<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"><channel><title><![CDATA[David Bombal on Odysee]]></title><description><![CDATA[Want to learn about IT? Want to get ahead in your career?  Well, this is the right place! <br /><br />On this channel, I discuss Python, Ethical Hacking, Networking, Network Automation, CCNA, Virtualization and other IT related topics.<br />   <br />This YouTube channel has new videos every week! Subscribe for technical, detailed, no fluff content.<br /><br />Are you interested in sponsoring me? Email: sponsor@davidbombal.com <br /><br />David’s details:<br />Discord: https://discord.com/invite/usKSyzb<br />Twitter: https://www.twitter.com/davidbombal <br />Instagram: https://www.instagram.com/davidbombal <br />LinkedIn: https://www.linkedin.com/in/davidbombal <br />Facebook: https://www.facebook.com/davidbombal.co <br />Website: http://www.davidbombal.com  <br />YouTube: https://www.youtube.com/davidbombal <br /><br />All the best!<br />David]]></description><link>https://odysee.com/@davidbombal:0</link><image><url>https://thumbnails.lbry.com/UCP7WmQ_U4GB3K51Od9QvM0w</url><title>David Bombal on Odysee</title><link>https://odysee.com/@davidbombal:0</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 06 Apr 2026 04:11:37 GMT</lastBuildDate><atom:link href="https://odysee.com/$/rss/@davidbombal:0" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><itunes:author>David Bombal</itunes:author><itunes:category text="Leisure"></itunes:category><itunes:image href="https://thumbnails.lbry.com/UCP7WmQ_U4GB3K51Od9QvM0w"/><itunes:owner><itunes:name>David Bombal</itunes:name><itunes:email>no-reply@odysee.com</itunes:email></itunes:owner><itunes:explicit>false</itunes:explicit><item><title><![CDATA[Dark Web Hackers for Hire: Even you are a target]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/t_Oy395P4Q0" width="480" alt="thumbnail" title="Dark Web Hackers for Hire: Even you are a target" /></p>Thank you to ThreatLocker for sponsoring my trip to ZTW26 and also for sponsoring this video.  To start your free trial with ThreatLocker please use the following link:  https://www.threatlocker.com/davidbombal<br /><br />// Colin Ellis’ SOCIAL //<br />LinkedIn:  https://www.linkedin.com/in/collinellis95/<br /><br />// ThreatLocker’s SOCIAL //<br />LinkedIn:  https://www.linkedin.com/company/threatlockerinc/posts/?feedView=all<br />X:  https://x.com/threatlocker<br />Instagram:  https://www.instagram.com/threatlocker/<br />Website:  https://www.threatlocker.com/<br /><br />// David's SOCIAL // <br />Discord: https://discord.com/invite/usKSyzb <br />X: https://www.twitter.com/davidbombal <br />Instagram: https://www.instagram.com/davidbombal <br />LinkedIn: https://www.linkedin.com/in/davidbombal <br />Facebook: https://www.facebook.com/davidbombal.co <br />TikTok: http://tiktok.com/@davidbombal <br />YouTube: https://www.youtube.com/@davidbombal<br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ<br />SoundCloud:  https://soundcloud.com/davidbombal<br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532<br /><br />// MY STUFF //<br /> https://www.amazon.com/shop/davidbombal <br /><br />// SPONSORS // <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com<br /><br />// MENU //<br />0:00 - Coming up<br />01:00 - Intro<br />02:24 - Demo Start - Clear Net<br />03:37 - Tails and Tor<br />04:55 - Navigating the Dark Web<br />07:28 - Hire a Hacker<br />14:30 - Script Kitties and We The North<br />20:42 - Zero Trust World<br />21:46 - Ransomware Group Clop<br />23:35 - Digital Hygiene<br />27:17 - Outro<br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! <br /><br />Disclaimer: This video is for educational purposes only.<br /><br />#darkweb #hacking #tor<br />...<br />https://www.youtube.com/watch?v=t_Oy395P4Q0]]></description><link>https://odysee.com/dark-web-hackers-for-hire-even-you-are-a:e0922059a9490fa53e7fdf87cfd419775442a71f</link><guid isPermaLink="true">https://odysee.com/dark-web-hackers-for-hire-even-you-are-a:e0922059a9490fa53e7fdf87cfd419775442a71f</guid><pubDate>Sun, 05 Apr 2026 14:01:20 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/dark-web-hackers-for-hire-even-you-are-a/e0922059a9490fa53e7fdf87cfd419775442a71f/17cca7.mp4" length="146784157" type="video/mp4"/><itunes:title>Dark Web Hackers for Hire: Even you are a target</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/t_Oy395P4Q0"/><itunes:duration>1650</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Linux Cat]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/Bp-FCYLario" width="480" alt="thumbnail" title="Linux Cat" /></p>Linux cat command has lots of nice options. Here I'll show you some of them.<br /><br />#cat #linux #cats<br />...<br />https://www.youtube.com/watch?v=Bp-FCYLario]]></description><link>https://odysee.com/linux-cat:70eabb9722824aec905ba7fb2ac267b7ea55eea7</link><guid isPermaLink="true">https://odysee.com/linux-cat:70eabb9722824aec905ba7fb2ac267b7ea55eea7</guid><pubDate>Fri, 03 Apr 2026 18:30:16 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/linux-cat/70eabb9722824aec905ba7fb2ac267b7ea55eea7/e1c191.mp4" length="11726355" type="video/mp4"/><itunes:title>Linux Cat</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/Bp-FCYLario"/><itunes:duration>163</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Does DNSSEC give you encrypted DNS?]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/4L9Gde1l_K4" width="480" alt="thumbnail" title="Does DNSSEC give you encrypted DNS?" /></p>Is this is a myth: DNSSEC gives you encryption? What does DNSSEC actually do?<br /><br />Full interview here: https://youtu.be/Rrr4HrI8E6g<br /><br />Big thank you to Infoblox for sponsoring this video.  To learn more about Infoblox please visit:  https://www.infoblox.com/ <br /><br />#dns #dnssec #encryption<br />...<br />https://www.youtube.com/watch?v=4L9Gde1l_K4]]></description><link>https://odysee.com/does-dnssec-give-you-encrypted-dns:432fd4611a98ff2a3953c37ab3f3168ef30151a9</link><guid isPermaLink="true">https://odysee.com/does-dnssec-give-you-encrypted-dns:432fd4611a98ff2a3953c37ab3f3168ef30151a9</guid><pubDate>Thu, 02 Apr 2026 15:45:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/does-dnssec-give-you-encrypted-dns/432fd4611a98ff2a3953c37ab3f3168ef30151a9/2ec8ae.mp4" length="20276896" type="video/mp4"/><itunes:title>Does DNSSEC give you encrypted DNS?</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/4L9Gde1l_K4"/><itunes:duration>175</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Why Qubits Teleport INSTANTLY]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/YLRGUhCNPXc" width="480" alt="thumbnail" title="Why Qubits Teleport INSTANTLY" /></p>How does quantum teleportation work? And how does it use entanglement to instantly transfer qubit information across a classical network for advanced computing.<br /><br />Thank you to Cisco for sponsoring this video and my trip to Cisco Live EMEA!<br /><br />#quantum #teleportation #networking<br />...<br />https://www.youtube.com/watch?v=YLRGUhCNPXc]]></description><link>https://odysee.com/why-qubits-teleport-instantly:0b68f62672102b65a05a34faacbb85b4e82bad10</link><guid isPermaLink="true">https://odysee.com/why-qubits-teleport-instantly:0b68f62672102b65a05a34faacbb85b4e82bad10</guid><pubDate>Thu, 02 Apr 2026 14:00:48 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/why-qubits-teleport-instantly/0b68f62672102b65a05a34faacbb85b4e82bad10/846fbf.mp4" length="9273862" type="video/mp4"/><itunes:title>Why Qubits Teleport INSTANTLY</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/YLRGUhCNPXc"/><itunes:duration>98</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Why Hide My Email FAILS]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/8ET6w15hhzY" width="480" alt="thumbnail" title="Why Hide My Email FAILS" /></p>Apple's Hide My Email might not be as private as you think. See how the FBI got a user's real address and what true online privacy requires.<br /><br />#apple #fbi #email<br />...<br />https://www.youtube.com/watch?v=8ET6w15hhzY]]></description><link>https://odysee.com/why-hide-my-email-fails:989a1980c46e17916d4fb2dcd6b97e68fbb61617</link><guid isPermaLink="true">https://odysee.com/why-hide-my-email-fails:989a1980c46e17916d4fb2dcd6b97e68fbb61617</guid><pubDate>Wed, 01 Apr 2026 14:00:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/why-hide-my-email-fails/989a1980c46e17916d4fb2dcd6b97e68fbb61617/30e000.mp4" length="14944915" type="video/mp4"/><itunes:title>Why Hide My Email FAILS</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/8ET6w15hhzY"/><itunes:duration>178</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[HOW the NSA monitors your VPN]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/QaHroNIJHk4" width="480" alt="thumbnail" title="HOW the NSA monitors your VPN" /></p>Think a VPN keeps you safe? Using a commercial VPN might actually expose your internet traffic to NSA spying and warrantless surveillance under Section 702.<br /><br />#vpn #nsa #surveillance<br />...