David Bombal

David Bombal
undefined
Nov 12, 2025 • 50min

#520: Watch Your WiFi: One Infected Phone Takes Over Your Life

Occupy The Web, a cybersecurity expert and founder of Hackers Arise, dives deep into the world of digital threats. He reveals how even Apple iPhones can harbor serious malware and discusses the infamous Pegasus spyware. The conversation explores how one compromised phone can jeopardize your entire smart home network and why existing defenses often fall short. OTW also highlights the relentless nature of spyware sales, legal limitations, and the critical need for personal vigilance in an increasingly insecure digital landscape.
undefined
13 snips
Nov 8, 2025 • 49min

#519: Build Your First OSINT Bookmarklet in 5 Minutes

Micah Hoffman and Griffin G are OSINT experts and co-founders of MyOSINT Training, specializing in investigative tools. They dive into how to extract hidden data from popular platforms using simple JavaScript bookmarklets. The duo discusses practical applications in law enforcement, helps investigators craft tools with AI, and explains the importance of operational security when utilizing these techniques. They're passionate about empowering others to build their own OSINT resources, making sophisticated investigations accessible to everyone.
undefined
Oct 17, 2025 • 28min

#518: How Cisco Links Data Centers: 64x800G at 51.2 Tbps Securely

Big thanks to Cisco for Sponsoring this video. For more information about the topic being discussed follow the following link: https://blogs.cisco.com/news/the-thir... Cisco’s Martin Lund joins David Bombal to unpack how AI-scale networking really works - and why a 51.2 Tbps, 64×800G, post-quantum–ready router matters. We break down scale-up vs scale-out vs scale-across, deep buffers to prevent drops on long-haul links, line-rate IPsec/MACsec, SONiC vs IOS XR, P4 programmability, coherent optics for ~1000 km DCI, and how these pieces enable exabit-class fabrics for AI clusters. What you’ll learn • Why GPUs are useless without massive, reliable interconnects • 51.2 Tbps with 64×800G ports and what that enables for AI training • Deep buffers vs shallow buffers and when each wins • Line-rate encryption today and post-quantum readiness tomorrow • SONiC on Cisco Silicon One, P4, and automation at hyperscale If you found this useful, hit subscribe and share with your favorite network nerd. It’s always the network. // Martin Lund’s SOCIALS // LinkedIn: / martinlundca // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:54 - Intro 0:59 - Martin's Background 02:15 - Martin's Advice 02:48 - Cisco's Announcement 06:12 - Data Center Scaling 07:02 - Data Centres Scaling Across 11:08 - New Router Speeds 13:24 - Securing the Data Center (Quantum Computing) 17:57 - Are Deep Buffers Efficient? 19:25 - New Protocols 22:50 - Data Center Infrastructure 24:07 - 8804 Router Innovations 25:33 - The Future of Data Centers 27:50 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cisco #networking #ai
undefined
Oct 6, 2025 • 40min

#517: Have you been hacked? Advanced detection method

OTW, a digital forensics practitioner and author behind OccupyTheWeb, shares expertise on detecting hacks using OSQuery, a powerful tool that turns system data into a queryable database. He discusses real-world cases involving harassment and business disputes to illustrate key signs of compromise, including suspicious processes and registry entries. Listeners learn how to identify fileless malware and the limitations of traditional antivirus systems. OTW provides practical SQL-style commands to help users investigate potential breaches effectively.
undefined
Oct 6, 2025 • 25min

#516: He Saved The DOOM Creator

Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal In this interview from Black Hat 2025, David Bombal sits down with two cybersecurity legends: David Cowen (Digital Forensics Expert) and Evan Anderson (Red Team Operator and Tool Builder). They give an unfiltered look at the real world of hacking, forensics, and career-building in cybersecurity. What we'll cover: • How the SolarWinds hack was discovered with never-before-heard forensics insight • Real-world red teaming using HVAC exploits, USB pivots, and AWS chaos • The Oculus vs. Carmack lawsuit story from the expert who worked the case • How to start your career in cybersecurity, even without a degree • What the CCDC program is and why it leads to 3 job offers instantly • How AI is changing the game for hackers and defenders alike // David Cowen’s SOCIALS // SANS Profile: https://www.sans.org/profiles/david-c... LinkedIn: / dcowen X: / dcowen // Evan Anderson SOCIALS // Offensive Context: https://blog.offensivecontext.com/aut... LinkedIn: / syndrowm GitHub: https://github.com/syndrowm // Website REFERENCE // https://www.nationalccdc.org/ https://www.sans.org/emea https://ctftime.org/ https://www.uscyberpatriot.org/ // YouTube Channel REFERENCE // 13Cubed: / @13cubed // David Cowen’s Books REFERENCE // Computer Forensics: US: https://amzn.to/47yeH70 UK: https://amzn.to/460ErGs Hacking Exposed Computer Forensics: Secrets and Solutions US: https://amzn.to/4mYevCW UK: https://amzn.to/46q07NH Hacking Exposed Computer Forensics: Secrets and Solutions: US: https://amzn.to/4mT3T8k UK: https://amzn.to/4m8zaCS // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming up 0:49 - Intro 01:13 - Sponsored Section 01:29 - (AWS) Amazon Web Services 03:04 - David Cowen’s Background 03:46 - Evan Anderson’s Background 05:18 - Advice for young people To Get A Job In this Space 05:56 - The Solar Winds Hack? 10:43 - Finding a needle in a Haystack 11:08 - The Oculus Story 13:00 - Evan in Red Teaming 15:55 - Advice To Younger self 16:51 - Recommended Courses 19:42 - Importance of Networking 20:19 - Recommended Certifications 24:13 - Is AI Taking All The Jobs ? 24:57 - Connect With David & Evan online 25:12 - Conclusion & Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
undefined
Sep 24, 2025 • 1h

