David Bombal
David Bombal
Want to learn about IT? Want to get ahead in your career? Well, this is the right place!
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
Episodes
Mentioned books

Nov 28, 2025 • 25min
#524: Why Cisco Built This AI Device
Join Cisco executive Kevin Wollenweber, a networking expert, as he unveils the groundbreaking Unified Edge device. Discover how this innovative technology combines servers, networking, and security for a seamless edge experience. Kevin dives into the implications of Physical AI, urgent security challenges, and the game-changing Cisco–NVIDIA partnership. Learn about edge AI applications in retail and manufacturing, the complexities of managing agent identities, and the future of data centers as they evolve to meet massive networking demands.

Nov 26, 2025 • 22min
#523: Why We Are MASSIVELY Underestimating AI Infrastructure Demand
Jeetu Patel, a technology executive specializing in infrastructure and security, dives into the overlooked demand for AI infrastructure. He argues that power is the core constraint while GPUs are essential assets. Networking acts as a force multiplier, enabling massive scalability across data centers. Patel emphasizes the rising significance of edge AI with unified platforms for secure, plug-and-play solutions. He also highlights critical bottlenecks in AI adoption, including infrastructure needs, trust deficits, and data gaps, reshaping our understanding of AI's future.

Nov 26, 2025 • 15min
#522: Does Traditional Encryption End in 2027?
Join Vijoy Pandey, a quantum computing and networking expert at Cisco, as he dives into the future of cybersecurity and encryption. He reveals that distributed quantum computing is set to arrive sooner than expected, shaking the foundations of traditional encryption methods. Vijoy introduces the 'Store Now, Harvest Later' threat, highlighting how adversaries could capture encrypted data for future decryption. He discusses Cisco's pivotal role in developing quantum networking technologies and the advantages of post-quantum cryptography, setting the stage for a revolution in data security.

Nov 21, 2025 • 1h 6min
#521: Why GrapheneOS is Almost Impossible to Crack (Forensic Teams Have Tried)
Dive into the world of GrapheneOS with expert MetropleX as they debunk myths and explore its unmatched security features. Learn why it's more secure than iOS's lockdown mode and how it manages banking apps and notifications. Discover the intricacies of app compatibility, including how Play Services are sandboxed, and the innovative tracking mitigation strategies in place. Uncover the challenges forensic teams face when attempting to breach Pixel devices running GrapheneOS. A fascinating look at privacy and security in the digital age!

Nov 12, 2025 • 50min
#520: Watch Your WiFi: One Infected Phone Takes Over Your Life
Occupy The Web, a cybersecurity expert and founder of Hackers Arise, dives deep into the world of digital threats. He reveals how even Apple iPhones can harbor serious malware and discusses the infamous Pegasus spyware. The conversation explores how one compromised phone can jeopardize your entire smart home network and why existing defenses often fall short. OTW also highlights the relentless nature of spyware sales, legal limitations, and the critical need for personal vigilance in an increasingly insecure digital landscape.

13 snips
Nov 8, 2025 • 49min
#519: Build Your First OSINT Bookmarklet in 5 Minutes
Micah Hoffman and Griffin G are OSINT experts and co-founders of MyOSINT Training, specializing in investigative tools. They dive into how to extract hidden data from popular platforms using simple JavaScript bookmarklets. The duo discusses practical applications in law enforcement, helps investigators craft tools with AI, and explains the importance of operational security when utilizing these techniques. They're passionate about empowering others to build their own OSINT resources, making sophisticated investigations accessible to everyone.

Oct 17, 2025 • 28min
#518: How Cisco Links Data Centers: 64x800G at 51.2 Tbps Securely
Big thanks to Cisco for Sponsoring this video. For more information about the topic being discussed follow the following link: https://blogs.cisco.com/news/the-thir...
Cisco’s Martin Lund joins David Bombal to unpack how AI-scale networking really works - and why a 51.2 Tbps, 64×800G, post-quantum–ready router matters. We break down scale-up vs scale-out vs scale-across, deep buffers to prevent drops on long-haul links, line-rate IPsec/MACsec, SONiC vs IOS XR, P4 programmability, coherent optics for ~1000 km DCI, and how these pieces enable exabit-class fabrics for AI clusters.
What you’ll learn
• Why GPUs are useless without massive, reliable interconnects
• 51.2 Tbps with 64×800G ports and what that enables for AI training
• Deep buffers vs shallow buffers and when each wins
• Line-rate encryption today and post-quantum readiness tomorrow
• SONiC on Cisco Silicon One, P4, and automation at hyperscale
If you found this useful, hit subscribe and share with your favorite network nerd. It’s always the network.
// Martin Lund’s SOCIALS //
LinkedIn: / martinlundca
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:54 - Intro
0:59 - Martin's Background
02:15 - Martin's Advice
02:48 - Cisco's Announcement
06:12 - Data Center Scaling
07:02 - Data Centres Scaling Across
11:08 - New Router Speeds
13:24 - Securing the Data Center (Quantum Computing)
17:57 - Are Deep Buffers Efficient?
19:25 - New Protocols
22:50 - Data Center Infrastructure
24:07 - 8804 Router Innovations
25:33 - The Future of Data Centers
27:50 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cisco #networking #ai