<br />https://www.youtube.com/watch?v=QaHroNIJHk4]]></description><link>https://odysee.com/how-the-nsa-monitors-your-vpn:313e152d869e8b7d7583d9d3fbeb51aa973914e1</link><guid isPermaLink="true">https://odysee.com/how-the-nsa-monitors-your-vpn:313e152d869e8b7d7583d9d3fbeb51aa973914e1</guid><pubDate>Tue, 31 Mar 2026 14:00:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/how-the-nsa-monitors-your-vpn/313e152d869e8b7d7583d9d3fbeb51aa973914e1/67563b.mp4" length="14575935" type="video/mp4"/><itunes:title>HOW the NSA monitors your VPN</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/QaHroNIJHk4"/><itunes:duration>176</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[4 SECRET Google Easter Eggs]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/_ihIu4uF4Tk" width="480" alt="thumbnail" title="4 SECRET Google Easter Eggs" /></p>Did you know Google has hidden Easter eggs? Discover how to unlock 4 secret search tricks on Google.com, from SpongeBob to Isaac Newton, that every tech fan should know!<br /><br />#google #eastereggs #spongebob<br />...<br />https://www.youtube.com/watch?v=_ihIu4uF4Tk]]></description><link>https://odysee.com/4-secret-google-easter-eggs:344b11817168875ce9f74ac3eb1c9f27dfaaa636</link><guid isPermaLink="true">https://odysee.com/4-secret-google-easter-eggs:344b11817168875ce9f74ac3eb1c9f27dfaaa636</guid><pubDate>Mon, 30 Mar 2026 16:00:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/4-secret-google-easter-eggs/344b11817168875ce9f74ac3eb1c9f27dfaaa636/cd441d.mp4" length="4723377" type="video/mp4"/><itunes:title>4 SECRET Google Easter Eggs</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/_ihIu4uF4Tk"/><itunes:duration>56</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Google Big Sleep: The End of Human Hackers?]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/Il4zammf52w" width="480" alt="thumbnail" title="Google Big Sleep: The End of Human Hackers?" /></p>Big thank you to DeleteMe for sponsoring this video.  Use my link http://jointdeleteme.com/Bombal to receive a 20% discount or use the QR code in the video.<br /><br />Welcome back to the channel! In this deep dive, Stephen returns to break down the rapidly evolving landscape of AI in cybersecurity. We explore the critical differences between offensive AI (using AI to enhance attacks) and adversarial AI (attacking the AI models themselves). Learn the mechanics behind prompt injection, LLM jailbreaking, and how vector databases are structured. We also analyze real-world case studies, including Google Project Zero's Big Sleep autonomous zero-day agent, and demonstrate how new AI-driven tools are being used for patch diffing and root cause analysis. Finally, we tackle the massive industry question: will AI replace human penetration testers, and what steps should you take right now to futureproof your tech career? Plus, a quick look at how automated agents are tackling API vulnerabilities like BOLA. <br /><br />// Stephen's Social // <br />Twitter: https://twitter.com/Steph3nSims <br />YouTube: https://www.youtube.com/@OffByOneSecurity<br />Discord:  https://discord.com/invite/offbyonesecurity<br /><br />// David's SOCIAL // <br />Discord: https://discord.com/invite/usKSyzb <br />X: https://www.twitter.com/davidbombal <br />Instagram: https://www.instagram.com/davidbombal <br />LinkedIn: https://www.linkedin.com/in/davidbombal <br />Facebook: https://www.facebook.com/davidbombal.co <br />TikTok: http://tiktok.com/@davidbombal <br />YouTube: https://www.youtube.com/@davidbombal<br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ<br />SoundCloud:  https://soundcloud.com/davidbombal<br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532<br /><br />// MY STUFF //<br /> https://www.amazon.com/shop/davidbombal <br /><br />// SPONSORS // <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com<br /><br />// MENU //<br />0:00 - Coming Up<br />01:10 - DeleteMe Ad<br />02:29 - Intro<br />03:25 - About Stephen<br />06:10 - AI Explained<br />09:45 - Why You Should Study AI<br />13:04 - The Different AI Defined<br />22:10 - Vector Databases<br />24:05 - How Are Red Teamers Using AI<br />28:47 - Where Red Teamers Can Practice<br />34:10 - How Chatbots Work<br />36:14 - AI's Affect on Companies / Jobs<br />42:51 - What AI Can't Do<br />44:33 - Exploit Mitigation<br />48:47 - AI Hallucinations<br />56:01 - Web Apps and API's<br />59:46 - AI-Powered Products<br />59:18 - Demo Begins<br />01:03:01 - Final Thoughts<br />01:06:23 - Where To Learn<br />01:08:01 - Conclusion<br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! <br /><br />Disclaimer: This video is for educational purposes only.<br />#ai #aihacking #artificalintelligence<br />...<br />https://www.youtube.com/watch?v=Il4zammf52w]]></description><link>https://odysee.com/google-big-sleep-the-end-of-human:97e96bf4c5f670e0e7eb7fb7a65698e20db1dc22</link><guid isPermaLink="true">https://odysee.com/google-big-sleep-the-end-of-human:97e96bf4c5f670e0e7eb7fb7a65698e20db1dc22</guid><pubDate>Mon, 30 Mar 2026 14:00:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/google-big-sleep-the-end-of-human/97e96bf4c5f670e0e7eb7fb7a65698e20db1dc22/f3e884.mp4" length="427487750" type="video/mp4"/><itunes:title>Google Big Sleep: The End of Human Hackers?</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/Il4zammf52w"/><itunes:duration>4101</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Simple FREE Firefox VPN]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/Z11i4M_kiNg" width="480" alt="thumbnail" title="Simple FREE Firefox VPN" /></p>Are free VPNs safe in 2026? Discover why Mozilla's new built-in Firefox VPN might save you from malicious apps and botnets. Protect your web traffic now!<br /><br />#firefox #vpn #botnet<br />...<br />https://www.youtube.com/watch?v=Z11i4M_kiNg]]></description><link>https://odysee.com/simple-free-firefox-vpn:6d2151d29654fea40b587599fd05e7531098b560</link><guid isPermaLink="true">https://odysee.com/simple-free-firefox-vpn:6d2151d29654fea40b587599fd05e7531098b560</guid><pubDate>Sun, 29 Mar 2026 16:15:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/simple-free-firefox-vpn/6d2151d29654fea40b587599fd05e7531098b560/03116b.mp4" length="15244795" type="video/mp4"/><itunes:title>Simple FREE Firefox VPN</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/Z11i4M_kiNg"/><itunes:duration>152</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Vibe Hacking: How AI Is Helping Hackers]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/u0ynt7CK2og" width="480" alt="thumbnail" title="Vibe Hacking: How AI Is Helping Hackers" /></p>Big thank you to Radware for sponsoring this video. Download the Radware Global Threat Analysis Report 2026 here:  https://www.radware.com/threat-analysis-report/<br /><br />In this interview, David Bombal sits down with Radware's Pascal Geenens to unpack the realities of the latest global threat report. The cybersecurity landscape has experienced a major paradigm shift: the era of "Vibe Hacking" is here. Pascal explains how Agentic AI, the Model Context Protocol (MCP), and uncensored offline models (like DeepSeek-R1) have created a "digital garden of Eden" for adversaries. <br /><br />Discover how novice script kiddies are now use the power of AI hacking which once strictly reserved for nation-state actors. We dive deep into the automation of cyber attacks, the rise of AI-driven tools like Xantarox AI, the critical dangers of AI-generated code vulnerabilities, and why traditional defense mechanisms are struggling to keep up with non-deterministic AI threats.<br /><br />// Pascal Geenens’ SOCIAL // <br />LinkedIn:  https://www.linkedin.com/in/geenensp/ <br />Website:  https://www.radware.com/ <br /><br />// David's SOCIAL // <br />Discord: https://discord.com/invite/usKSyzb <br />X: https://www.twitter.com/davidbombal <br />Instagram: https://www.instagram.com/davidbombal <br />LinkedIn: https://www.linkedin.com/in/davidbombal <br />Facebook: https://www.facebook.com/davidbombal.co <br />TikTok: http://tiktok.com/@davidbombal <br />YouTube: https://www.youtube.com/@davidbombal<br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ<br />SoundCloud:  https://soundcloud.com/davidbombal<br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532<br /><br />// MY STUFF //<br /> https://www.amazon.com/shop/davidbombal <br /><br />// SPONSORS // <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com<br /><br />// MENU //<br />0:00 - Coming up<br />01:20 - 2026 Global Threat Analysis Report // The future of cyber attacks<br />04:19 - AI threats & threat actors<br />09:21 - Threat Report cover page explained<br />15:31 - Vibe hacking<br />23:09 - Hackers using AI<br />30:28 - The rise of DDoS attacks<br />40:40 - AI & vulnerable APIs<br />53:58 - Getting easier with the help of AI<br />55:57 - Zero-click indirect prompt injection<br />01:13:33 - Conclusion<br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! <br /><br />Disclaimer: This video is for educational purposes only.<br />#radware #vibehacking #ddos<br />...<br />https://www.youtube.com/watch?v=u0ynt7CK2og]]></description><link>https://odysee.com/vibe-hacking-how-ai-is-helping-hackers:a07762e7353bec8f0e1538250230140f035cd70b</link><guid isPermaLink="true">https://odysee.com/vibe-hacking-how-ai-is-helping-hackers:a07762e7353bec8f0e1538250230140f035cd70b</guid><pubDate>Sun, 29 Mar 2026 14:00:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/vibe-hacking-how-ai-is-helping-hackers/a07762e7353bec8f0e1538250230140f035cd70b/65edbe.mp4" length="567585114" type="video/mp4"/><itunes:title>Vibe Hacking: How AI Is Helping Hackers</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/u0ynt7CK2og"/><itunes:duration>4531</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Kali Linux 2026.1 released (new undercover mode): What else has changed?]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/NbuY_BOmuFM" width="480" alt="thumbnail" title="Kali Linux 2026.1 released (new undercover mode): What else has changed?" /></p>New year, new release - Kali 2026.1 is here! There is everything from a fresh coat of paint to a nod to our roots, with normal ongoing improvements. Building on from December’s 2025.4, the summary of the changelog:<br /><br />2026 Theme Refresh - Our yearly theme refresh: BackTrack Mode For Kali-Undercover - New mode celebrating BackTrack’s 20th anniversary<br />Kali’s 13th Birthday Event - A little community event<br />Source: kali.org<br /><br />#kali #linux #undercover <br />New Tools - 8 new programs<br />...<br />https://www.youtube.com/watch?v=NbuY_BOmuFM]]></description><link>https://odysee.com/kali-linux-2026.1-released-%28new:da7188068704f9c3c6bea5081b2d9d877aa27aef</link><guid isPermaLink="true">https://odysee.com/kali-linux-2026.1-released-%28new:da7188068704f9c3c6bea5081b2d9d877aa27aef</guid><pubDate>Sat, 28 Mar 2026 18:30:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/kali-linux-2026.1-released-(new/da7188068704f9c3c6bea5081b2d9d877aa27aef/a4440a.mp4" length="12509402" type="video/mp4"/><itunes:title>Kali Linux 2026.1 released (new undercover mode): What else has changed?</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/NbuY_BOmuFM"/><itunes:duration>156</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[WARNING: Apple is forcing Age Verification in iOS]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/WPrLq9ErZ38" width="480" alt="thumbnail" title="WARNING: Apple is forcing Age Verification in iOS" /></p>Source: https://www.bbc.co.uk/news/articles/c20qwz9xzr9o<br /><br />#apple  #privacy #spyware<br />...<br />https://www.youtube.com/watch?v=WPrLq9ErZ38]]></description><link>https://odysee.com/warning-apple-is-forcing-age:3c776082a0dfef013b05c1c142b0085c93d714fd</link><guid isPermaLink="true">https://odysee.com/warning-apple-is-forcing-age:3c776082a0dfef013b05c1c142b0085c93d714fd</guid><pubDate>Sat, 28 Mar 2026 14:45:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/warning-apple-is-forcing-age/3c776082a0dfef013b05c1c142b0085c93d714fd/5bc0ea.mp4" length="15665013" type="video/mp4"/><itunes:title>WARNING: Apple is forcing Age Verification in iOS</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/WPrLq9ErZ38"/><itunes:duration>179</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Will the router ban make the country safer?]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/24Ns6jYCZJA" width="480" alt="thumbnail" title="Will the router ban make the country safer?" /></p>The USA has banned all new foreign routers. Will this make the country safer? Or cause more cybersecurity issues?<br /><br />#router #ban #usa<br />...<br />https://www.youtube.com/watch?v=24Ns6jYCZJA]]></description><link>https://odysee.com/will-the-router-ban-make-the-country:4695603ff790f6a3629028bd75d78d36b5af3924</link><guid isPermaLink="true">https://odysee.com/will-the-router-ban-make-the-country:4695603ff790f6a3629028bd75d78d36b5af3924</guid><pubDate>Fri, 27 Mar 2026 21:45:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/will-the-router-ban-make-the-country/4695603ff790f6a3629028bd75d78d36b5af3924/623955.mp4" length="13635628" type="video/mp4"/><itunes:title>Will the router ban make the country safer?</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/24Ns6jYCZJA"/><itunes:duration>175</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Upgrade now!]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/gO5T0i0ydG4" width="480" alt="thumbnail" title="Upgrade now!" /></p>Apple just issued an urgent iOS update to fix 37 critical flaws, including the Dark Sword zero-day exploit. Here is why you need to patch your iPhone's WebKit now.<br /><br />#apple #iot #darksword<br />...<br />https://www.youtube.com/watch?v=gO5T0i0ydG4]]></description><link>https://odysee.com/upgrade-now!:70b54a669621e1552162ee09393fab39cc555433</link><guid isPermaLink="true">https://odysee.com/upgrade-now!:70b54a669621e1552162ee09393fab39cc555433</guid><pubDate>Fri, 27 Mar 2026 16:30:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/upgrade-now!/70b54a669621e1552162ee09393fab39cc555433/ed495b.mp4" length="16126376" type="video/mp4"/><itunes:title>Upgrade now!</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/gO5T0i0ydG4"/><itunes:duration>164</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[7 REAL 5-Minute Cybersecurity Hacks Everyone Should Know]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/PNWkvT3r3TQ" width="480" alt="thumbnail" title="7 REAL 5-Minute Cybersecurity Hacks Everyone Should Know" /></p>Big thanks to ThreatLocker for sponsoring my trip to ZTW26 and also for sponsoring this video.  To start your free trial with ThreatLocker please use the following link:  https://www.threatlocker.com/davidbombal<br /><br />Forget hot glue and paper clips. Here are 7 REAL 5-minute cybersecurity hacks everyone should know in 2026. Recorded live at Zero Trust World (ZTW26), David Bombal and a team of hackers demonstrate actual cyber attacks and how quickly your systems can be compromised.<br /><br />From forcing AI prompt injections to steal credentials, to hiding C2 servers<br />in plain sight on a Steam profile, these are the real-world exploits threat actors are using right now. We're diving into the technical weeds to show you Windows LNK shortcut hijacking, Linux privilege escalation via sudo misconfigurations, and how to protect yourself from these exact attacks.<br /><br />// Guests’ SOCIAL //<br />Alex Benton: Rename StickyKeys    https://www.linkedin.com/in/alex-benton-b805065<br />Kenneth Walker:  Everthing is a C2    https://www.linkedin.com/in/kenneth-walker-527595109/<br />Jacob Meyer:  Shortcut Hijack    https://www.linkedin.com/in/jacob-meyer-165b8359/<br />David Smith:  Alternate Data Streams    https://www.linkedin.com/in/david-smith-sudo-wrestler<br />Karla Abarca:  The validity of an application before execution    https://www.linkedin.com/in/karlaabarcacyber<br />Ramsey Shaban:  Prompt Injection    https://www.linkedin.com/in/ramsey-shaban-390335205<br />Tillman Hall     Powershell Fake Logon    https://www.linkedin.com/in/tillmanhall/<br />Rayton Li:  Rooting Around Linux: Privilege Escalations    https://www.linkedin.com/in/rayton-li<br />Kieran Human:  Network Hash Stealing    https://www.linkedin.com/in/kieran-human-5495ab170<br /><br />// ThreatLocker’s SOCIAL //<br />LinkedIn:  https://www.linkedin.com/company/threatlockerinc/posts/?feedView=all<br /><br />X:  https://x.com/threatlocker<br />Instagram:  https://www.instagram.com/threatlocker/<br />Website:  https://www.threatlocker.com/<br /><br />// David's SOCIAL // <br />Discord: https://discord.com/invite/usKSyzb <br />X: https://www.twitter.com/davidbombal <br />Instagram: https://www.instagram.com/davidbombal <br />LinkedIn: https://www.linkedin.com/in/davidbombal <br />Facebook: https://www.facebook.com/davidbombal.co <br />TikTok: http://tiktok.com/@davidbombal <br />YouTube: https://www.youtube.com/@davidbombal<br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ<br />SoundCloud:  https://soundcloud.com/davidbombal<br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532<br /><br />// MY STUFF //<br />https://www.amazon.com/shop/davidbombal <br /><br />// SPONSORS // <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com<br /><br />// MENU //<br />0:00 - Coming Up<br />0:59 - Intro<br />01:20 - ThreatLocker Sponsor<br />01:36 - Demo 1: Sticky Keys<br />04:20 - Demo 2: Steam-Based C2 Attack<br />09:25 - Demo 3: Shortcut Hijacking<br />13:32 - Demo 4: Hidden Malware in Alternate Data Streams<br />20:18 - Demo 5: Safe App Validation (3-Step Check)<br />24:39 - AI Prompt Injection Attack<br />28:45 - Demo 6: Linux Privilege Escalation (Sudo Abuse)<br />34:10 - Demo 7: Credential Theft & Hash Cracking<br />36:38 - Conclusion<br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! <br /><br />Disclaimer: This video is for educational purposes only.<br />#5minutehacks #hacking #redteaming<br />...<br />https://www.youtube.com/watch?v=PNWkvT3r3TQ]]></description><link>https://odysee.com/7-real-5-minute-cybersecurity-hacks:da9640b98db45457818b7a5edcddd0a4de917582</link><guid isPermaLink="true">https://odysee.com/7-real-5-minute-cybersecurity-hacks:da9640b98db45457818b7a5edcddd0a4de917582</guid><pubDate>Fri, 27 Mar 2026 14:30:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/7-real-5-minute-cybersecurity-hacks/da9640b98db45457818b7a5edcddd0a4de917582/91f524.mp4" length="240736805" type="video/mp4"/><itunes:title>7 REAL 5-Minute Cybersecurity Hacks Everyone Should Know</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/PNWkvT3r3TQ"/><itunes:duration>2209</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Why OpenAI KILLED The Sora App]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/5FJVaDJx-3o" width="480" alt="thumbnail" title="Why OpenAI KILLED The Sora App" /></p>OpenAI just shocked the tech world by killing its Sora video app and dropping a $1B Disney deal. Is the AI bubble popping, or is this the end of AI slop?<br /><br />#openai #sora #disney<br />...<br />https://www.youtube.com/watch?v=5FJVaDJx-3o]]></description><link>https://odysee.com/why-openai-killed-the-sora-app:9831835ff78fd66db5f8a248cbc5ec5bb798a044</link><guid isPermaLink="true">https://odysee.com/why-openai-killed-the-sora-app:9831835ff78fd66db5f8a248cbc5ec5bb798a044</guid><pubDate>Thu, 26 Mar 2026 15:00:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/why-openai-killed-the-sora-app/9831835ff78fd66db5f8a248cbc5ec5bb798a044/dce9b3.mp4" length="13135483" type="video/mp4"/><itunes:title>Why OpenAI KILLED The Sora App</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/5FJVaDJx-3o"/><itunes:duration>131</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[WARNING: Linux Age Checks]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/VArWKbdwA3I" width="480" alt="thumbnail" title="WARNING: Linux Age Checks" /></p>Age verification laws are hitting operating systems like Linux and Graphene OS. Are your digital privacy rights slipping away? Let me know your thoughts on this controversial systemd update!<br /><br />#linux #ageverification #grapheneos<br />...<br />https://www.youtube.com/watch?v=VArWKbdwA3I]]></description><link>https://odysee.com/warning-linux-age-checks:71d87457671550e470f2d83d22e61148b660154d</link><guid isPermaLink="true">https://odysee.com/warning-linux-age-checks:71d87457671550e470f2d83d22e61148b660154d</guid><pubDate>Thu, 26 Mar 2026 14:30:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/warning-linux-age-checks/71d87457671550e470f2d83d22e61148b660154d/5ab997.mp4" length="13457627" type="video/mp4"/><itunes:title>WARNING: Linux Age Checks</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/VArWKbdwA3I"/><itunes:duration>164</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Inside the 6.4Tbps Cisco Smart Switch]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/MmiCCeIAUgo" width="480" alt="thumbnail" title="Inside the 6.4Tbps Cisco Smart Switch" /></p>Discover how the Cisco Silicon One G300 chip revolutionizes networking and security. We explore its 6.4 Tbps bandwidth and AMD Pensando DPU integration for stateful filtering.<br /><br />Big thanks to @Cisco ​for sponsoring this video.<br />#cisco #siliconone #smartswitch<br />...<br />https://www.youtube.com/watch?v=MmiCCeIAUgo]]></description><link>https://odysee.com/inside-the-6.4tbps-cisco-smart-switch:0a99ffe3f8a5e1ddfb40cc2cf38529ca8c792ae5</link><guid isPermaLink="true">https://odysee.com/inside-the-6.4tbps-cisco-smart-switch:0a99ffe3f8a5e1ddfb40cc2cf38529ca8c792ae5</guid><pubDate>Tue, 24 Mar 2026 15:00:41 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/inside-the-6.4tbps-cisco-smart-switch/0a99ffe3f8a5e1ddfb40cc2cf38529ca8c792ae5/718331.mp4" length="13549027" type="video/mp4"/><itunes:title>Inside the 6.4Tbps Cisco Smart Switch</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/MmiCCeIAUgo"/><itunes:duration>164</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Stop buying AI security tools until you watch this]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/tFSb2lSgqwA" width="480" alt="thumbnail" title="Stop buying AI security tools until you watch this" /></p>Thank you to ThreatLocker for sponsoring my trip to ZTW26 and also for sponsoring this video.  To start your free trial with ThreatLocker please use the following link:  https://www.threatlocker.com/davidbombal<br /><br />AI isn't the magic cybersecurity cure the industry wants you to believe it is Danny Jenkins tells us in this interview. He cuts through the marketing hype and explains why relying solely on AI to block attacks is not a solution to all our cyber problems.<br /><br />We also discuss modern threats—including the rise of<br />Agentic AI—and why determining the "intent" of software is practically impossible for artificial intelligence. Instead of chasing the latest buzzwords, learn the foundational, proven strategies to actually secure your network. <br /><br />We dive deep into Zero Trust Network Access (ZTNA), the<br />power of default deny, and the specific, tangible controls you need to block<br />ransomware, prevent Office 365 phishing, and stop bad actors. Whether you're an IT admin, SOC analyst, or CISO, this video outlines exactly what you should be doing instead of just buying another AI tool<br /><br />// Danny Jenkins’ SOCIAL //<br />LinkedIn:  https://www.linkedin.com/in/dannyjenkinscyber/<br /><br />// ThreatLocker’s SOCIAL //<br />LinkedIn:  https://www.linkedin.com/company/threatlockerinc/posts/?feedView=all<br />X:  https://x.com/threatlocker<br />Instagram:  https://www.instagram.com/threatlocker/<br />Website:  https://www.threatlocker.com/<br /><br />// David's SOCIAL // <br />Discord: https://discord.com/invite/usKSyzb <br />X: https://www.twitter.com/davidbombal <br />Instagram: https://www.instagram.com/davidbombal <br />LinkedIn: https://www.linkedin.com/in/davidbombal <br />Facebook: https://www.facebook.com/davidbombal.co <br />TikTok: http://tiktok.com/@davidbombal <br />YouTube: https://www.youtube.com/@davidbombal<br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ<br />SoundCloud:  https://soundcloud.com/davidbombal<br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532<br /><br />// MY STUFF //<br /> https://www.amazon.com/shop/davidbombal <br /><br />// SPONSORS // <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com<br /><br />// MENU //<br />0:00 - Coming Up<br />0:36 - Introduction<br />01:01 - Solving Problems with AI and Security<br />03:14 - Concerns with Agentic AI<br />08:01 - ThreatLocker AI Products<br />09:20 - AI vs AI and Security<br />11:34 - Vibe Coding in Industry <br />14:42 - Ways for Companies to Stop Hacks<br />19:29 - Deny by Default vs AI<br />20:29 - Industry reaction to Deny by Default<br />22:10 - About ThreatLocker<br />23:19 - Announcements from ZTW26<br />25:22 - The Growth of Threatlocker<br />26:12 - Outro<br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! <br /><br />Disclaimer: This video is for educational purposes only.<br /><br />#cybersecurity #ai #hack<br />...<br />https://www.youtube.com/watch?v=tFSb2lSgqwA]]></description><link>https://odysee.com/stop-buying-ai-security-tools-until-you:ae1fb2d800822d477a65f9e4ba927710926a4fe2</link><guid isPermaLink="true">https://odysee.com/stop-buying-ai-security-tools-until-you:ae1fb2d800822d477a65f9e4ba927710926a4fe2</guid><pubDate>Tue, 24 Mar 2026 14:30:45 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/stop-buying-ai-security-tools-until-you/ae1fb2d800822d477a65f9e4ba927710926a4fe2/594fc6.mp4" length="325453056" type="video/mp4"/><itunes:title>Stop buying AI security tools until you watch this</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/tFSb2lSgqwA"/><itunes:duration>1575</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Did you know that Evilginx allows Hackers to Defeat 2FA]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/b_KDCLBVng0" width="480" alt="thumbnail" title="Did you know that Evilginx allows Hackers to Defeat 2FA" /></p>Thank you to ThreatLocker for sponsoring my trip to ZTW26 and also for sponsoring this video. To start your free trial with ThreatLocker please use the following link:  https://www.threatlocker.com/davidbombal<br /><br />// Rob Allen’s SOCIAL //<br />LinkedIn:  https://www.linkedin.com/in/threatlockerrob/<br />X:  https://x.com/threatlockerrob<br /><br />// David's SOCIAL // <br />Discord: https://discord.com/invite/usKSyzb <br />X: https://www.twitter.com/davidbombal <br />Instagram: https://www.instagram.com/davidbombal <br />LinkedIn: https://www.linkedin.com/in/davidbombal <br />Facebook: https://www.facebook.com/davidbombal.co <br />TikTok: http://tiktok.com/@davidbombal <br />YouTube: https://www.youtube.com/@davidbombal<br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ<br />SoundCloud:  https://soundcloud.com/davidbombal<br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532<br /><br />// MY STUFF //<br /> https://www.amazon.com/shop/davidbombal <br /><br />// SPONSORS // <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com<br /><br /><br />// MENU //<br />0:00 - Coming up<br />0:57 - What is 2FA/MFA and why is it important?<br />02:54 - Reusing passwords<br />04:38 - Malicious Chrome extensions<br />05:39 - Average person vs cybersecurity<br />12:18 - SMS 2FA<br />13:37 - Authenticator apps<br />16:26 - Yubikeys<br />17:58 - No one is "unhackable"<br />21:52 - "Cookie stealing" explained<br />22:53 - ThrearLocker's new tool/solution<br />28:22 - How ThreatLocker protects Office365<br />29:06 - ThreatLocker protecting organizations<br />33:11 - Should I trust ThreatLocker?<br />35:54 - How safe is ThreatLocker?<br />38:00 - Conclusion<br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! <br /><br />Disclaimer: This video is for educational purposes only.<br /><br />#cybersecurity #hacker #hack<br />...<br />https://www.youtube.com/watch?v=b_KDCLBVng0]]></description><link>https://odysee.com/did-you-know-that-evilginx-allows:c17194fe901adcda678a7787406a12c4991a2138</link><guid isPermaLink="true">https://odysee.com/did-you-know-that-evilginx-allows:c17194fe901adcda678a7787406a12c4991a2138</guid><pubDate>Sun, 22 Mar 2026 14:30:24 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/did-you-know-that-evilginx-allows/c17194fe901adcda678a7787406a12c4991a2138/8a4967.mp4" length="531233659" type="video/mp4"/><itunes:title>Did you know that Evilginx allows Hackers to Defeat 2FA</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/b_KDCLBVng0"/><itunes:duration>2290</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Warning and demo: Hackers can use AI to create malware]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/F2_0Rs36fSA" width="480" alt="thumbnail" title="Warning and demo: Hackers can use AI to create malware" /></p>Big thanks to @ThreatLocker  for sponsoring my trip to ZTW26 and also for sponsoring this video.  To start your free trial with ThreatLocker please use the following link:  https://www.threatlocker.com/davidbombal<br /><br />Discover how easily hackers prompt engineer malware in 2026. Kieran Human from ThreatLocker demonstrates bypassing Microsoft Copilot guardrails to write PowerShell ransomware.<br /><br />// Kieran Human’s SOCIAL //<br />LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/<br /><br />// GitHub page REFERENCE //<br />https://github.com/ztwAdmin/ZTW-2026<br /><br />// David's SOCIAL // <br />Discord: https://discord.com/invite/usKSyzb <br />X: https://www.twitter.com/davidbombal <br />Instagram: https://www.instagram.com/davidbombal <br />LinkedIn: https://www.linkedin.com/in/davidbombal <br />Facebook: https://www.facebook.com/davidbombal.co <br />TikTok: http://tiktok.com/@davidbombal <br />YouTube: https://www.youtube.com/@davidbombal<br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ<br />SoundCloud:  https://soundcloud.com/davidbombal<br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532<br /><br />// MY STUFF //<br />https://www.amazon.com/shop/davidbombal <br /><br />// SPONSORS // <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com<br /><br />// MENU //<br />0:00 - Coming Up<br />0:17 - Intro<br />01:00 - Demo<br />01:37 - Sponsored by Threatlocker<br />01:55 - Demo continued<br />07:38 - Where to Find these Tools<br />08:38 - Disclaimer<br />09:33 - Outro<br /><br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! <br /><br />Disclaimer: This video is for educational purposes only.<br />#threatlocker #copilot #locallm<br />...<br />https://www.youtube.com/watch?v=F2_0Rs36fSA]]></description><link>https://odysee.com/warning-and-demo-hackers-can-use-ai-to:bdaf27a1a39fad8b79e4241e2e4288e25896e4c5</link><guid isPermaLink="true">https://odysee.com/warning-and-demo-hackers-can-use-ai-to:bdaf27a1a39fad8b79e4241e2e4288e25896e4c5</guid><pubDate>Fri, 20 Mar 2026 14:30:27 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/warning-and-demo-hackers-can-use-ai-to/bdaf27a1a39fad8b79e4241e2e4288e25896e4c5/126ec3.mp4" length="88939312" type="video/mp4"/><itunes:title>Warning and demo: Hackers can use AI to create malware</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/F2_0Rs36fSA"/><itunes:duration>578</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Vibe coding is scary real!]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/Hl1zrP_oCPU" width="480" alt="thumbnail" title="Vibe coding is scary real!" /></p>Is Vibe Coding the future of AI coding? See how 500,000 lines of legacy code became lean Golang microservices in just one week. The 2026 tech disruption is here.<br /><br />Big thanks to Cisco for sponsoring this video.<br /><br />#cisco #vibecoding #ai<br />...<br />https://www.youtube.com/watch?v=Hl1zrP_oCPU]]></description><link>https://odysee.com/vibe-coding-is-scary-real!:6dde848715bcad60f9740f6c3f72335eb1241e86</link><guid isPermaLink="true">https://odysee.com/vibe-coding-is-scary-real!:6dde848715bcad60f9740f6c3f72335eb1241e86</guid><pubDate>Thu, 19 Mar 2026 14:30:23 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/vibe-coding-is-scary-real!/6dde848715bcad60f9740f6c3f72335eb1241e86/118c55.mp4" length="12067976" type="video/mp4"/><itunes:title>Vibe coding is scary real!</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/Hl1zrP_oCPU"/><itunes:duration>118</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[The one BIG mistake you are making with DNS security today]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/Rrr4HrI8E6g" width="480" alt="thumbnail" title="The one BIG mistake you are making with DNS security today" /></p>Big thank you to Infoblox for sponsoring this video.  To learn more about Infoblox please visit:  https://www.infoblox.com/ <br /><br />Do you know the difference between encrypted DNS and secure DNS? DNS veteran Cricket Liu, author of DNS and Bind, joins David Bombal to break down common misconceptions, explain the crucial distinction between security and privacy; and outline a massive update to the NIST Secure DNS Deployment Guide (SP 800-81). If you run a network, you cannot afford to ignore this control point.<br /><br />Detailed Breakdown: <br />DNS is the Achilles' heel of internet infrastructure. While newer protocols like DNS over HTTPS (DoH) and DNS over TLS (DoT) solve the cleartext privacy problem, they do not stop malware, phishing, or data exfiltration. In fact, attackers are now using encrypted DNS against us.<br /><br />In this deep-dive interview, Cricket Liu explains how DNS security must evolve beyond simple encryption to include Protective DNS (PDNS) using Response Policy Zones (RPZ). Learn how to turn your existing DNS infrastructure into a low-cost, high-efficiency control point that blocks malicious C2 rendezvous, phishing links, and DNS tunneling automatically.<br /><br />We also tackle the DNSSEC confusion head-on. Cricket clarifies exactly why DNSSEC is about validation and integrity, not encryption, and discusses the looming threat of quantum computing on modern cryptographic standards. Finally, we discuss real-world attack vectors, including a wild story about a dangling CNAME record on CDC.gov that was hijacked to game search engine rankings, and how the updated NIST guide shifts focus from just network administrators to security practitioners.<br /><br />// Links to documents //<br />NIST SP 800-81: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81r3.ipd.pdf<br />Inflox Q&A on  NIST SP 800-81: <br />https://www.infoblox.com/blog/security/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide/<br /><br />// Cricket Liu’s SOCIAL // <br />LinkedIn:  https://www.linkedin.com/in/cricketliu/ <br /><br />// Renee Burton’s SOCIAL // <br />LinkedIn:  https://www.linkedin.com/in/ren%C3%A9e-burton-b7161110b/ <br />Blog Posts:  https://www.infoblox.com/blog/author/renee-burton/ <br /><br />// Infoblox SOCIAL // <br />LinkedIn:  https://www.linkedin.com/company/infoblox/ <br />Website:  https://www.infoblox.com/ <br /><br />// Books by Cricket // <br />DNS on Windows Server 2003: Mastering the Domain Name <br />US:  https://amzn.to/4byNAtQ <br />UK: https://amzn.to/4rjqgoz <br />DNS & BIND Cookbook: Solutions & Examples for System Administrators 1st Edition <br />US:  https://amzn.to/40iZPob <br />UK: https://amzn.to/3Nk2MBM <br />DNS and BIND on IPv6: DNS for the Next-Generation Internet 1st Edition <br />US: https://amzn.to/3MXly1Y <br />UK:  https://amzn.to/4s2SFRe <br />Learning CoreDNS: Configuring DNS for Cloud Native Environments 1st Edition <br />US: https://amzn.to/4sC4GwS <br />UK: https://amzn.to/4ro0T59 <br />DNS & Bind 4th Edition: <br />US:   https://amzn.to/4s8WaWm <br />UK:  https://amzn.to/4sztLbB <br /><br />// Website REFERENCE // <br />Nist:  https://www.nist.gov/ <br /><br />Secure Domain Name System Deployment Guide:  https://www.nist.gov/news-events/news/2025/04/secure-domain-name-system-dns-deployment-guide-comment-nist-sp-800-81r3 <br /><br />// David's SOCIAL //  <br />Discord: https://discord.com/invite/usKSyzb  <br />X: https://www.twitter.com/davidbombal  <br />Instagram: https://www.instagram.com/davidbombal  <br />LinkedIn: https://www.linkedin.com/in/davidbombal  <br />Facebook: https://www.facebook.com/davidbombal.co  <br />TikTok: http://tiktok.com/@davidbombal  <br />YouTube: https://www.youtube.com/@davidbombal <br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ <br />SoundCloud:  https://soundcloud.com/davidbombal <br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532 <br /><br />// MY STUFF // <br />https://www.amazon.com/shop/davidbombal  <br /><br />// SPONSORS //  <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com <br /><br />// MENU // <br />0:00 - Coming up <br />01:19 - Sponsored video disclaimer <br />01:45 - Cricket Liu books and introduction <br />07:06 - The problems of DNS <br />10:33 - DNS security <br />13:51 - How protective DNS works <br />16:26 - The DNS Deployment Guide by NIST <br />22:00 - How protective DNS stops malware and malicious sites <br />23:48 - Pros and Cons of encrypted DNS <br />32:29 - Quantum computing and DNS <br />33:47 - DNS Sec is not encryption <br />36:18 - Validating data <br />40:04 - Protecting DNS <br />49:21 - Lessons learned // Story time <br />52:54 - Why the DNS Deployment Guide matters <br />55:30 - Top 3 things to protect your organization/business from cyber attacks <br />56:56 - Conclusion <br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!  <br /><br />Disclaimer: This video is for educational purposes only. <br />#dns #dnssec #cybersecurity<br />...<br />https://www.youtube.com/watch?v=Rrr4HrI8E6g]]></description><link>https://odysee.com/the-one-big-mistake-you-are-making-2:a03f6847debf6bfcbd9a755c6b7dc63cba2b74fb</link><guid isPermaLink="true">https://odysee.com/the-one-big-mistake-you-are-making-2:a03f6847debf6bfcbd9a755c6b7dc63cba2b74fb</guid><pubDate>Tue, 17 Mar 2026 16:00:45 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/the-one-big-mistake-you-are-making-2/a03f6847debf6bfcbd9a755c6b7dc63cba2b74fb/f7113e.mp4" length="947740067" type="video/mp4"/><itunes:title>The one BIG mistake you are making with DNS security today</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/Rrr4HrI8E6g"/><itunes:duration>3485</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[The one BIG mistake you are making with DNS security today]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/9pPqjTF-eLU" width="480" alt="thumbnail" title="The one BIG mistake you are making with DNS security today" /></p>Big thank you to Infoblox for sponsoring this video.  To learn more about Infoblox please visit:  https://www.infoblox.com/ <br /><br />Do you know the difference between encrypted DNS and secure DNS? DNS veteran Cricket Liu, author of DNS and Bind, joins David Bombal to break down common misconceptions, explain the crucial distinction between security and privacy; and outline a massive update to the NIST Secure DNS Deployment Guide (SP 800-81). If you run a network, you cannot afford to ignore this control point.<br /><br />Detailed Breakdown: <br />DNS is the Achilles' heel of internet infrastructure. While newer protocols like DNS over HTTPS (DoH) and DNS over TLS (DoT) solve the cleartext privacy problem, they do not stop malware, phishing, or data exfiltration. In fact, attackers are now using encrypted DNS against us.<br /><br />In this deep-dive interview, Cricket Liu explains how DNS security must evolve beyond simple encryption to include Protective DNS (PDNS) using Response Policy Zones (RPZ). Learn how to turn your existing DNS infrastructure into a low-cost, high-efficiency control point that blocks malicious C2 rendezvous, phishing links, and DNS tunneling automatically.<br /><br />We also tackle the DNSSEC confusion head-on. Cricket clarifies exactly why DNSSEC is about validation and integrity, not encryption, and discusses the looming threat of quantum computing on modern cryptographic standards. Finally, we discuss real-world attack vectors, including a wild story about a dangling CNAME record on CDC.gov that was hijacked to game search engine rankings, and how the updated NIST guide shifts focus from just network administrators to security practitioners.<br /><br />// Links to documents //<br />NIST SP 800-81: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81r3.ipd.pdf<br />Inflox Q&A on  NIST SP 800-81: <br />https://www.infoblox.com/blog/security/what-is-nist-sp-800-81-a-complete-faq-on-the-latest-draft-of-nist-secure-dns-deployment-guide/<br /><br />// Cricket Liu’s SOCIAL // <br />LinkedIn:  https://www.linkedin.com/in/cricketliu/ <br /><br />// Renee Burton’s SOCIAL // <br />LinkedIn:  https://www.linkedin.com/in/ren%C3%A9e-burton-b7161110b/ <br />Blog Posts:  https://www.infoblox.com/blog/author/renee-burton/ <br /><br />// Infoblox SOCIAL // <br />LinkedIn:  https://www.linkedin.com/company/infoblox/ <br />Website:  https://www.infoblox.com/ <br /><br />// Books by Cricket // <br />DNS on Windows Server 2003: Mastering the Domain Name <br />US:  https://amzn.to/4byNAtQ <br />UK: https://amzn.to/4rjqgoz <br />DNS & BIND Cookbook: Solutions & Examples for System Administrators 1st Edition <br />US:  https://amzn.to/40iZPob <br />UK: https://amzn.to/3Nk2MBM <br />DNS and BIND on IPv6: DNS for the Next-Generation Internet 1st Edition <br />US: https://amzn.to/3MXly1Y <br />UK:  https://amzn.to/4s2SFRe <br />Learning CoreDNS: Configuring DNS for Cloud Native Environments 1st Edition <br />US: https://amzn.to/4sC4GwS <br />UK: https://amzn.to/4ro0T59 <br />DNS & Bind 4th Edition: <br />US:   https://amzn.to/4s8WaWm <br />UK:  https://amzn.to/4sztLbB <br /><br />// Website REFERENCE // <br />Nist:  https://www.nist.gov/ <br /><br />Secure Domain Name System Deployment Guide:  https://www.nist.gov/news-events/news/2025/04/secure-domain-name-system-dns-deployment-guide-comment-nist-sp-800-81r3 <br /><br />// David's SOCIAL //  <br />Discord: https://discord.com/invite/usKSyzb  <br />X: https://www.twitter.com/davidbombal  <br />Instagram: https://www.instagram.com/davidbombal  <br />LinkedIn: https://www.linkedin.com/in/davidbombal  <br />Facebook: https://www.facebook.com/davidbombal.co  <br />TikTok: http://tiktok.com/@davidbombal  <br />YouTube: https://www.youtube.com/@davidbombal <br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ <br />SoundCloud:  https://soundcloud.com/davidbombal <br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532 <br /><br />// MY STUFF // <br />https://www.amazon.com/shop/davidbombal  <br /><br />// SPONSORS //  <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com <br /><br />// MENU // <br />0:00 - Coming up <br />01:19 - Sponsored video disclaimer <br />01:45 - Cricket Liu books and introduction <br />07:06 - The problems of DNS <br />10:33 - DNS security <br />13:51 - How protective DNS works <br />16:26 - The DNS Deployment Guide by NIST <br />22:00 - How protective DNS stops malware and malicious sites <br />23:48 - Pros and Cons of encrypted DNS <br />32:29 - Quantum computing and DNS <br />33:47 - DNS Sec is not encryption <br />36:18 - Validating data <br />40:04 - Protecting DNS <br />49:21 - Lessons learned // Story time <br />52:54 - Why the DNS Deployment Guide matters <br />55:30 - Top 3 things to protect your organization/business from cyber attacks <br />56:56 - Conclusion <br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!  <br /><br />Disclaimer: This video is for educational purposes only. <br />#dns #dnssec #cybersecurity<br />...<br />https://www.youtube.com/watch?v=9pPqjTF-eLU]]></description><link>https://odysee.com/the-one-big-mistake-you-are-making-with:80835ac20fa2ea1eef4135b3ea87d171b8616504</link><guid isPermaLink="true">https://odysee.com/the-one-big-mistake-you-are-making-with:80835ac20fa2ea1eef4135b3ea87d171b8616504</guid><pubDate>Tue, 17 Mar 2026 14:30:08 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/the-one-big-mistake-you-are-making-with/80835ac20fa2ea1eef4135b3ea87d171b8616504/c6585f.mp4" length="619069090" type="video/mp4"/><itunes:title>The one BIG mistake you are making with DNS security today</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/9pPqjTF-eLU"/><itunes:duration>2398</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Top 4 Web hacking demos for aspiring hackers (with labs and CTF)]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/KBIQE9fo8mU" width="480" alt="thumbnail" title="Top 4 Web hacking demos for aspiring hackers (with labs and CTF)" /></p>Big thanks to @ThreatLocker for sponsoring my trip to ZTW26 and also for sponsoring this video.  To start your free trial with ThreatLocker please use the following link:  https://www.threatlocker.com/davidbombal<br /><br />Are you looking to get into bug bounty hunting but feel overwhelmed or worried the field is oversaturated? In this video, full-time bug bounty hunter Justin Gardner shares a realistic, actionable guide to web hacking for beginners.<br /><br />We dive straight into the practical side with five live demonstrations of common web vulnerabilities—all done using just your browser and DevTools. Justin explains how Insecure Direct Object Reference (IDOR), Broken Access Controls, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF) work in the real world, including stories of finding these exact bugs on major platforms like Google.<br /><br />After the demos, we tackle the biggest questions new hackers have: Is there still money to be made in 2026? How has AI changed the landscape? And what is the exact roadmap to landing your first bounty? Justin breaks down his "200-hour rule" for learning, why you need to get comfortable with failing, and the best resources (like HackerOne and PortSwigger) to help you launch your cybersecurity career today.<br /><br />#webhacking #bugbounty #threatlocker<br />...<br />https://www.youtube.com/watch?v=KBIQE9fo8mU]]></description><link>https://odysee.com/top-4-web-hacking-demos-for-aspiring:2fcc349adf28200058fa8af6dc144772fe01d6e5</link><guid isPermaLink="true">https://odysee.com/top-4-web-hacking-demos-for-aspiring:2fcc349adf28200058fa8af6dc144772fe01d6e5</guid><pubDate>Sun, 15 Mar 2026 14:30:25 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/top-4-web-hacking-demos-for-aspiring/2fcc349adf28200058fa8af6dc144772fe01d6e5/2b8d6e.mp4" length="292315384" type="video/mp4"/><itunes:title>Top 4 Web hacking demos for aspiring hackers (with labs and CTF)</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/KBIQE9fo8mU"/><itunes:duration>1512</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Every Reason Why I Hate AI and You Should Too]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/KsXzTz5H2QQ" width="480" alt="thumbnail" title="Every Reason Why I Hate AI and You Should Too" /></p>Big thanks to @ThreatLocker for sponsoring my trip to ZTW26 and also for sponsoring this video.  To start your free trial with ThreatLocker please use the following link:  https://www.threatlocker.com/davidbombal<br /><br />Cybersecurity expert Marcus Hutchins (MalwareTech) sits down to cut through the 2026 AI hype, explaining why threat actors aren't using generative AI and why it won't replace tech jobs.<br /><br />In this deep dive, Marcus reveals the reality behind the AI tech bubble and how executive hype is distracting from actual network vulnerabilities. We discuss the dangers of "vibe coding" critical infrastructure, why reactive SOC teams are giving attackers too much time, and why mastering foundational cybersecurity skills is more important now than ever. If you're navigating the current tech job market or working in threat intelligence, this is the reality check you need.<br /><br />// Blog Entry //<br />Every Reason Why I Hate AI and you should too: https://malwaretech.com/2025/08/every-reason-why-i-hate-ai.html<br /><br />// Marcus Hutchins’ SOCIAL //<br />YouTube:  https://www.youtube.com/MalwareTechBlog<br />Website:  https://marcushutchins.com/<br />Discord:  https://discord.com/invite/malwaretech<br />LinkedIn:  https://www.linkedin.com/in/malwaretech/<br />BlueSky:  https://bsky.app/profile/malwaretech.com<br />TikTok:  https://www.tiktok.com/@itsmarcushutchins<br />Mastadon:  https://infosec.exchange/@malwaretech<br />Instagram:  https://www.instagram.com/malwaretech<br />X:  https://x.com/malwaretechblog<br /><br />// David's SOCIAL // <br />Discord: https://discord.com/invite/usKSyzb <br />X: https://www.twitter.com/davidbombal <br />Instagram: https://www.instagram.com/davidbombal <br />LinkedIn: https://www.linkedin.com/in/davidbombal <br />Facebook: https://www.facebook.com/davidbombal.co <br />TikTok: http://tiktok.com/@davidbombal <br />YouTube: https://www.youtube.com/@davidbombal<br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ<br />SoundCloud:  https://soundcloud.com/davidbombal<br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532<br /><br />// MY STUFF // <br />https://www.amazon.com/shop/davidbombal <br /><br />// SPONSORS // <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com<br /><br />// MENU //<br />0:00 - Coming Up<br />0:58 - Intro<br />03:03 - Why Marcus Is Tired Of AI<br />04:49 - Threat Actors Hurting Themselves<br />06:35 - Data Centres In Space<br />09:07 - Will AI Damage Cybersecurity?<br />13:25 - AI Makes Developers Lazy (Vibe Coding)<br />19:58 - Every Reason Why Marcus Hates AI<br />24:07 - Is AI A Bubble?<br />25:54 - Will AI Take People's Jobs?<br />30:56 - When Will The AI Bubble Pop?<br />33:55 - Marcus' Advice To The Youth<br />34:40 - Is AI Malware Affective?<br />36:27 - Proactive Defence<br />40:26 - Marcus Is An AI Hater<br />45:58 - Will There Ever Be Enough Guardrails?<br />48:07 - Final Thoughts<br />49:57 - Conclusion<br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! <br /><br />Disclaimer: This video is for educational purposes only.<br /><br />#ai #cybersecurity #aimalware<br />...<br />https://www.youtube.com/watch?v=KsXzTz5H2QQ]]></description><link>https://odysee.com/every-reason-why-i-hate-ai-and-you:014bb9a03bb9606486050f237710e769f8073315</link><guid isPermaLink="true">https://odysee.com/every-reason-why-i-hate-ai-and-you:014bb9a03bb9606486050f237710e769f8073315</guid><pubDate>Fri, 13 Mar 2026 14:30:13 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/every-reason-why-i-hate-ai-and-you/014bb9a03bb9606486050f237710e769f8073315/931257.mp4" length="619183096" type="video/mp4"/><itunes:title>Every Reason Why I Hate AI and You Should Too</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/KsXzTz5H2QQ"/><itunes:duration>3069</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[This device captures TRUE randomness]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/ncoDq5EcPFg" width="480" alt="thumbnail" title="This device captures TRUE randomness" /></p>Quantum computing threatens pseudo random numbers, making true randomness essential for cybersecurity. Discover how a physical true random number generator uses dice to secure TLS certificates.<br /><br />Big thanks to ThreatLocker for sponsoring my trip to ZTW26 and also for sponsoring this video.  To start your free trial with ThreatLocker please use the following link:  https://www.threatlocker.com/davidbombal<br /><br />#randomnumbers #randomness #ztw26<br />...<br />https://www.youtube.com/watch?v=ncoDq5EcPFg]]></description><link>https://odysee.com/this-device-captures-true-randomness:1d536832898febdf6ee30488915c395428024b54</link><guid isPermaLink="true">https://odysee.com/this-device-captures-true-randomness:1d536832898febdf6ee30488915c395428024b54</guid><pubDate>Fri, 13 Mar 2026 13:01:38 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/this-device-captures-true-randomness/1d536832898febdf6ee30488915c395428024b54/120149.mp4" length="14300547" type="video/mp4"/><itunes:title>This device captures TRUE randomness</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/ncoDq5EcPFg"/><itunes:duration>122</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Why No Auto Vuln Agent? 4 Limits Blocking AI Bug Hunting]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/tya56SPQW78" width="480" alt="thumbnail" title="Why No Auto Vuln Agent? 4 Limits Blocking AI Bug Hunting" /></p>In this episode, David Bombal sits down with vulnerability researcher Vladimir Tokarev (with Dawid on the interview) to show what AI-assisted vulnerability research looks like when it actually works.<br /><br />Vladimir walks through two real vulnerability case studies and uses them to explain a practical workflow for finding bugs faster with LLMs, without pretending the AI is “fully autonomous.”<br /><br />Demo 1: Gemini CLI command injection<br />Vladimir demonstrates a command injection issue in Gemini CLI tied to the IDE / VS Code extension install flow. He shows how a malicious VSIX file name or path can be crafted so that when the install command is executed, the system ends up running an attacker-controlled command (the demo uses a harmless calculator launch to prove execution). The conversation then breaks down what a VSIX is, what the realistic attack paths are (user tricked into installing a malicious extension or placing it in the right directory), and why this class of bug matters for endpoints running local AI agents.<br /><br />Demo 2: VirtualBox integer overflow and VM escape class impact<br />Next, Vladimir switches to a VirtualBox vulnerability involving an integer overflow that can lead to out-of-bounds read/write in the host process. Because of architecture constraints, he shows the exploit behavior via a recorded clip, then explains the bug using source code. The key teaching moment is the mismatch between 32-bit arithmetic used in bounds checking and 64-bit pointer arithmetic used during the actual memory move, creating a pathway to bypass checks and copy memory outside the intended buffer.<br />Vladimir also explains why having both read and write primitives is powerful for exploitation, and how modern mitigations make “blind” exploitation unrealistic without memory disclosure.<br /><br />How the bugs were found with AI<br />Vladimir then explains the workflow he uses in real engagements:<br />• Run static analysis to generate leads at scale<br />• Use an LLM to triage and filter out noise<br />• Validate the remaining findings by tracing code paths and checking exploitability<br />• Use AI again to accelerate setup, debugging, reverse engineering, and iteration<br /><br />He shares a key insight: the win is not “AI finds everything for you,” it is that AI helps you spend your time on the hardest parts—validation, exploit logic, and decision-making—instead of drowning in thousands (or millions) of findings.<br /><br />Why there is no fully autonomous vuln-research agent yet<br />Finally, Vladimir lays out four practical blockers:<br />1. Depth reasoning (long multi-step exploit chains)<br />2. Context limits (missing system-level constraints and assumptions)<br />3. Learning from failure (repeating bad leads)<br />4. Exploration (poor goal-driven search without strong reinforcement learning)<br /><br />The interview ends with advice for newcomers: start by reproducing known CVEs, learn by doing, and use AI with guardrails to avoid hallucinations and time-wasting rabbit holes. Vladimir also mentions workshops where he teaches these workflows at conferences.<br /><br />// Vladimir Tokarev’s SOCIAL // <br />X:  https://x.com/G1ND1L4 <br />LinkedIn:  https://www.linkedin.com/in/vladimir-eliezer-tokarev/ <br /><br />// Dawid van Straaten’s SOCIAL // <br />LinkedIn:  https://www.linkedin.com/in/dawid-van-straaten-31a3742b/ <br />X:  https://x.com/nullaxiom?s=21 <br /><br />// David's SOCIAL //  <br />Discord: https://discord.com/invite/usKSyzb  <br />X: https://www.twitter.com/davidbombal  <br />Instagram: https://www.instagram.com/davidbombal  <br />LinkedIn: https://www.linkedin.com/in/davidbombal  <br />Facebook: https://www.facebook.com/davidbombal.co  <br />TikTok: http://tiktok.com/@davidbombal  <br />YouTube: https://www.youtube.com/@davidbombal <br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ <br />SoundCloud:  https://soundcloud.com/davidbombal <br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532 <br /><br />// MY STUFF // <br />https://www.amazon.com/shop/davidbombal  <br /><br />// SPONSORS //  <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com <br /><br />// MENU // <br />0:00 - Coming up <br />01:14 - Vladimir Tokarev introduction and AI hacking tools <br />03:27 - Gemini CLI hacking demo <br />09:03 - Vulnerability code explained <br />10:08 - Integer overflow vulnerability demo <br />14:28 - Source code vulnerability explained <br />22:24 - How the vulnerabilities were discovered <br />26:34 - AI speeding up the process // Issues with AI <br />34:06 - How much does AI help with workflow <br />35:43 - AI for defenders and for attackers <br />38:12 - How to become like Vladimir <br />42:57 - AI accelerating workflow <br />44:33 - How to prevent AI hallucinations <br />46:23 - AI assistant tools <br />48:13 - Conclusion <br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!  <br /><br />Disclaimer: This video is for educational purposes only.<br />#vulnerabilityresearch #ai #virtualbox<br />...<br />https://www.youtube.com/watch?v=tya56SPQW78]]></description><link>https://odysee.com/why-no-auto-vuln-agent-4-limits-blocking:d2acec2396cb44e5d612eb6835206330398ee5a4</link><guid isPermaLink="true">https://odysee.com/why-no-auto-vuln-agent-4-limits-blocking:d2acec2396cb44e5d612eb6835206330398ee5a4</guid><pubDate>Sun, 08 Mar 2026 15:01:32 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/why-no-auto-vuln-agent-4-limits-blocking/d2acec2396cb44e5d612eb6835206330398ee5a4/663af7.mp4" length="80224443" type="video/mp4"/><itunes:title>Why No Auto Vuln Agent? 4 Limits Blocking AI Bug Hunting</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/tya56SPQW78"/><itunes:duration>2855</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[WHY Your Cheap Chinese IoT Camera Is A Network NIGHTMARE]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/mJ6tgZcuFzU" width="480" alt="thumbnail" title="WHY Your Cheap Chinese IoT Camera Is A Network NIGHTMARE" /></p>Are your smart home devices spying on you? In this video, David Bombal interviews cybersecurity researcher and IoT penetration tester, Matt Brown, to reveal how to intercept and decrypt supposedly secure SSL/TLS traffic from IoT devices.<br /><br />Matt demonstrates his open-source tool, "Man in the Middle Router," a specialized Linux-based bash script designed to simplify IoT hardware hacking labs. This tool stitches together essential Linux utilities—including HostAPD (for access points), DNSmasq (for DHCP), and iptables (for traffic routing)—to transform any Linux computer or Raspberry Pi into a transparent intercepting router. In this technical deep-dive, you will learn: How a Man in the Middle (MITM) attack intercepts encrypted TLS (HTTPS) communications.<br /><br />How to set up an IoT penetration testing lab using minimal hardware, such as an Alpha Wi-Fi adapter and an Ethernet dongle. The difference between theoretical attacks and real-world vulnerabilities like the failure of IoT devices to validate server certificates. Transparent proxy setup using tools like mitmproxy to visualize raw API data.<br /><br />Live Hacking Demonstration Matt moves beyond theory to demonstrate a live hack of an Anran Wi-Fi security camera purchased from eBay. He shows the exact process of capturing and decrypting the camera's API traffic (apis.us-west.cloudedge360.com). This demonstration exposes that the device is transmitting sensitive information—including authentication credentials—in cleartext over HTTP inside the broken TLS tunnel.<br /><br />Whether you are a network engineer, network security analyst, or a hardware hacking enthusiast, this video provides a step-by-step framework for auditing the security and privacy of the devices on your network.<br /><br />// Matt Brown’s SOCIAL //<br />X:  https://x.com/nmatt0<br />YouTube:  https://www.youtube.com/@mattbrwn<br />LinkedIn:  https://www.linkedin.com/in/mattbrwn/<br />GitHub:  https://github.com/nmatt0<br />Reddit:  https://github.com/nmatt0<br />Website (with training courses):  https://training.brownfinesecurity.com/<br /><br />// GitHub REFERENCE //<br />mitmrouter:   https://github.com/nmatt0/mitmrouter<br /><br />// Camera REFERECE //<br />https://www.amazon.com/ANRAN-Security-Spotlights-Detection-Compatible/dp/B09XV1RD9N?th=1<br /><br />// David's SOCIAL // <br />Discord: https://discord.com/invite/usKSyzb <br />X: https://www.twitter.com/davidbombal <br />Instagram: https://www.instagram.com/davidbombal <br />LinkedIn: https://www.linkedin.com/in/davidbombal <br />Facebook: https://www.facebook.com/davidbombal.co <br />TikTok: http://tiktok.com/@davidbombal <br />YouTube: https://www.youtube.com/@davidbombal<br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ<br />SoundCloud:  https://soundcloud.com/davidbombal<br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532<br /><br />// MY STUFF //<br />https://www.amazon.com/shop/davidbombal <br /><br />// SPONSORS // <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com<br /><br />// MENU //<br />0:00 - Coming Up<br />0:33 - Introduction<br />02:33 - Matt’s Solution for IoT Devices<br />05:38 - Getting around SSL Pining / Certificate Validation<br />08:55 - Demo - The Basics<br />12:00 - Demo - Man In The Middle Router Tool<br />15:00 - Demo - Software/Hardware Considerations<br />20:12 - Demo - MITM Proxy<br />24:43 - Demo - MITM Router<br />33:58 - Example Using a Real IoT Device<br />36:33 - David’s Questions <br />37:50 - More About Matt Brown<br />38:41 - Android Vs Apple<br />40:33 - Outro<br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! <br /><br />Disclaimer: This video is for educational purposes only.<br />#iot #hacking #iothacking<br />...<br />https://www.youtube.com/watch?v=mJ6tgZcuFzU]]></description><link>https://odysee.com/why-your-cheap-chinese-iot-camera-is-a:62c8a29c0345b7ac44951d330b474759a51be406</link><guid isPermaLink="true">https://odysee.com/why-your-cheap-chinese-iot-camera-is-a:62c8a29c0345b7ac44951d330b474759a51be406</guid><pubDate>Fri, 06 Mar 2026 14:48:59 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/why-your-cheap-chinese-iot-camera-is-a/62c8a29c0345b7ac44951d330b474759a51be406/dc291e.mp4" length="487120809" type="video/mp4"/><itunes:title>WHY Your Cheap Chinese IoT Camera Is A Network NIGHTMARE</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/mJ6tgZcuFzU"/><itunes:duration>2547</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Think like a HACKER to defend]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/FOqRUm2GJnw" width="480" alt="thumbnail" title="Think like a HACKER to defend" /></p>Live from ZTW26 in Orlando. To truly defend your network, you need to understand the offensive side. <br /><br />This video is sponsored by ThreatLocker!<br /><br />#ztw26 #hackinglabs #threatlocker<br />...<br />https://www.youtube.com/watch?v=FOqRUm2GJnw]]></description><link>https://odysee.com/think-like-a-hacker-to-defend:7f23a6b52aec212d2251a1097291c76c94401e94</link><guid isPermaLink="true">https://odysee.com/think-like-a-hacker-to-defend:7f23a6b52aec212d2251a1097291c76c94401e94</guid><pubDate>Wed, 04 Mar 2026 17:00:32 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/think-like-a-hacker-to-defend/7f23a6b52aec212d2251a1097291c76c94401e94/52b927.mp4" length="3692247" type="video/mp4"/><itunes:title>Think like a HACKER to defend</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/FOqRUm2GJnw"/><itunes:duration>33</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Why is a WAF No Longer Enough?]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/rkj2Ahp2QKs" width="480" alt="thumbnail" title="Why is a WAF No Longer Enough?" /></p>What is a WAF, and why is it no longer enough? This short explains web application firewall basics, API security, bot management, and how agentic AI protection works.<br /><br />This video is sponsored by Radware.<br /><br />Read the article here: https://www.radware.com/blog/threat-intelligence/zombieagent/<br /><br />#ai #cybersecurity #radware<br />...<br />https://www.youtube.com/watch?v=rkj2Ahp2QKs]]></description><link>https://odysee.com/why-is-a-waf-no-longer-enough:be4c47f19065723ebfa675116390ef67a8c7bcfd</link><guid isPermaLink="true">https://odysee.com/why-is-a-waf-no-longer-enough:be4c47f19065723ebfa675116390ef67a8c7bcfd</guid><pubDate>Sun, 01 Mar 2026 15:01:31 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/why-is-a-waf-no-longer-enough/be4c47f19065723ebfa675116390ef67a8c7bcfd/8fd1a4.mp4" length="12498996" type="video/mp4"/><itunes:title>Why is a WAF No Longer Enough?</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/rkj2Ahp2QKs"/><itunes:duration>102</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Why 1000 Linux Servers Are a NIGHTMARE Without This Tool]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/-SXddlIZkUs" width="480" alt="thumbnail" title="Why 1000 Linux Servers Are a NIGHTMARE Without This Tool" /></p>Learn Splunk basics with James Hodge in this ultimate tutorial. We dive into SPL, analyzing Linux logs, and a powerful AI Canvas demo for network troubleshooting.<br /><br />Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Live Amsterdam 2026.<br /><br />// James Hodge’s SOCIAL //<br />LinkedIn:  https://www.linkedin.com/in/jameshodge/<br /><br />// David's SOCIAL // <br />Discord: https://discord.com/invite/usKSyzb <br />X: https://www.twitter.com/davidbombal <br />Instagram: https://www.instagram.com/davidbombal <br />LinkedIn: https://www.linkedin.com/in/davidbombal <br />Facebook: https://www.facebook.com/davidbombal.co <br />TikTok: http://tiktok.com/@davidbombal <br />YouTube: https://www.youtube.com/@davidbombal<br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ<br />SoundCloud:  https://soundcloud.com/davidbombal<br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532<br /><br />// MY STUFF //<br />https://www.amazon.com/shop/davidbombal <br /><br />// SPONSORS // <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com<br /><br />// MENU //<br />0:00 - Coming up<br />0:47 - James' background<br />01:36 - Splunk basics // What is Splunk?<br />04:17 - Splunk demo<br />07:35 - How Splunk analyses the data<br />10:13 - Bringing in raw data<br />12:22 - