions, and interactive challenges like
Packet Doctors
How the Wireshark Foundation supports the community and ensures long-term sustainability
The introduction of the Wireshark Certified Analyst (WCA) certification and what it means for networking and cybersecurity professionals
Real-world use cases for Wireshark in ethical hacking, packet forensics, and cybersecurity training
The announcement of StratoShark, a new open-source companion tool for analyzing system call data and cloud logs with a familiar Wireshark-like interface
Whether you're a network engineer, a cybersecurity professional, a developer, or just curious about how network analysis tools are built and used, this video provides deep technical insights, inspiring backstory, and practical guidance on how to level up your skills.
// Website links REFERENCE //
https://wireshark.org/certifications
https://packetschool.teachable.com/?a...
http://packetpioneer.com/courses
https://stratoshark.org/
https://sharkfest.wireshark.org/
// Chris’ SOCIAL //
X: https://x.com/packetpioneer
YouTube: / @chrisgreer
LinkedIn: / cgreer
// Gerald Combs SOCIAL //
LinkedIn: / geraldcombs
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thank you to DeleteMe for sponsoring this video. Go to http://joindeleteme.com/Bombal to receive a 20% discount.
Discover how attackers exploit enterprise VPNs like Fortinet to gain admin access and compromise networks. In this video, OTW exposes a real authentication bypass exploit, explains the risks of outdated VPN devices, and shares expert tips on Linux, TCPDump, and staying secure. Perfect for cybersecurity pros, penetration testers, and anyone serious about digital defense.
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// Playlists REFERENCE //
Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses)
Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ...
Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t...
// YouTube video REFERENCE //
Hacking IP Cameras: • Hacking IP Cameras (CCTV) with Demos and R...
Are VPNs even safe now?: • Are VPNs even safe now? Hacker Explains
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thank you to Cisco for sponsoring this video and sponsoring my trip to Cisco Live San Diego.
This video features David Bombal and Kyle Winters demonstrating practical
cybersecurity techniques. Kyle walks through how to use Hydra to brute force SSH passwords, explaining the process of leveraging wordlists and optimizing the attack. Following the offensive demonstration, Kyle transitions into defensive measures, showing viewers how to quickly and easily set up an SSH honeypot using Cowrie. The honeypot serves as a decoy to attract and monitor malicious actors attempting to access a network. The demonstration includes setting up the honeypot on an Ubuntu host, configuring IP tables for port redirection, and monitoring logs for incoming connection attempts. The video highlights the importance of understanding both attack methods and defensive strategies in cybersecurity. Kyle also mentions free ethical hacking training resources available through Cisco Networking Academy (netacad.com) and future tutorials on Cisco U (u.cisco.com).
// COMMANDS //
Devices:
client 192.168.1.10
server 192.168.1.11
ubuntu-honeypot 192.168.1.21
Nmap scan:
nmap -sn 192.168.1.0/24
Verify Hydra installed:
hydra -h
Show wordlists:
ls -al /usr/share/wordlists/
Crack with known username:
hydra -l admin -P /usr/share/wordlists/top-passwords-shortlist.txt -t 4 -f ssh://192.168.1.11
Crack with unknown username:
hydra -L /usr/share/wordlists/top-usernames-shortlist.txt -P /usr/share/wordlists/top-passwords-shortlist.txt -t 4 -f ssh://192.168.1.11
Create dir for Cowrie:
mkdir cowrie
cd cowrie/
Clone cowrie:
git clone https://github.com/cowrie/cowrie .
Launch the python virtual environment:
python3 -m venv cowrie-env
source cowrie-env/bin/activate
Install python requirements:
pip install --upgrade pip
pip install -r requirements.txt
Copy and edit the config:
cp etc/cowrie.cfg.dist etc/cowrie.cfg
vi etc/cowrie.cfg
Setup port forwarding for SSH to Cowrie:
sudo iptables -t nat -A PREROUTING -p tcp --dport 22 -j REDIRECT --to-port 2222
sudo iptables-save
Start Cowrie:
bin/cowrie start
Check Cowrie status:
bin/cowrie status
View logs:
tail -f var/log/cowrie/cowrie.log
// Kyle Winter’s SOCIALS //
Socials: / kyle-m-winters
Cisco Blogs: https://blogs.cisco.com/author/kylewi...
// Website REFERENCE //
https://www.netacad.com/courses/ethic...
https://u.cisco.com/
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thank you to Cisco for sponsoring this video and sponsoring my trip to Cisco Live San Diego.
See how Cisco engineer Kareem Iskander teams up with David Bombal at Cisco Live San Diego 2025 to build a self-healing network in real time. Using the new Model Context Protocol (MCP), Splunk logs, Meraki APIs, and Anthropic Claude, Kareem’s Python code lets an LLM detect configuration drift and automatically revert changes, no manual troubleshooting required.
You will learn:
• What MCP is and how it exposes trusted tools to an LLM
• How Claude reads Splunk, correlates Meraki changes, and repairs configs
• Why two lines of code can spin up an entire MCP server from OpenAPI specs
• Where to find Kareem’s full code on GitHub and his upcoming Cisco U tutorial
// Code //
Get the code here: https://github.com/kiskander/mcp-splu...
//Kareem Iskander SOCIALS //
LinkedIn: / kiskander
X: https://x.com/kareem_isk
Cisco Blogs: https://blogs.cisco.com/author/kareem...
// Website REFERENCE //
https://github.com/kiskander/mcp-splu...
https://u.cisco.com/tutorials/enhance...
https://u.cisco.com/tutorials/network...
https://u.cisco.com/tutorials/network...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to Radware for sponsoring this video and sharing technical insights with us!
David Bombal talks with Michael Geller (Radware) and Tim Sherman (Cisco) about how smart devices like fridges, cars, and cameras are being hijacked for DDoS attacks. They explain Web DDoS, encrypted Layer 7 threats, and how attackers bypass traditional firewalls. The discussion covers IoT botnets, API abuse, 5G core vulnerabilities, and how Cisco and Radware are defending cloud and edge infrastructure.
// Radware’s SOCIALS //
X: https://x.com/radware
LinkedIn: / posts
Website: https://www.radware.com/
// Web page REFERENCE //
http://livethreatmap.radware.com
https://www.radware.com/security/ddos...
https://www.radware.com/solutions/web...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: https://open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: https://podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Your Firewall Won’t Save You From This
Stop Is Your Car Launching Cyberattacks
Your Home Appliances Weaponized by Cybercriminals
DDoS Just Got Smarter Layer 7 Is Nightmare
How Default Bots Cripple Hospitals and Systems
Electric Cars Under Siege from Smart Devices
Cybersecurity Blind Spot Your Car Is Compromised
The Hidden Threat Everyday Devices Hacked Now
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thanks to Radware for sponsoring this video and sharing technical insights with us!
// Radware reports REFERENCE //
Executive Summary: https://davidbombal.wiki/2025threats
2025 Global Threat Analysis Report: https://davidbombal.wiki/2025threatsu...
// Pascal Geenens’ SOCIAL //
LinkedIn: / geenensp
Website: https://www.radware.com/
// Radware SOCIAL //
YouTube: / radwareinc
Webinars: https://www.radware.com/newsroom/events/
LinkedIn / radware
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
01:03 - Intro
01:40 - What are the Reports About?
06:59 - Hacktivists (Dark Storm Team)
10:19 - DDos For Hire (Telegram)
13:24 - Check-Host.net
14:27 - Dienet
19:44 - How to Bring Down a Website
21:46 - DNS DDoS Attacks
26:28 - HTTP/2
29:22 - Botnet Capability
31:51 - Noname057
35:09 - Home Routers (TRS-069)
39:05 - Bullet Proof Cloud Services
45:13 - Vulnerable IoT
49:04 - Shodan (IoT Search Engine)
50:07 - Downloading Threats
52:45 - Application Programming Interfaces (APIs)
57:15 - Artificial Intelligence (AI)
01:06:49 - The Fight Against Bad AI
01:08:49 - How to Protect Yourself
01:14:52 - What is Radware?
01:16:00 - The Struggle of Downloading Models
01:20:06 - Should AI Keep your Data?
01:22:01 Connect with Pascal
01:22:36 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thank you to ThreatLocker for sponsoring my trip to ZTW25 and also for sponsoring this video. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal
// GIVE AWAY//
Gerald is giving away 10 seats in the Simply Cyber Academy GRC Analyst Master Class (Value: $149) to 10 lucky David Bombal viewers. To enter the giveaway go here: https://gleam.io/VVK24/simply-cyber-g...
// DISCOUNT //
To get 10% discount on Simply Cyber Academy GRC Analyst Master Class go here: https://simplycyber.io/grc use the following discount code BOMBAL10
// Gerald Auger’s SOCIAL //
YouTube: / @simplycyber
Website: https://www.simplycyber.io
X: https://x.com/gerald_auger
LinkedIn: / geraldauger
Discord: https://simplycyber.io/discord
// Daily Cyber Threat Live Stream REFERENCE //
/ geraldauger
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
0:53 - What is GRC (Governance, Risk and Compliance)? // GRC explained
04:42 - Businesses taking cyber security more seriously in 2025
07:21 - Is GRC a good career path?
09:58 - Cyber security careers are vast: pick your path
14:49 - Introverts can be successful in GRC
15:47 - GRC for the younger generation // The importance of networking with people
17:57 - Simply Cyber livestreams, live podcasts and discord community
19:17 - How to get started in GRC
20:35 - GRC Analyst Master Class
21:30 - How to get started in GRC (continued)
22:51 - Course giveaway and discount
23:42 - Simply Cyber Daily Cyber Threat Brief
26:51 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
Big thank you to ThreatLocker for sponsoring my trip to ZTW25 and also for sponsoring this video. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal
// Danny Jenkin’s SOCIAL //
X: https://x.com/threatlocker
LinkedIn: / dannyjenkinscyber
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Languages the ThreatLocker CEO can code in // Being a CEO that is technical
02:04 - How Danny became CEO // The backstory of Danny Jenkins, CEO & Co-Founder of ThreatLocker
08:37 - Being a technical CEO
10:28 - Having a team that is dedicated
13:23 - The importance of being technical and understanding every department
14:21 - Lessons learnt and advices
17:30 - Long-term vision for ThreatLocker
18:30 - What lead to starting ThreatLocker
19:59 - New releases from ThreatLocker
21:18 - Thoughts on AI // The influence of AI in cyber attacks
24:35 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
It's really important to be cautious when buying a used car. One of the most crucial steps you can take is to check the vehicle’s history using its VIN, or Vehicle Identification Number. I recently came across a website called VIN check https://www.vindecoderz.com , and it’s a fantastic resource for anyone in your situation. By simply entering the VIN, you can access a comprehensive report that includes details about the car's past ownership, any accidents it may have been involved in, and its overall maintenance history.
💚WATCH>>ᗪOᗯᑎᒪOᗩᗪ>>👉https://co.fastmovies.org