

David Bombal
David Bombal
Want to learn about IT? Want to get ahead in your career? Well, this is the right place!
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
Episodes
Mentioned books

Nov 14, 2024 • 55min
#483: the most advanced SPYING device ever created? #privacy
Big thank you to Brilliant for sponsoring this video! To try Brilliant for free (for 30 days) and to get a 20% discount, visit: https://Brilliant.org/davidbombal
// Rob Braxman’s SOCIAL//
YouTube: / @robbraxmantech
Website: https://brax.me/home/rob
GitHub: https://github.com/robbraxman
X: https://x.com/robbraxmantech
// YouTube videos mentioned //
Is Skynet already watching you?: • Is Skynet watching you already?
Your VPN won’t protect you: • Your VPN won't protect you 😱
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
// MENU //
0:00 - Coming up
01:09 - Intro
02:42 - Why The iPhone 16 is So Bad
05:29 - Sponsored Section
07:28 - iPhones Communicating Without Internet
09:22 - iPhone To iPhone Mirroring
10:21 - A Device that is Always Watching You
11:27 - The Worst Spying Technology
14:10 - Google Sensor Vault
15:49 - The AI Issues
19:10 - What Are AI Agents?
26:48 - How AI Stores Information About You
33:04 - How AI Works in Context
36:49 - Will They Send your Data to Central Servers?
39:20 - They Will Call It Your Personal Assistant
41:05 - Rob's Predictions
43:34 - The iPhone Spying Sensors
47:12 - Advice How To Keep Your Privacy
54:47 - Conclusion
54:56 - Outro

8 snips
Nov 4, 2024 • 52min
#482: Have you been hacked? Hacker explains how to find out!
In this discussion, OTW, an author and cybersecurity expert, shares crucial insights on identifying if your computer has been hacked. They debunk common hacking myths and highlight warning signs like system slowdowns and unusual online behavior. OTW emphasizes the importance of secure passwords and offers practical tools for detecting malware and monitoring system processes. Listeners also learn about effective ransomware protection strategies and how to differentiate between legitimate and malicious activity, ensuring better cybersecurity awareness.

Nov 4, 2024 • 55min
#481: Are You ready for these 2025 threats?
Kendall McKay, a Senior Intelligence Analyst at Cisco Talos and former US intelligence expert, joins Kirsty Paine, Field CTO at Splunk with a background in mathematics and UK cybersecurity. They discuss the evolving landscape of cyber threats, including the rise of ransomware and identity theft tactics like Business Email Compromise. The duo highlights the dual role of AI, addressing both its challenges and opportunities in cybersecurity. Additionally, they explore the future risks posed by quantum computing, emphasizing proactive measures needed to stay secure.

Oct 7, 2024 • 35min
#480: Car Privacy and Security Nightmare
Big thank you to DeleteMe for sponsoring this video. Go to http://joindeleteme.com/Bombal to receive a 20% discount.
// Sam Curry’s SOCIAL//
X: https://x.com/samwcyo
Website: https://samcurry.net/
Blog: https://samcurry.net/blog/
// YouTube video REFERENCE //
Hackers remotely hack millions of cars!
• Hackers remotely hack millions of cars!
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Intro
00:50 - DeleteMe sponsored segment
03:56 - The Kia hacking app
05:06 - The terrifying possibilities
06:08 - Hacking Kia cameras
07:44 - How the app works
12:18 - The vulnerability of connected cars // Breach of privacy
15:38 - Growing awareness to the issue
17:23 - Converting the license plate to the VIN number
20:04 - Reason for creating the app
21:39 - Simply hacking a Kia car
22:56 - What journalists think
24:34 - The right to repair congress hearing
25:13 - Security being left behind
27:57 - How taking over a car works
30:16 - Looking at the timeline
31:03 - Advice for new security researchers
34:46 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cars #hack #privacy

Oct 2, 2024 • 31min
#479: Are phones and cars next? Hacker explains: The Cybersecurity threat you need to worry about?
Delve into the unsettling world of modern technology and its vulnerabilities. Discover the dramatic implications of lithium battery explosions in electric cars and scooters. Explore cybersecurity threats emerging from our increasingly connected devices. The conversation draws chilling parallels to global conflicts, revealing how technology can be a tool for warfare. Separate fact from fiction regarding device explosion myths, and learn the importance of vigilance in a digitally advanced landscape. This is a wake-up call for everyone!