Oct 6, 2025 • 40min
#517: Have you been hacked? Advanced detection method
Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription.
Think you’ve been hacked? In this video, David Bombal and OTW (OccupyTheWeb)
walk you through OSQuery - a free, open-source tool that lets you query your
operating system like a database. You’ll learn the exact SQL-style commands to find:
• Listening processes & remote connections (spot command-and-control)
• Suspicious services and misspelled look-alikes
• Persistence via registry startup items and scheduled tasks
• Fileless malware (on_disk = 0) running only in RAM
OTW draws from real digital forensics cases (200+ inquiries/month),
including harassment, divorce disputes, and business rivalries. We also
explain why antivirus often fails once malware is resident—and what you can
do next (kill the process, remove the file, and harden startup entries).
// Occupy The Web SOCIAL //
X: / three_cube
Website: https://hackers-arise.net/
// Occupy The Web Books //
Linux Basics for Hackers 2nd Ed
US: https://amzn.to/3TscpxY
UK: https://amzn.to/45XaF7j
Linux Basics for Hackers:
US: https://amzn.to/3wqukgC
UK: https://amzn.to/43PHFev
Getting Started Becoming a Master Hacker
US: https://amzn.to/4bmGqX2
UK: https://amzn.to/43JG2iA
Network Basics for hackers:
US: https://amzn.to/3yeYVyb
UK: https://amzn.to/4aInbGK
// OTW Discount //
Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/
// YouTube video REFERENCE //
Have you been hacked? Hacker explains how to find out: • Have you been hacked? Hacker explains how ...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming Up
0:35 - Introduction
01:08 - The New Python Book
01:41 - Sponsored Section
02:49 - OTW Shares a Cool Tool
05:11 - Why This Tool is Powerful
06:45 - Latest Hacking Trends
09:59 - Who Should Use This Tool (and When)
10:54 - What Happens When You’re Hacked
11:20 - Why Hackers Need Access First
12:02 - After Installing the Software
12:39 - How to Query a Database
14:43 - Exploring OS Query’s Page
16:14 - Finding Unwanted Services on Your Computer
18:06 - Narrowing Down the Data
22:06 - Tracing the Hacker’s Footsteps
23:11 - The Case of the Husband Who Hacked His Wife
24:31 - Are You Being Hacked by the CIA?
25:31 - The Attacker’s Go-To Move
26:25 - Understanding the Windows Registry
29:55 - Investigating Scheduled Tasks
30:48 - Common Hacker Techniques
32:11 - Checking the Processes Running on Your System
33:48 - Is Chrome Malicious?
35:05 - Why Most Home Users Get Hacked
36:16 - Should You Rely on Anti-Virus?
37:48 - Windows vs Mac: Which Gets Hacked More?
38:30 - Getting Hacked Through a Friend’s Link
39:10 - Tutorials for Finding Malware on Your System
39:34 - Outro & Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#hacked #osquery #cybersecurity

Oct 6, 2025 • 25min
#516: He Saved The DOOM Creator
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal
In this interview from Black Hat 2025, David Bombal sits down with two cybersecurity legends: David Cowen (Digital Forensics Expert) and Evan Anderson (Red Team Operator and Tool Builder). They give an unfiltered look at the real world of hacking, forensics, and career-building in cybersecurity.
What we'll cover:
• How the SolarWinds hack was discovered with never-before-heard forensics insight
• Real-world red teaming using HVAC exploits, USB pivots, and AWS chaos
• The Oculus vs. Carmack lawsuit story from the expert who worked the case
• How to start your career in cybersecurity, even without a degree
• What the CCDC program is and why it leads to 3 job offers instantly
• How AI is changing the game for hackers and defenders alike
// David Cowen’s SOCIALS //
SANS Profile: https://www.sans.org/profiles/david-c...
LinkedIn: / dcowen
X: / dcowen
// Evan Anderson SOCIALS //
Offensive Context: https://blog.offensivecontext.com/aut...
LinkedIn: / syndrowm
GitHub: https://github.com/syndrowm
// Website REFERENCE //
https://www.nationalccdc.org/
https://www.sans.org/emea
https://ctftime.org/
https://www.uscyberpatriot.org/
// YouTube Channel REFERENCE //
13Cubed: / @13cubed
// David Cowen’s Books REFERENCE //
Computer Forensics:
US: https://amzn.to/47yeH70
UK: https://amzn.to/460ErGs
Hacking Exposed Computer Forensics: Secrets and Solutions
US: https://amzn.to/4mYevCW
UK: https://amzn.to/46q07NH
Hacking Exposed Computer Forensics: Secrets and Solutions:
US: https://amzn.to/4mT3T8k
UK: https://amzn.to/4m8zaCS
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
YouTube: / @davidbombal
Spotify: open.spotify.com/show/3f6k6gE...
SoundCloud: / davidbombal
Apple Podcast: podcasts.apple.com/us/podcast...
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// Menu //
0:00 - Coming up
0:49 - Intro
01:13 - Sponsored Section
01:29 - (AWS) Amazon Web Services
03:04 - David Cowen’s Background
03:46 - Evan Anderson’s Background
05:18 - Advice for young people To Get A Job In this Space
05:56 - The Solar Winds Hack?
10:43 - Finding a needle in a Haystack
11:08 - The Oculus Story
13:00 - Evan in Red Teaming
15:55 - Advice To Younger self
16:51 - Recommended Courses
19:42 - Importance of Networking
20:19 - Recommended Certifications
24:13 - Is AI Taking All The Jobs ?
24:57 - Connect With David & Evan online
25:12 - Conclusion & Outro
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.

Sep 24, 2025 • 1h
#515: Phishing the AI: Zero-Click NIGHTMARE
In this discussion, cybersecurity expert Pascal Geenens dives into the chilling world of AI vulnerabilities. He explains how 'agents' pose new insider risks and can be manipulated through phishing—a method he terms 'ShadowLeak.' Pascal warns about the dangers of prompt injection and highlights how automated tools empower attackers. He also touches on the growing opportunities in cybersecurity for newcomers, encouraging a proactive approach to secure AI deployment. With insights into the evolving threat landscape, this chat is a must-listen for anyone concerned about digital security!


