ПодборкаDavid Bombal
David Bombal
Claim Ownership

David Bombal

Автор: David Bombal

Подписка оформлена: 144Воспроизведенные: 1,985
поделиться

Описание

Want to learn about IT? Want to get ahead in your career? Well, this is the right place!

On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.

This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.

David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal

All the best!
David
505 Episodes
Reverse
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal AI can turn weeks of coding into seconds, but at what cost? Katie Paxton-Fear demonstrates how to use Gemini to generate a sprint plan and Cursor to build a Python port scanner from natural language. It works… and that’s the problem. We unpack how “vibe coding” blinds even pros to security, why these tools aren’t production-ready, and the guardrails you need for ethical hacking and internal tooling. What you’ll learn • How to turn ideas → sprint plan → working code (Gemini + Cursor) • Why silent vulnerabilities make AI-built apps risky • Ethical hacker use cases (agents, scanners) without shipping insecure code • Policy tips: disclosure, internal use, avoiding shadow IT Tools mentioned: Gemini, Cursor (AI IDE), Claude (briefly), v0 // Katie Paxton-Fear SOCIALS // Website: https://insiderphd.dev/ LinkedIn: https://www.linkedin.com/in/katiepf/?... YouTube: / insiderphd X: https://x.com/InsiderPhD // YouTube video REFERENCE // • Vibe Coding in Cursor for Cyber Security // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming Up: AI Vibe Coding Explained 01:08 - Intro with Katie Paxton-Fear (Cybersecurity Expert) 02:53 - ThreatLocker Security Overview 03:06 - What is Vibe Coding in AI Development? 04:51 - Live Demo Example of Vibe Coding 05:20 - Google Gemini and Gems for Coding 08:22 - Cursor AI and Writing Code Faster 09:59 - Coffee Break (Quick Pause) 10:02 - Risks of Vibe Coding in Cybersecurity 11:24 - Port Scanner Explained 11:34 - Vibe Coding Pros and Cons (Full Breakdown) 14:02 - Port Scan Results Analysis 14:22 - Why AI Code Isn’t Production Ready Yet 15:53 - Katie’s Final Advice & Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. Key topics: vibe coding, AI coding, port scanning, secure-by-design If you’re experimenting with AI coding, watch this before you deploy anything. #blackhat #vibecoding #security
Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 60% discount. Cybersecurity icon Mikko Hyppönen sits down with David Bombal at Black Hat to explain his bold move from antivirus to anti-drone defense after 34 years. He breaks down why mobile operating systems are the biggest security improvement of the past 15 years, how attackers have shifted from device exploits to human scams, and why he believes defenders currently have the edge with AI. They unpack the rise of fiber-tethered drones that evade RF detection, the coming reality of autonomous “killer robots” (not yet here—but inevitable), and the grim state of privacy as everyday IoT devices go online by default—his “internet asbestos” warning. Mikko also reflects on achieving keynote goals at DEF CON, RSA, and Black Hat, and shares career advice: set goals, don’t drift. Topics: mobile OS security, social engineering, AI for defense, zero-day research, drone warfare, privacy and encryption policy, IoT risks, career pivot. // Mikko Hypponen’s SOCIALS // X: https://x.com/mikko Website: https://mikko.com/ LinkedIn: https://www.linkedin.com/in/hypponen/... // Books REFERENCE // If it’s smart it’s vulnerable: US: https://amzn.to/41lkSaG UK: https://amzn.to/4oTpOgN // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - Mikko Hyppönen keynote talks 01:51 - Proton Pass sponsored segment 04:09 - Pivoting from cybersecurity to anti-drone 09:28 - Humanoid robots are near 09:54 - How cybersecurity has improved 12:11 - Defenders have the advantage with AI 15:26 - Pros and Cons of the AI revolution 16:57 - Privacy is dying 21:36 - Advice for your future // Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription. Recorded at Black Hat with David Bombal, this conversation with Caitlin Sarian (@CybersecurityGirl) traces her path from aerospace engineering and LA Galaxy cheerleading to cybersecurity leader and viral creator. She explains how posting 3×daily on TikTok led to ~500K followers and a role at TikTok (global cybersecurity advocacy & culture), why she left after a year, and how she’s now helping others via Cyber Career Club. // Caitlin Sarian’s SOCIALS // Website: https://www.cybersecuritygirl.com/ Instagram: / cybersecuritygirl YouTube: / cybersecuritygirl LinkedIn: / caitlin-sarian TikTok: / cybersecuritygirl // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:29 - Intro 01:01 - Brilliant Ad 02:22 - Caitlin's History with TikTok 06:25 - Caitlin's Story 10:19 - Caitlin's Professional Journey 18:09 - How to be an Influencer 19:42 - Why you Need a Team 21:22 - Why you Need to Network 23:58 - All the Areas of Cyber 24:49 - Caitlin's Advice to her Younger Self 27:22 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cybersecurity #blackhat #cybersecuritygirl
To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription AI hype meets harsh reality. In this Black Hat interview, David Bombal talks with Gary Marcus (Professor Emeritus of Psychology and Neural Science at New York University, and AI Expert) just minutes after GPT-5’s announcement. Marcus explains why GPT-5 is only a small step forward, the truth about hallucinations, why AI coding agents pose massive cybersecurity risks, and why we may be years away from true AGI. If you want the unfiltered truth about AI progress, safety, and the future of large language models, watch this. // Gary Marcus’ SOCIALS // X: https://x.com/garymarcus Website: https://garymarcus.substack.com/ // Books REFERENCE // Mikko Hypponen: If it’s smart it’s vulnerable US: https://amzn.to/45Rc9PV UK: https://amzn.to/3V1tJdP Gary Marcus’ books: The Algebraic Mind US: https://amzn.to/4lxsca5 UK: https://amzn.to/45ASH8C Kluge: The Haphazard evolution of the human mind US: https://amzn.to/3V0gZnE UK: https://amzn.to/4mlzrn0 Rebooting AI: Building Artificial Intelligence We Can Trust US: https://amzn.to/45RhZRh UK: https://amzn.to/4lt7WGC Taming Silicon Valley: How we can ensure AI works for us US: https://amzn.to/4mH0Jnk UK: https://amzn.to/4oHO5GM Guitar Zero: The science of becoming musical at any age US: https://amzn.to/47uF2Ta UK: https://amzn.to/4oygoYd The birth of the mind: How a tiny number of genes create the complexities of human thought US: https://amzn.to/4oBnafB UK: https://amzn.to/3JimD1Y // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:00 - Intro 03:30 - Brilliant Ad 05:16 - Understanding the AI Hype 07:51 - Are Agents Writing Secure Code? 10:34 - Vibe Coding 11:56 - Should Agents Run Everything? 14:56 - Why do LLMs Hallucinate? 18:30 - Are AIs Intelligent? 20:21 - Will LLMs Stop Hallucinating? 24:50 - AI Security 29:24 - Will AGI Ever Happen? 31:48 - The Future of AI 35:08 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal Discover “Chasing Your Tail,” an open-source surveillance detection tool you can build with a Raspberry Pi. In this exclusive Black Hat interview, creator Matt explains how it tracks Wi-Fi, Bluetooth, and even tire sensors to spot if you’re being followed, then flips the script to map where your followers spend time. Learn the origins of this tool, from avoiding surprise visits to protecting informants and aiding search & rescue. We cover the tech stack (Kismet, Python, GPS integration), real-world success stories, and how you can set it up yourself for under $100. Perfect for security pros, privacy advocates, and tech enthusiasts. // Matt Edmondson SOCIALS // SANS: https://www.sans.org/profiles/matt-ed... LinkedIn: / matt-edmondson-759aab2b X: https://x.com/matt0177 Matt’s Block: https://www.digitalforensicstips.com/ // GitHub Code REFERENCE // https://github.com/ArgeliusLabs/Chasi... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming up 0:35 - Chasing your tail update // How it started 03:27 - Threatlocker sponsored segment 03:45 - What's in the box and how it works 07:37 - "It's basically free to build it" // Components used 09:20 - What coding language it runs on 11:25 - Unique network IDs in real life 12:47 - Tracking MAC addresses 14:51 - How to know who is tailing you 15:36 - How the device have helped people 16:49 - Tracking Bluetooth 18:23 - Reach out to Matthew Edmondson 19:04 - Black Hat Arsenal explained 19:52 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