Sep 24, 2024 • 1h 20min
#478: Never access the Dark Web without doing this! (Tor and Telegram demos)
Stephen Sims, co-author of the Gray Hat Hacking Series, dives deep into the dark web's complexities. He emphasizes the critical importance of operational security when accessing this hidden part of the internet. The conversation covers the risks of malware and the tactics of law enforcement targeting illicit activities. Stephen also discusses the ethical dilemmas of cybersecurity knowledge, urging listeners to use their skills responsibly. Practical tips on using tools like Tor and VPNs for secure navigation highlight the episode's key takeaways.

Aug 14, 2024 • 33min
#476: New Cybersecurity Certification?
Jeremy Harbinger, a cybersecurity expert known for his engaging insights, dives into the development of the new SEC-100 certification. He breaks down the course's hands-on approach and its focus on practical skills essential for newcomers. The discussion highlights the evolving role of network engineers in cybersecurity and the impact of AI on hacking techniques. Listeners will also learn about the benefits of hands-on labs compared to traditional methods, preparing them for real-world challenges in the field.

Aug 12, 2024 • 44min
#477: How they use Bluetooth to target your car
This discussion unravels how thieves exploit Bluetooth to locate valuable items in vehicles. It highlights critical cybersecurity implications, showcasing tools like Flipper Zero for defensive measures. The conversation also covers Bluetooth Low Energy's evolution and the legality of jamming devices, diving into security vulnerabilities in both cars and homes. Unusual safety advice from police adds an intriguing twist, while the importance of awareness in preventing theft and unauthorized access is emphasized.

Aug 8, 2024 • 1h 12min
#475: Real World OSINT and Cyber Threat Intelligence Tips and Tricks
Gary Ruddell, an OSINT and cyber threat intelligence expert, shares his transformative journey from military to civilian life in cybersecurity. He offers insights on leveraging unique military skills and emphasizes the importance of continuous learning. The conversation explores the evolution of OSINT and CTI, touching on modern investigative techniques and ethical concerns. Ruddell also highlights the power of AI tools like ChatGPT for improving cyber intelligence efficiency and shares essential strategies for success in cybersecurity exams.

Aug 8, 2024 • 40min
#474: The real world truth about AI Hacking
Big Thank You to Cisco for sponsoring my trip to Cisco Live and this video!
// Omar’s SOCIALS //
LinkedIn: / santosomar
X: https://x.com/santosomar
Cisco Blogs: https://blogs.cisco.com/author/omarsa...
Website: https://omarsantos.io/
// Books by Omar REFERENCE //
The AI Revolution in Networking, CyberSecurity, and Emerging Technologies, Edition 1:
US: https://amzn.to/3xHFaPT
UK: https://amzn.to/3VN5zDP
Beyond the Algorithm:
US: https://amzn.to/3W85fkw
UK: https://amzn.to/3VJcbDg
// Specific Blog ARTICLES //
https://blogs.cisco.com/security/enha...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Intro
00:49 - Omar Santos' books
02:59 - AI used for cyber attacks
06:14 - AI used in OSINT
07:14 - The rise of cyber attacks
09:13 - Hackers using AI
11:34 - Opportunities in cybersecurity with AI
18:52 - "It's like the wild west" // AI being accessible
23:16 - Privacy amidst AI
25:18 - Google's Secure AI Framework (SAIF)
27:48 - How to get into AI
31:25 - Constitutional AI
33:09 - Roadmap to learn AI
37:23 - Cisco AI certification
39:46 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cybersecurity #ai #artificialintelligence