David Bombal

David Bombal
undefined
9 snips
Sep 15, 2025 • 38min

#512: All Encryption Hacked in 3 Years?

Occupy The Web, a cybersecurity expert and author known for his insights into Linux, hacking, and encryption, joins the discussion. He warns that quantum computing could break current encryption methods like RSA within three years. The conversation covers the urgent need for post-quantum cryptography, the risks associated with client-side scanning, and nation-states' strategies to exploit vulnerabilities. They also touch on ethical dilemmas concerning AI on personal devices and privacy, making this a crucial listen for anyone concerned about data security.
undefined
15 snips
Sep 13, 2025 • 26min

#511: Becoming a Ghost Online: 3 Privacy Levels

In this discussion, privacy expert Mishaal Khan, founder of OperationPrivacy.com, unveils essential strategies for guarding your online identity. He shares insights into his free dashboard that categorizes privacy into three levels: Conscious, Serious, and Ghost. Discover practical steps like freezing your credit, opting out of data brokers, and using harmless decoys to push down unwanted search results. Mishaal also dives into the importance of manual intervention in maintaining online privacy and offers tips for dealing with personal content removal.
undefined
Sep 11, 2025 • 32min

#510: 20–30% Of Attacks Use AI: John Hammond details today’s hybrid attacks

To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription. In this 2025 deep-dive, David Bombal sits down with John Hammond to map the real state of hacking: classic ransomware/infostealers meet AI-assisted malware (including code that leverages LLMs). We unpack the ClickFix and FileFix social-engineering patterns, fake CAPTCHA and “save/upload” flows that trick users into running payloads, and the practical Windows mitigations (policy/registry ideas) you should know. John shares why he estimates 20–30% of attacks now have some AI touch, how social engineering scales, and where defenders can push back. For your career, he argues opportunities are expanding: use CTFs, show your work on GitHub/video, and consider OSCP for signaling. He also introduces Just Hacking Training (JHT), handson hack-alongs, archived CTFs, free upskill challenges, and pay-what-you-want courses with industry all-stars. What you’ll learn: • How ClickFix/FileFix actually trick users • Realistic mitigation tactics you can apply • The current role of AI in malware • Career roadmap: CTFs → OSCP → portfolio • Where to get hands-on: JHT resources // John Hammond’s SOCIALS // YouTube: / @_johnhammond X: https://x.com/_johnhammond LinkedIn: / johnhammond010 Discord: / discord Instagram: / _johnhammond TikTok: / johnhammond010 GitHub: https://github.com/JohnHammond Humble Bundle: https://www.humblebundle.com/?partner... Just Hacking Training: https://www.justhacking.com/ ClickFix Website: https://clickfix-wiki.github.io/ // YouTube video REFERENCE // Linux got hacked with this AI Image: • Linux got Hacked with this AI image! Hackers trick everyone to run malware (FileFix): • hackers trick everyone to run malware (Fil... OSINT Tools to track you down: • OSINT tools to track you down. You cannot ... // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:58 - Intro & Current State of Hacking 03:42 - Brilliant Advert 05:14 - The Wave of AI Attacks 07:43 - Click(Fix) Hack 10:10 - FileFix: The Future Hacks 11:14 - Current Affairs & Social Engineering 15:17 - Raising Awareness 19:18 - Security Research 20:51 - Is There a Future for Younger People in This Industry? 22:54 - What Should I Do to Get There? 24:11 - Recommended Certifications 26:34 - Where Do I Start? 28:26 - About John Hammond’s Work 31:12 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
undefined
Sep 11, 2025 • 30min

#509: AI + Metasploit = Terrifyingly Easy Hacking is here (demo)

Kyle Winters, security practitioner who builds Metasploit integrations, demonstrates an AI-driven ethical-hacking lab. Short demos show an LLM linked to Metasploit via MCP automating recon, generating a risk report, and running exploits like VSFTPD, EternalBlue and UnrealIRCD. Conversations cover how this lowers barriers for red teams and what defenders should watch for.
undefined
Sep 1, 2025 • 19min