David Bombal is joined by Gerald Combs, the creator of Wireshark, and Chris Greer, a well-known Wireshark trainer, for a comprehensive discussion about the past, present, and future of the world’s most popular network protocol analyzer. They explore how Wireshark was originally created as an open-source alternative to expensive packet sniffers, the evolution from its first release in 1998 (as Ethereal), and the community-driven development that led to over 2,300 contributors worldwide. The video also dives into the transition to the Wireshark Foundation, a nonprofit organization dedicated to supporting the tool and educating users globally. Topics covered include: The early days of Wireshark and why it was built The story behind the name change from Ethereal to Wireshark How Windows compatibility helped Wireshark go mainstream The launch of SharkFest and what makes it unique as a community-driven conference What attendees can expect from SharkFest in the US and Europe, including beginner-friendly tracks, expert sessions, and interactive challenges like Packet Doctors How the Wireshark Foundation supports the community and ensures long-term sustainability The introduction of the Wireshark Certified Analyst (WCA) certification and what it means for networking and cybersecurity professionals Real-world use cases for Wireshark in ethical hacking, packet forensics, and cybersecurity training The announcement of StratoShark, a new open-source companion tool for analyzing system call data and cloud logs with a familiar Wireshark-like interface Whether you're a network engineer, a cybersecurity professional, a developer, or just curious about how network analysis tools are built and used, this video provides deep technical insights, inspiring backstory, and practical guidance on how to level up your skills. // Website links REFERENCE // https://wireshark.org/certifications https://packetschool.teachable.com/?a... http://packetpioneer.com/courses https://stratoshark.org/ https://sharkfest.wireshark.org/ // Chris’ SOCIAL // X: https://x.com/packetpioneer YouTube: / @chrisgreer LinkedIn: / cgreer // Gerald Combs SOCIAL // LinkedIn: / geraldcombs // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thank you to DeleteMe for sponsoring this video. Go to http://joindeleteme.com/Bombal to receive a 20% discount. Discover how attackers exploit enterprise VPNs like Fortinet to gain admin access and compromise networks. In this video, OTW exposes a real authentication bypass exploit, explains the risks of outdated VPN devices, and shares expert tips on Linux, TCPDump, and staying secure. Perfect for cybersecurity pros, penetration testers, and anyone serious about digital defense. // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // YouTube video REFERENCE // Hacking IP Cameras: • Hacking IP Cameras (CCTV) with Demos and R... Are VPNs even safe now?: • Are VPNs even safe now? Hacker Explains // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thank you to Cisco for sponsoring this video and sponsoring my trip to Cisco Live San Diego. This video features David Bombal and Kyle Winters demonstrating practical cybersecurity techniques. Kyle walks through how to use Hydra to brute force SSH passwords, explaining the process of leveraging wordlists and optimizing the attack. Following the offensive demonstration, Kyle transitions into defensive measures, showing viewers how to quickly and easily set up an SSH honeypot using Cowrie. The honeypot serves as a decoy to attract and monitor malicious actors attempting to access a network. The demonstration includes setting up the honeypot on an Ubuntu host, configuring IP tables for port redirection, and monitoring logs for incoming connection attempts. The video highlights the importance of understanding both attack methods and defensive strategies in cybersecurity. Kyle also mentions free ethical hacking training resources available through Cisco Networking Academy (netacad.com) and future tutorials on Cisco U (u.cisco.com). // COMMANDS // Devices: client 192.168.1.10 server 192.168.1.11 ubuntu-honeypot 192.168.1.21 Nmap scan: nmap -sn 192.168.1.0/24 Verify Hydra installed: hydra -h Show wordlists: ls -al /usr/share/wordlists/ Crack with known username: hydra -l admin -P /usr/share/wordlists/top-passwords-shortlist.txt -t 4 -f ssh://192.168.1.11 Crack with unknown username: hydra -L /usr/share/wordlists/top-usernames-shortlist.txt -P /usr/share/wordlists/top-passwords-shortlist.txt -t 4 -f ssh://192.168.1.11 Create dir for Cowrie: mkdir cowrie cd cowrie/ Clone cowrie: git clone https://github.com/cowrie/cowrie . Launch the python virtual environment: python3 -m venv cowrie-env source cowrie-env/bin/activate Install python requirements: pip install --upgrade pip pip install -r requirements.txt Copy and edit the config: cp etc/cowrie.cfg.dist etc/cowrie.cfg vi etc/cowrie.cfg Setup port forwarding for SSH to Cowrie: sudo iptables -t nat -A PREROUTING -p tcp --dport 22 -j REDIRECT --to-port 2222 sudo iptables-save Start Cowrie: bin/cowrie start Check Cowrie status: bin/cowrie status View logs: tail -f var/log/cowrie/cowrie.log // Kyle Winter’s SOCIALS // Socials: / kyle-m-winters Cisco Blogs: https://blogs.cisco.com/author/kylewi... // Website REFERENCE // https://www.netacad.com/courses/ethic... https://u.cisco.com/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thank you to Cisco for sponsoring this video and sponsoring my trip to Cisco Live San Diego. See how Cisco engineer Kareem Iskander teams up with David Bombal at Cisco Live San Diego 2025 to build a self-healing network in real time. Using the new Model Context Protocol (MCP), Splunk logs, Meraki APIs, and Anthropic Claude, Kareem’s Python code lets an LLM detect configuration drift and automatically revert changes, no manual troubleshooting required. You will learn: • What MCP is and how it exposes trusted tools to an LLM • How Claude reads Splunk, correlates Meraki changes, and repairs configs • Why two lines of code can spin up an entire MCP server from OpenAPI specs • Where to find Kareem’s full code on GitHub and his upcoming Cisco U tutorial // Code // Get the code here: https://github.com/kiskander/mcp-splu... //Kareem Iskander SOCIALS // LinkedIn: / kiskander X: https://x.com/kareem_isk Cisco Blogs: https://blogs.cisco.com/author/kareem... // Website REFERENCE // https://github.com/kiskander/mcp-splu... https://u.cisco.com/tutorials/enhance... https://u.cisco.com/tutorials/network... https://u.cisco.com/tutorials/network... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thanks to Radware for sponsoring this video and sharing technical insights with us! David Bombal talks with Michael Geller (Radware) and Tim Sherman (Cisco) about how smart devices like fridges, cars, and cameras are being hijacked for DDoS attacks. They explain Web DDoS, encrypted Layer 7 threats, and how attackers bypass traditional firewalls. The discussion covers IoT botnets, API abuse, 5G core vulnerabilities, and how Cisco and Radware are defending cloud and edge infrastructure. // Radware’s SOCIALS // X: https://x.com/radware LinkedIn: / posts Website: https://www.radware.com/ // Web page REFERENCE // http://livethreatmap.radware.com https://www.radware.com/security/ddos... https://www.radware.com/solutions/web... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: https://open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: https://podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Your Firewall Won’t Save You From This Stop Is Your Car Launching Cyberattacks Your Home Appliances Weaponized by Cybercriminals DDoS Just Got Smarter Layer 7 Is Nightmare How Default Bots Cripple Hospitals and Systems Electric Cars Under Siege from Smart Devices Cybersecurity Blind Spot Your Car Is Compromised The Hidden Threat Everyday Devices Hacked Now Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thanks to Radware for sponsoring this video and sharing technical insights with us! // Radware reports REFERENCE // Executive Summary: https://davidbombal.wiki/2025threats 2025 Global Threat Analysis Report: https://davidbombal.wiki/2025threatsu... // Pascal Geenens’ SOCIAL // LinkedIn: / geenensp Website: https://www.radware.com/ // Radware SOCIAL // YouTube: / radwareinc Webinars: https://www.radware.com/newsroom/events/ LinkedIn / radware // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 01:03 - Intro 01:40 - What are the Reports About? 06:59 - Hacktivists (Dark Storm Team) 10:19 - DDos For Hire (Telegram) 13:24 - Check-Host.net 14:27 - Dienet 19:44 - How to Bring Down a Website 21:46 - DNS DDoS Attacks 26:28 - HTTP/2 29:22 - Botnet Capability 31:51 - Noname057 35:09 - Home Routers (TRS-069) 39:05 - Bullet Proof Cloud Services 45:13 - Vulnerable IoT 49:04 - Shodan (IoT Search Engine) 50:07 - Downloading Threats 52:45 - Application Programming Interfaces (APIs) 57:15 - Artificial Intelligence (AI) 01:06:49 - The Fight Against Bad AI 01:08:49 - How to Protect Yourself 01:14:52 - What is Radware? 01:16:00 - The Struggle of Downloading Models 01:20:06 - Should AI Keep your Data? 01:22:01 Connect with Pascal 01:22:36 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thank you to ThreatLocker for sponsoring my trip to ZTW25 and also for sponsoring this video. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal // GIVE AWAY// Gerald is giving away 10 seats in the Simply Cyber Academy GRC Analyst Master Class (Value: $149) to 10 lucky David Bombal viewers. To enter the giveaway go here: https://gleam.io/VVK24/simply-cyber-g... // DISCOUNT // To get 10% discount on Simply Cyber Academy GRC Analyst Master Class go here: https://simplycyber.io/grc use the following discount code BOMBAL10 // Gerald Auger’s SOCIAL // YouTube: / @simplycyber Website: https://www.simplycyber.io X: https://x.com/gerald_auger LinkedIn: / geraldauger Discord: https://simplycyber.io/discord // Daily Cyber Threat Live Stream REFERENCE // / geraldauger // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:53 - What is GRC (Governance, Risk and Compliance)? // GRC explained 04:42 - Businesses taking cyber security more seriously in 2025 07:21 - Is GRC a good career path? 09:58 - Cyber security careers are vast: pick your path 14:49 - Introverts can be successful in GRC 15:47 - GRC for the younger generation // The importance of networking with people 17:57 - Simply Cyber livestreams, live podcasts and discord community 19:17 - How to get started in GRC 20:35 - GRC Analyst Master Class 21:30 - How to get started in GRC (continued) 22:51 - Course giveaway and discount 23:42 - Simply Cyber Daily Cyber Threat Brief 26:51 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thank you to ThreatLocker for sponsoring my trip to ZTW25 and also for sponsoring this video. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal // Danny Jenkin’s SOCIAL // X: https://x.com/threatlocker LinkedIn: / dannyjenkinscyber // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Languages the ThreatLocker CEO can code in // Being a CEO that is technical 02:04 - How Danny became CEO // The backstory of Danny Jenkins, CEO & Co-Founder of ThreatLocker 08:37 - Being a technical CEO 10:28 - Having a team that is dedicated 13:23 - The importance of being technical and understanding every department 14:21 - Lessons learnt and advices 17:30 - Long-term vision for ThreatLocker 18:30 - What lead to starting ThreatLocker 19:59 - New releases from ThreatLocker 21:18 - Thoughts on AI // The influence of AI in cyber attacks 24:35 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thank you to ThreatLocker for sponsoring my trip to ZTW25 and also for sponsoring this video. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal // Luke Lafreniere’s SOCIAL // YouTube: / lukelafreniere YouTube: / @linustechtips LinkedIn: / luke-lafreniere-44138795 X: https://x.com/luke_iafr // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com

