David Bombal

David Bombal
undefined
Nov 28, 2025 • 25min

#524: Why Cisco Built This AI Device

Join Cisco executive Kevin Wollenweber, a networking expert, as he unveils the groundbreaking Unified Edge device. Discover how this innovative technology combines servers, networking, and security for a seamless edge experience. Kevin dives into the implications of Physical AI, urgent security challenges, and the game-changing Cisco–NVIDIA partnership. Learn about edge AI applications in retail and manufacturing, the complexities of managing agent identities, and the future of data centers as they evolve to meet massive networking demands.
undefined
Nov 26, 2025 • 22min

#523: Why We Are MASSIVELY Underestimating AI Infrastructure Demand

Jeetu Patel, a technology executive specializing in infrastructure and security, dives into the overlooked demand for AI infrastructure. He argues that power is the core constraint while GPUs are essential assets. Networking acts as a force multiplier, enabling massive scalability across data centers. Patel emphasizes the rising significance of edge AI with unified platforms for secure, plug-and-play solutions. He also highlights critical bottlenecks in AI adoption, including infrastructure needs, trust deficits, and data gaps, reshaping our understanding of AI's future.
undefined
Nov 26, 2025 • 15min

#522: Does Traditional Encryption End in 2027?

Join Vijoy Pandey, a quantum computing and networking expert at Cisco, as he dives into the future of cybersecurity and encryption. He reveals that distributed quantum computing is set to arrive sooner than expected, shaking the foundations of traditional encryption methods. Vijoy introduces the 'Store Now, Harvest Later' threat, highlighting how adversaries could capture encrypted data for future decryption. He discusses Cisco's pivotal role in developing quantum networking technologies and the advantages of post-quantum cryptography, setting the stage for a revolution in data security.
undefined
Nov 21, 2025 • 1h 6min

#521: Why GrapheneOS is Almost Impossible to Crack (Forensic Teams Have Tried)

Dive into the world of GrapheneOS with expert MetropleX as they debunk myths and explore its unmatched security features. Learn why it's more secure than iOS's lockdown mode and how it manages banking apps and notifications. Discover the intricacies of app compatibility, including how Play Services are sandboxed, and the innovative tracking mitigation strategies in place. Uncover the challenges forensic teams face when attempting to breach Pixel devices running GrapheneOS. A fascinating look at privacy and security in the digital age!
undefined
Nov 12, 2025 • 50min

#520: Watch Your WiFi: One Infected Phone Takes Over Your Life

Occupy The Web, a cybersecurity expert and founder of Hackers Arise, dives deep into the world of digital threats. He reveals how even Apple iPhones can harbor serious malware and discusses the infamous Pegasus spyware. The conversation explores how one compromised phone can jeopardize your entire smart home network and why existing defenses often fall short. OTW also highlights the relentless nature of spyware sales, legal limitations, and the critical need for personal vigilance in an increasingly insecure digital landscape.
undefined
13 snips
Nov 8, 2025 • 49min

#519: Build Your First OSINT Bookmarklet in 5 Minutes

Micah Hoffman and Griffin G are OSINT experts and co-founders of MyOSINT Training, specializing in investigative tools. They dive into how to extract hidden data from popular platforms using simple JavaScript bookmarklets. The duo discusses practical applications in law enforcement, helps investigators craft tools with AI, and explains the importance of operational security when utilizing these techniques. They're passionate about empowering others to build their own OSINT resources, making sophisticated investigations accessible to everyone.
undefined
Oct 17, 2025 • 28min

#518: How Cisco Links Data Centers: 64x800G at 51.2 Tbps Securely

Big thanks to Cisco for Sponsoring this video. For more information about the topic being discussed follow the following link: https://blogs.cisco.com/news/the-thir... Cisco’s Martin Lund joins David Bombal to unpack how AI-scale networking really works - and why a 51.2 Tbps, 64×800G, post-quantum–ready router matters. We break down scale-up vs scale-out vs scale-across, deep buffers to prevent drops on long-haul links, line-rate IPsec/MACsec, SONiC vs IOS XR, P4 programmability, coherent optics for ~1000 km DCI, and how these pieces enable exabit-class fabrics for AI clusters. What you’ll learn • Why GPUs are useless without massive, reliable interconnects • 51.2 Tbps with 64×800G ports and what that enables for AI training • Deep buffers vs shallow buffers and when each wins • Line-rate encryption today and post-quantum readiness tomorrow • SONiC on Cisco Silicon One, P4, and automation at hyperscale If you found this useful, hit subscribe and share with your favorite network nerd. It’s always the network. // Martin Lund’s SOCIALS // LinkedIn: / martinlundca // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:54 - Intro 0:59 - Martin's Background 02:15 - Martin's Advice 02:48 - Cisco's Announcement 06:12 - Data Center Scaling 07:02 - Data Centres Scaling Across 11:08 - New Router Speeds 13:24 - Securing the Data Center (Quantum Computing) 17:57 - Are Deep Buffers Efficient? 19:25 - New Protocols 22:50 - Data Center Infrastructure 24:07 - 8804 Router Innovations 25:33 - The Future of Data Centers 27:50 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #networking #ai
undefined
Oct 6, 2025 • 40min

