David Bombal
David Bombal
Want to learn about IT? Want to get ahead in your career? Well, this is the right place!
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.
This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.
David’s details:
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
Website: http://www.davidbombal.com
YouTube: https://www.youtube.com/davidbombal
All the best!
David
Episodes
Mentioned books

8 snips
Nov 4, 2024 • 52min
#482: Have you been hacked? Hacker explains how to find out!
In this discussion, OTW, an author and cybersecurity expert, shares crucial insights on identifying if your computer has been hacked. They debunk common hacking myths and highlight warning signs like system slowdowns and unusual online behavior. OTW emphasizes the importance of secure passwords and offers practical tools for detecting malware and monitoring system processes. Listeners also learn about effective ransomware protection strategies and how to differentiate between legitimate and malicious activity, ensuring better cybersecurity awareness.

Nov 4, 2024 • 55min
#481: Are You ready for these 2025 threats?
Kendall McKay, a Senior Intelligence Analyst at Cisco Talos and former US intelligence expert, joins Kirsty Paine, Field CTO at Splunk with a background in mathematics and UK cybersecurity. They discuss the evolving landscape of cyber threats, including the rise of ransomware and identity theft tactics like Business Email Compromise. The duo highlights the dual role of AI, addressing both its challenges and opportunities in cybersecurity. Additionally, they explore the future risks posed by quantum computing, emphasizing proactive measures needed to stay secure.

Oct 7, 2024 • 35min
#480: Car Privacy and Security Nightmare
Big thank you to DeleteMe for sponsoring this video. Go to http://joindeleteme.com/Bombal to receive a 20% discount.
// Sam Curry’s SOCIAL//
X: https://x.com/samwcyo
Website: https://samcurry.net/
Blog: https://samcurry.net/blog/
// YouTube video REFERENCE //
Hackers remotely hack millions of cars!
• Hackers remotely hack millions of cars!
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Intro
00:50 - DeleteMe sponsored segment
03:56 - The Kia hacking app
05:06 - The terrifying possibilities
06:08 - Hacking Kia cameras
07:44 - How the app works
12:18 - The vulnerability of connected cars // Breach of privacy
15:38 - Growing awareness to the issue
17:23 - Converting the license plate to the VIN number
20:04 - Reason for creating the app
21:39 - Simply hacking a Kia car
22:56 - What journalists think
24:34 - The right to repair congress hearing
25:13 - Security being left behind
27:57 - How taking over a car works
30:16 - Looking at the timeline
31:03 - Advice for new security researchers
34:46 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cars #hack #privacy

Oct 2, 2024 • 31min
#479: Are phones and cars next? Hacker explains: The Cybersecurity threat you need to worry about?
Delve into the unsettling world of modern technology and its vulnerabilities. Discover the dramatic implications of lithium battery explosions in electric cars and scooters. Explore cybersecurity threats emerging from our increasingly connected devices. The conversation draws chilling parallels to global conflicts, revealing how technology can be a tool for warfare. Separate fact from fiction regarding device explosion myths, and learn the importance of vigilance in a digitally advanced landscape. This is a wake-up call for everyone!

Sep 24, 2024 • 1h 20min
#478: Never access the Dark Web without doing this! (Tor and Telegram demos)
Stephen Sims, co-author of the Gray Hat Hacking Series, dives deep into the dark web's complexities. He emphasizes the critical importance of operational security when accessing this hidden part of the internet. The conversation covers the risks of malware and the tactics of law enforcement targeting illicit activities. Stephen also discusses the ethical dilemmas of cybersecurity knowledge, urging listeners to use their skills responsibly. Practical tips on using tools like Tor and VPNs for secure navigation highlight the episode's key takeaways.

Aug 14, 2024 • 33min
#476: New Cybersecurity Certification?
Jeremy Harbinger, a cybersecurity expert known for his engaging insights, dives into the development of the new SEC-100 certification. He breaks down the course's hands-on approach and its focus on practical skills essential for newcomers. The discussion highlights the evolving role of network engineers in cybersecurity and the impact of AI on hacking techniques. Listeners will also learn about the benefits of hands-on labs compared to traditional methods, preparing them for real-world challenges in the field.

Aug 12, 2024 • 44min
#477: How they use Bluetooth to target your car
This discussion unravels how thieves exploit Bluetooth to locate valuable items in vehicles. It highlights critical cybersecurity implications, showcasing tools like Flipper Zero for defensive measures. The conversation also covers Bluetooth Low Energy's evolution and the legality of jamming devices, diving into security vulnerabilities in both cars and homes. Unusual safety advice from police adds an intriguing twist, while the importance of awareness in preventing theft and unauthorized access is emphasized.

Aug 8, 2024 • 1h 12min
#475: Real World OSINT and Cyber Threat Intelligence Tips and Tricks
Gary Ruddell, an OSINT and cyber threat intelligence expert, shares his transformative journey from military to civilian life in cybersecurity. He offers insights on leveraging unique military skills and emphasizes the importance of continuous learning. The conversation explores the evolution of OSINT and CTI, touching on modern investigative techniques and ethical concerns. Ruddell also highlights the power of AI tools like ChatGPT for improving cyber intelligence efficiency and shares essential strategies for success in cybersecurity exams.

Aug 8, 2024 • 40min
#474: The real world truth about AI Hacking
Big Thank You to Cisco for sponsoring my trip to Cisco Live and this video!
// Omar’s SOCIALS //
LinkedIn: / santosomar
X: https://x.com/santosomar
Cisco Blogs: https://blogs.cisco.com/author/omarsa...
Website: https://omarsantos.io/
// Books by Omar REFERENCE //
The AI Revolution in Networking, CyberSecurity, and Emerging Technologies, Edition 1:
US: https://amzn.to/3xHFaPT
UK: https://amzn.to/3VN5zDP
Beyond the Algorithm:
US: https://amzn.to/3W85fkw
UK: https://amzn.to/3VJcbDg
// Specific Blog ARTICLES //
https://blogs.cisco.com/security/enha...
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Intro
00:49 - Omar Santos' books
02:59 - AI used for cyber attacks
06:14 - AI used in OSINT
07:14 - The rise of cyber attacks
09:13 - Hackers using AI
11:34 - Opportunities in cybersecurity with AI
18:52 - "It's like the wild west" // AI being accessible
23:16 - Privacy amidst AI
25:18 - Google's Secure AI Framework (SAIF)
27:48 - How to get into AI
31:25 - Constitutional AI
33:09 - Roadmap to learn AI
37:23 - Cisco AI certification
39:46 - Conclusion
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#cybersecurity #ai #artificialintelligence

Aug 8, 2024 • 1h 11min
#473: How to be Invisible Online using Expert OSINT techniques
Big shoutout to KASM for sponsoring this video. KASM workspaces supports the OSINT Community Efforts by providing the following products:
Kasm Community Edition: https://kasmweb.com/community-edition
Kasm Cloud OSINT: https://kasmweb.com/cloud-personal
Kasm Workspaces OSINT Platform for Professionals/: https://kasmweb.com/osint
Kasm Infrastructure/Apps for OSINT Collection: https://registry.kasmweb.com/1.0/
// MJ Banias’ SOCIALS //
LinkedIn: / mjbanias
Cloak and Dagger Podcast (Spotify): https://open.spotify.com/show/6mT8zDM...
The Debrief: https://thedebrief.org/podcasts/
Instagram: / mjbanias
X: https://x.com/mjbanias
Website: https://www.bullshithunting.com/
// Ritu Gill’ SOCIALS //
LinkedIn: / ritugill-osinttechniques
OSINT Techniques website: https://www.osinttechniques.com/
Instagram: https://www.osinttechniques.com/
X: https://x.com/osinttechniques
YouTube: / @forensicosint
Forensic OSINT website: https://www.forensicosint.com/
TikTok: / osint.techniques
// Rae Baker’s SOCIALS //
Website: https://www.raebaker.net/
LinkedIn: linkedin.com/in/raebakerosint
X: https://x.com/wondersmith_rae
// Eliot Higgins’ SOCIALS //
Bellingcat website: https://www.bellingcat.com/author/eli...
X: https://x.com/eliothiggins
// Books //
The UFO People: A Curious Culture by MJ Banias:
USA: https://amzn.to/3xP5Jme
UK: https://amzn.to/4cOrzoK
Deep Dive: Exploring the Real-world Value of Open Source Intelligence by Rae Baker and Micah Hoffman:
USA: https://amzn.to/3xFN9gv
UK: https://amzn.to/3zJSy6z
We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News by Eliot Higgins:
USA: https://amzn.to/3RXNa64
UK: https://amzn.to/4cvYP4B
// YouTube video REFERENCE //
Top 10 FREE OSINT tools (with demos): • Top 10 FREE OSINT tools (with demos) ...
Deep Dive OSINT: • Deep Dive OSINT (Hacking, Shodan and ...
Best Hacking Python Book: • Best Hacking Python Book?
She Hacked Me: • She hacked me!
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
Twitter: www.twitter.com/davidbombal
Instagram: www.instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: www.facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Coming up
00:41 - Sponsored Section: KASM Workspaces demo
06:26 - Intro
06:46 - MJ’s Journey in OSINT
11:14 - Starting an OSINT Company
11:55 - Teaching Background
12:34 - Years in OSINT
13:19 - Advice for People Starting Out
15:44 - What It Means to Do OSINT
16:54 - Recommended Tools for OSINT
19:03 - Meet Ritu Gil
19:09 - Characteristics of a Good OSINT Investigator
20:03 - Knowing When to Give Up
20:43 - Soft Skills vs Technical Skills
22:17 - Ritu’s Advice on How to Get Started
23:24 - Are There Jobs in OSINT?
24:39 - Forensic OSINT Demo
26:41 - Tinder Vulnerabilities
30:51 - Next Guest Intro
32:04 - Rae Baker
32:33 - Tools Rae Uses
34:11 - From Graphic Design to OSINT
37:56 - Volunteering to Learn
39:10 - Next Guest Intro
40:10 - Eliot Higgins
40:19 - Eliot’s Background into OSINT
41:44 - Bellingcat
44:27 - No Degree Needed to Start
45:37 - Useful Tools to Use
47:19 - Advice for People Starting Out
48:36 - Communities to Join
51:50 - Recommended Books
53:03 - How MJ Got the Job
55:53 - MJ Shares an OSINT Story
01:02:44 - Importance of a Team
01:08:15 - Conclusion
01:10:34 - Outro
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.