#515: Phishing the AI: Zero-Click NIGHTMARE

In this discussion, cybersecurity expert Pascal Geenens dives into the chilling world of AI vulnerabilities. He explains how 'agents' pose new insider risks and can be manipulated through phishing—a method he terms 'ShadowLeak.' Pascal warns about the dangers of prompt injection and highlights how automated tools empower attackers. He also touches on the growing opportunities in cybersecurity for newcomers, encouraging a proactive approach to secure AI deployment. With insights into the evolving threat landscape, this chat is a must-listen for anyone concerned about digital security!
undefined
Sep 22, 2025 • 43min

#514: Why People Buy the WRONG Laptops for Hacking

Big thanks to Proton VPN for sponsoring this video. To get 64% discount to your Proton VPN Plus subscription, please use the following link: https://protonvpn.com/davidbombal Want a “hacker” laptop without wasting cash? In this candid breakdown with OTW, we cut through the hype and show you what actually matters for learning pentesting in 2025: prioritising RAM over flashy GPUs, picking VMware (free for personal use) for reliable labs, using refurbs/minis/Raspberry Pi, and planning for where wireless hacking is going (Bluetooth/BLE/Zigbee) — not just Wi-Fi. We also cover AMD vs Intel vs Apple M-chips/ARM for Linux VMs, when cloud cracking makes sense, and why daily practice beats buying gadgets. Highlights: • Best beginner specs (RAM first, SSD nice, storage ≠ speed) • VMware vs VirtualBox for home labs • AMD/Intel vs Apple M-chips/ARM for Kali/Parrot VMs • Alpha adapters & aircrack-ng compatibility; Nordic nRF52 for BLE • Budget path: used/refurb, mini-PCs, Pi, phone/cloud labs (HTB/THM) • The 80/20 rule of hacking: skills are greater than gear If you’re delaying until you can afford a $2 – 3k laptop, don’t. Start now, learn daily, and upgrade later. // Occupy The Web SOCIAL // X: / three_cube Website: https://hackers-arise.net/ // Occupy The Web Books // Linux Basics for Hackers 2nd Ed US: https://amzn.to/3TscpxY UK: https://amzn.to/45XaF7j Linux Basics for Hackers: US: https://amzn.to/3wqukgC UK: https://amzn.to/43PHFev Getting Started Becoming a Master Hacker US: https://amzn.to/4bmGqX2 UK: https://amzn.to/43JG2iA Network Basics for hackers: US: https://amzn.to/3yeYVyb UK: https://amzn.to/4aInbGK // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/ // Playlists REFERENCE // Linux Basics for Hackers: • Linux for Hackers Tutorial (And Free Courses) Mr Robot: • Hack like Mr Robot // WiFi, Bluetooth and ... Hackers Arise / Occupy the Web Hacks: • Hacking Tools (with demos) that you need t... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 01:21 - Proton VPN sponsored segment 03:16 - Get started and start learning 08:39 - Computer specs: CPU, GPU, RAM & Hard drives 16:46 - Time vs Money 17:58 - Virtual machines 19:15 - Computer specs overview 22:17 - Wi-Fi adaptors for Wi-Fi hacking 24:17 - Bluetooth dongles for Bluetooth hacking 26:57 - "80% Person & 20% Machine" 29:17 - Do you need hacking gadgets? 31:57 - Apple vs Intel vs AMD 35:53 - Learn hacking with a smartphone 37:01 - Learn hacking with a Raspberry Pi 39:32 - Kali Linux vs ParrotOS (Which OS to use?) 40:58 - The problem with Chromebooks 42:02 - Using Hack The Box/TryHackMe // Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacking #laptop #vm
undefined
Sep 20, 2025 • 48min

#513: Is your WiFi or Internet slow? This can fix it.

Justin Melloni and Andre du Iuri from Juniper Networks delve into AI-native SD-WAN solutions that enhance internet connectivity. They reveal how tunnel-free setups boost speeds and how Marvis AI chats with users to troubleshoot network issues in real-time. The duo covers practical tips for monitoring Zoom and Teams call quality while explaining straightforward security protocols. Listeners will appreciate insights on catching network issues before work begins, making slow internet woes a thing of the past.
undefined
9 snips
Sep 15, 2025 • 38min

#512: All Encryption Hacked in 3 Years?

Occupy The Web, a cybersecurity expert and author known for his insights into Linux, hacking, and encryption, joins the discussion. He warns that quantum computing could break current encryption methods like RSA within three years. The conversation covers the urgent need for post-quantum cryptography, the risks associated with client-side scanning, and nation-states' strategies to exploit vulnerabilities. They also touch on ethical dilemmas concerning AI on personal devices and privacy, making this a crucial listen for anyone concerned about data security.
undefined
15 snips
Sep 13, 2025 • 26min

#511: Becoming a Ghost Online: 3 Privacy Levels

In this discussion, privacy expert Mishaal Khan, founder of OperationPrivacy.com, unveils essential strategies for guarding your online identity. He shares insights into his free dashboard that categorizes privacy into three levels: Conscious, Serious, and Ghost. Discover practical steps like freezing your credit, opting out of data brokers, and using harmless decoys to push down unwanted search results. Mishaal also dives into the importance of manual intervention in maintaining online privacy and offers tips for dealing with personal content removal.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app