#517: Have you been hacked? Advanced detection method

Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription. Think you’ve been hacked? In this video, David Bombal and OTW (OccupyTheWeb) walk you through OSQuery - a free, open-source tool that lets you query your operating system like a database. You’ll learn the exact SQL-style commands to find: • Listening processes & remote connections (spot command-and-control) • Suspicious services and misspelled look-alikes • Persistence via registry startup items and scheduled tasks • Fileless malware (on_disk = 0) running only in RAM OTW draws from real digital forensics cases (200+ inquiries/month), including harassment, divorce disputes, and business rivalries. We also explain why antivirus often fails once malware is resident—and what you can do next (kill the process, remove the file, and harden startup entries). // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // YouTube video REFERENCE // Have you been hacked? Hacker explains how to find out: • Have you been hacked? Hacker explains how ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:35 - Introduction 01:08 - The New Python Book 01:41 - Sponsored Section 02:49 - OTW Shares a Cool Tool 05:11 - Why This Tool is Powerful 06:45 - Latest Hacking Trends 09:59 - Who Should Use This Tool (and When) 10:54 - What Happens When You’re Hacked 11:20 - Why Hackers Need Access First 12:02 - After Installing the Software 12:39 - How to Query a Database 14:43 - Exploring OS Query’s Page 16:14 - Finding Unwanted Services on Your Computer 18:06 - Narrowing Down the Data 22:06 - Tracing the Hacker’s Footsteps 23:11 - The Case of the Husband Who Hacked His Wife 24:31 - Are You Being Hacked by the CIA? 25:31 - The Attacker’s Go-To Move 26:25 - Understanding the Windows Registry 29:55 - Investigating Scheduled Tasks 30:48 - Common Hacker Techniques 32:11 - Checking the Processes Running on Your System 33:48 - Is Chrome Malicious? 35:05 - Why Most Home Users Get Hacked 36:16 - Should You Rely on Anti-Virus? 37:48 - Windows vs Mac: Which Gets Hacked More? 38:30 - Getting Hacked Through a Friend’s Link 39:10 - Tutorials for Finding Malware on Your System 39:34 - Outro & Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacked #osquery #cybersecurity
undefined
Oct 6, 2025 • 25min

#516: He Saved The DOOM Creator

Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal In this interview from Black Hat 2025, David Bombal sits down with two cybersecurity legends: David Cowen (Digital Forensics Expert) and Evan Anderson (Red Team Operator and Tool Builder). They give an unfiltered look at the real world of hacking, forensics, and career-building in cybersecurity. What we'll cover: • How the SolarWinds hack was discovered with never-before-heard forensics insight • Real-world red teaming using HVAC exploits, USB pivots, and AWS chaos • The Oculus vs. Carmack lawsuit story from the expert who worked the case • How to start your career in cybersecurity, even without a degree • What the CCDC program is and why it leads to 3 job offers instantly • How AI is changing the game for hackers and defenders alike // David Cowen’s SOCIALS // SANS Profile: https://www.sans.org/profiles/david-c... LinkedIn: / dcowen X: / dcowen // Evan Anderson SOCIALS // Offensive Context: https://blog.offensivecontext.com/aut... LinkedIn: / syndrowm GitHub: https://github.com/syndrowm // Website REFERENCE // https://www.nationalccdc.org/ https://www.sans.org/emea https://ctftime.org/ https://www.uscyberpatriot.org/ // YouTube Channel REFERENCE // 13Cubed: / @13cubed // David Cowen’s Books REFERENCE // Computer Forensics: US: https://amzn.to/47yeH70 UK: https://amzn.to/460ErGs Hacking Exposed Computer Forensics: Secrets and Solutions US: https://amzn.to/4mYevCW UK: https://amzn.to/46q07NH Hacking Exposed Computer Forensics: Secrets and Solutions: US: https://amzn.to/4mT3T8k UK: https://amzn.to/4m8zaCS // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming up 0:49 - Intro 01:13 - Sponsored Section 01:29 - (AWS) Amazon Web Services 03:04 - David Cowen’s Background 03:46 - Evan Anderson’s Background 05:18 - Advice for young people To Get A Job In this Space 05:56 - The Solar Winds Hack? 10:43 - Finding a needle in a Haystack 11:08 - The Oculus Story 13:00 - Evan in Red Teaming 15:55 - Advice To Younger self 16:51 - Recommended Courses 19:42 - Importance of Networking 20:19 - Recommended Certifications 24:13 - Is AI Taking All The Jobs ? 24:57 - Connect With David & Evan online 25:12 - Conclusion & Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
undefined
Sep 24, 2025 • 1h

#515: Phishing the AI: Zero-Click NIGHTMARE

In this discussion, cybersecurity expert Pascal Geenens dives into the chilling world of AI vulnerabilities. He explains how 'agents' pose new insider risks and can be manipulated through phishing—a method he terms 'ShadowLeak.' Pascal warns about the dangers of prompt injection and highlights how automated tools empower attackers. He also touches on the growing opportunities in cybersecurity for newcomers, encouraging a proactive approach to secure AI deployment. With insights into the evolving threat landscape, this chat is a must-listen for anyone concerned about digital security!

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app