#508: NOT Production-Ready: 2025 AI Coding Reality Check

Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal AI can turn weeks of coding into seconds, but at what cost? Katie Paxton-Fear demonstrates how to use Gemini to generate a sprint plan and Cursor to build a Python port scanner from natural language. It works… and that’s the problem. We unpack how “vibe coding” blinds even pros to security, why these tools aren’t production-ready, and the guardrails you need for ethical hacking and internal tooling. What you’ll learn • How to turn ideas → sprint plan → working code (Gemini + Cursor) • Why silent vulnerabilities make AI-built apps risky • Ethical hacker use cases (agents, scanners) without shipping insecure code • Policy tips: disclosure, internal use, avoiding shadow IT Tools mentioned: Gemini, Cursor (AI IDE), Claude (briefly), v0 // Katie Paxton-Fear SOCIALS // Website: https://insiderphd.dev/ LinkedIn: https://www.linkedin.com/in/katiepf/?... YouTube: / insiderphd X: https://x.com/InsiderPhD // YouTube video REFERENCE // • Vibe Coding in Cursor for Cyber Security // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // Menu // 0:00 - Coming Up: AI Vibe Coding Explained 01:08 - Intro with Katie Paxton-Fear (Cybersecurity Expert) 02:53 - ThreatLocker Security Overview 03:06 - What is Vibe Coding in AI Development? 04:51 - Live Demo Example of Vibe Coding 05:20 - Google Gemini and Gems for Coding 08:22 - Cursor AI and Writing Code Faster 09:59 - Coffee Break (Quick Pause) 10:02 - Risks of Vibe Coding in Cybersecurity 11:24 - Port Scanner Explained 11:34 - Vibe Coding Pros and Cons (Full Breakdown) 14:02 - Port Scan Results Analysis 14:22 - Why AI Code Isn’t Production Ready Yet 15:53 - Katie’s Final Advice & Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. Key topics: vibe coding, AI coding, port scanning, secure-by-design If you’re experimenting with AI coding, watch this before you deploy anything. #blackhat #vibecoding #security
undefined
Sep 1, 2025 • 22min

#507: He Quit Cybersecurity After 34 Years — Here’s Why

Big thank you to Proton Pass for sponsoring this video. To sign up for Proton Pass, please use the following link https://proton.me/davidbombal to get a 60% discount. Cybersecurity icon Mikko Hyppönen sits down with David Bombal at Black Hat to explain his bold move from antivirus to anti-drone defense after 34 years. He breaks down why mobile operating systems are the biggest security improvement of the past 15 years, how attackers have shifted from device exploits to human scams, and why he believes defenders currently have the edge with AI. They unpack the rise of fiber-tethered drones that evade RF detection, the coming reality of autonomous “killer robots” (not yet here—but inevitable), and the grim state of privacy as everyday IoT devices go online by default—his “internet asbestos” warning. Mikko also reflects on achieving keynote goals at DEF CON, RSA, and Black Hat, and shares career advice: set goals, don’t drift. Topics: mobile OS security, social engineering, AI for defense, zero-day research, drone warfare, privacy and encryption policy, IoT risks, career pivot. // Mikko Hypponen’s SOCIALS // X: https://x.com/mikko Website: https://mikko.com/ LinkedIn: https://www.linkedin.com/in/hypponen/... // Books REFERENCE // If it’s smart it’s vulnerable: US: https://amzn.to/41lkSaG UK: https://amzn.to/4oTpOgN // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - Mikko Hyppönen keynote talks 01:51 - Proton Pass sponsored segment 04:09 - Pivoting from cybersecurity to anti-drone 09:28 - Humanoid robots are near 09:54 - How cybersecurity has improved 12:11 - Defenders have the advantage with AI 15:26 - Pros and Cons of the AI revolution 16:57 - Privacy is dying 21:36 - Advice for your future // Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
undefined
Sep 1, 2025 • 28min

#506: ZERO Coding: How She Broke Into Cyber

In this conversation, Caitlin Sarian, known as Cybersecurity Girl, discusses her intriguing journey from aerospace engineering and cheerleading for LA Galaxy to becoming a cybersecurity leader. She shares how her TikTok fame, with nearly 500K followers, led her to a role in cybersecurity advocacy at TikTok. Caitlin emphasizes the importance of networking and soft skills for breaking into cyber careers, advises on content creation without perfectionism, and discusses her mission with the Cyber Career Club to promote diversity in STEM.
undefined
6 snips
Aug 18, 2025 • 36min

#505: GPT-5 Just Dropped… And It’s NOT What You Think

In this engaging discussion, Gary Marcus, a Professor Emeritus of Psychology and Neural Science at NYU and an AI expert, dives into the reality of GPT-5’s release. He argues that it’s far from a breakthrough, unraveling the truth about AI hallucinations and the cybersecurity risks posed by coding agents. The conversation also highlights the significant limitations of AI in achieving real intelligence, emphasizing that we may be years away from true AGI. Marcus shares his insights on the hype surrounding AI and the urgent need for transparency in its development.
undefined
Aug 18, 2025 • 20min

#504: How to Track the People Tracking YOU

Matt Edmondson, creator of the surveillance detection tool "Chasing Your Tail," shares his insights from 22 years as a federal agent. He breaks down how this innovative tool uses Raspberry Pi to detect Wi-Fi and Bluetooth signals, helping you identify if you're being followed. Matt discusses the technical details behind Kismet and the importance of open-source tech in cybersecurity. He shares real-world applications, including successful search and rescue operations, showcasing how you can create your own tracking system for under $100.
undefined
Jul 16, 2025 • 45min

#503: He CREATED Wireshark - And It Changed Cybersecurity FOREVER

Gerald Combs, the original creator of Wireshark, and Chris Greer, a renowned trainer, dive into the revolutionary journey of this beloved network protocol analyzer. They discuss its humble beginnings, the vital name change from Ethereal, and how it achieved mainstream success thanks to Windows compatibility. The pair highlights SharkFest's unique community-driven approach and the introduction of StratoShark, a powerful companion tool. They also introduce the Wireshark Certified Analyst certification, emphasizing the importance of skills in cybersecurity and networking.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app