 // MENU // 0:00 - Coming up 0:36 - Luke from Linus Tech Tips irl 01:00 - Thoughts on the Rubber Ducky 02:48 - Thoughts on the O.MG cable 03:23 - The Linus Tech Tips breach // Using ThreatLocker as a solution 04:24 - Threat levels for the company 07:22 - Securing a growing company 10:41 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thank you to ThreatLocker for sponsoring this video and my trip to ZTW25. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal // Rob Allen’s SOCIAL // LinkedIn: / threatlockerrob X: https://x.com/threatlockerrob // YouTube video REFERENCE // Can this mind blowing Reverse Shell Attack be stopped?: • Can this Mind Blowing 🤯 Reverse Shell... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:44 - Intro 0:55 - Stopping Jackoby's Hack 02:10 - Threatlocker VS Traditional Solutions 03:33 - Deny By Default, Permit By Exception 05:06 - Ransomware Deployment Protocol (RDP) 06:58 - Are Organisations Safe? 10:31 - Allowlisting 11:48 - What is 'Ringfencing'? 13:20 - What is 'Network Control'? 16:44 - What About Cloud Security? 19:48 - Rob's Opinion on AI 22:33 - Threatlocker's Growth 24:51 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Live Amsterdam. // DJ Sampath’s SOCIAL // LinkedIn: / djsampath X: https://x.com/djsampath // YouTube Videos REFERENCE // Are you using a Hacked AI System?: • Are you using a Hacked AI system? Cisco AI Defense!: • Cisco AI Defense: Groundbreaking secu... // Blogs REFERENCE // https://blogs.cisco.com/security/eval... https://www.cisco.com/c/m/en_us/solut... https://blogs.cisco.com/security/eval... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:31 - Intro 01:30 - Can You Block AI? 03:10 - DJ's Demo (Cisco Cloud Security) 06:16 - Jailbreaking AI 09:58 - Deepseek's Open Source 11:41 - AI Defence 14:40 - Should We Avoid AI? 15:24 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #deepseek #chatgpt #ai
Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Live Amsterdam. // Jeetu Patel’s SOCIAL // LinkedIn: / jeetupatel Website: https://www.cisco.com/ X: https://x.com/jpatel41 // Cisco Live KEYNOTE // • LIVE: Cisco Live 2025 Amsterdam Openi... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:47 - The Hype Cycle of A.I. and Agentic A.I. 02:22 - OpenAI Operator 03:50 - The DeepSeek Effect 05:57 - The Operator Effect // Moving from API to NLI 10:42 - Artificial General Intelligence & Robotics 11:48 - The fear of A.I. in the short term 12:34 - Focusing on A.I. for long and short term 13:08 - Jeetu Patel's new role 14:00 - Core principles 15:20 - The future of networking and security 16:47 - Let A.I. do the rest 19:36 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #deepseek #chatgpt #ai
NOT Sponsored 😀 // Linux Basics for Hackers videos // Playlist: • Linux for Hackers // Viasat hack // YouTube video: • Satellite hacking (with real world ex... // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Article REFERENCE // https://www.hackers-arise.com/post/so... // Occupy The Web Books // Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free ... Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you n... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:45 - Intro 02:19 - VPN’s don’t protect you 08:45 - As of 2024 VPS’s don’t keep data safe 11:51 - How do I stop a hacker? 15:03 - Consumer VPN’s and browser fingerprints 19:53 - Is a VPN safe with public wifi? 22:35 - Using multiple layers of defence 24:50 - Is Tor better than a VPN? 27:07 - Tor vs. VPN 30:03 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thanks to Brilliant for sponsoring this video! To try everything Brilliant has to offer for free for a full 30 days and 20% discount visit: https://Brilliant.org/DavidBombal // Mike SOCIAL // X: / _mikepound Website: https://www.nottingham.ac.uk/research... // YouTube video reference // Teach your AI with Dr Mike Pound (Computerphile): • Train your AI with Dr Mike Pound (Com... Has Generative AI Already Peaked? - Computerphile: • Has Generative AI Already Peaked? - C... // Courses Reference // Deep Learning: https://www.coursera.org/specializati... AI For Everyone by Andrew Ng: https://www.coursera.org/learn/ai-for... Pytorch Tutorials: https://pytorch.org/tutorials/ Pytorch Github: https://github.com/pytorch/pytorch Pytorch Tensors: https://pytorch.org/tutorials/beginne... https://pytorch.org/tutorials/beginne... https://pytorch.org/tutorials/beginne... Python for Everyone: https://www.py4e.com/ // BOOK // Deep learning by Ian Goodfellow, Yoshua Bengio and Aaron Courville: https://amzn.to/3vmu4LP // PyTorch // Github: https://github.com/pytorch Website: https://pytorch.org/ Documentation: / pytorch // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:43 - Introduction 01:04 - State of AI in 2025 02:10 - AGI Hype: Realistic Expectations 03:15 - Sponsored Section 04:30 - Is AI Plateauing or Advancing? 06:26 - Overhype in AI Features Across Industries 08:01 - Is It Too Late to Start in AI? 09:16 - Where to Start in 2025 10:20 - Recommended Courses and Progression Paths 13:26 - Should I Go to School for AI? 14:18 - Learning AI Independently with Resources Online 17:24 - Machine Learning Progression 19:09 - What is a Notebook? 20:10 - Is AI the Top Skill to Learn in 2025? 23:49 - Other Niches and Fields 25:05 - Cyber Using AI 26:31 - AI on Different Platforms 27:13 - AI isn’t Needed Everywhere 29:57 - Leveraging AI 30:35 - AI as a Productivity Tool 31:55 - Retrieval Augmented Generation 33:28 - Concerns About Privacy with AI 36:01 - The Difference Between GPU’s, CPU’s, NPU’s etc. 37:30 - The Release of Sora38:56 - Will AI Take Our Job? 41:00 - Nvidia Says We Don’t Need Developers 43:47 - Devin Announcement 44:59 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Big thank you to DeleteMe for sponsoring this video. Go to http://joindeleteme.com/Bombal to receive a 20% discount. // Naomi Brockwell SOCIAL // YouTube: / naomibrockwelltv NBTV Newsletter: https://nbtv.substack.com/ Merch Shop: https://shop.nbtv.media/ Instagram: / nbtv.media TikTok: / naomibrockwell Website: https://naomibrockwell.com/ // Website REFERENCE // https://www.ludlowinstitute.org/ https://privacytests.org/ https://venice.ai/ // Books REFERENCE // Beginners Introduction to Privacy by Naomi Brockwell: US: https://amzn.to/3VJQLqu UK: https://amzn.to/49JltWg Extreme Privacy by Michael Bazzell US: https://amzn.to/4gBEuw5 UK: https://amzn.to/3ZUQoM6 // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 00:50 - Intro 01:40 - Naomi Brockwell’s Channel 02:33 - The Big Issue with Privacy in 2025 05:10 - Sponsored Section 07:54 - China’s Hacking of Our Telecommunications Network 11:15 - Is Telegram a Secure Communication Platform? 14:34 - Is WhatsApp a Good Choice for Privacy? 17:56 - How the Founder of WhatsApp Went on to Create Signal 18:41 - Why Privacy Matters and Who Needs It? 21:56 - Why Graphene is Ideal for Privacy 28:30 - Banking and Other Sensitive Apps on Phones 30:39 - How Google Play Services Work 31:57 - Apple & Google’s Bypass of VPNs 34:12 - What Most People Don’t Know About VPNs 37:46 - Recommended Desktop Setup 40:02 - Linux Distribution Recommendations 41:29 - Recommended Internet Browsers 47:00 - Alternative Web Browsers to Consider 49:22 - AI Will 10X Human Productivity 52:31 - Venice AI 55:47 - Hosting AI Locally 56:24 - Why We Need to Use AI for Privacy 01:04:43 - Modern Cars as Tracking Devices 01:13:14 - The Only Solution to the Privacy Crisis 01:15:56 - Things You Didn’t Know Were Tracking You 01:16:26 - Your Car is Listening 01:18:37 - Using Dumb Devices to Protect Yourself (IoT) 01:24:16 - Growing Awareness of Privacy Issues 01:29:48 - Consequences of Living Without Privacy 01:32:28 - How to Reach Naomi 01:33:31 - Conclusion & Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
loading
Комментарии (2)

Aaron Jacobs

It's really important to be cautious when buying a used car. One of the most crucial steps you can take is to check the vehicle’s history using its VIN, or Vehicle Identification Number. I recently came across a website called VIN check https://www.vindecoderz.com , and it’s a fantastic resource for anyone in your situation. By simply entering the VIN, you can access a comprehensive report that includes details about the car's past ownership, any accidents it may have been involved in, and its overall maintenance history.

Oct 29th
Ответить

Paja Storec

💚WATCH>>ᗪOᗯᑎᒪOᗩᗪ>>👉https://co.fastmovies.org

Jan 16th
Ответить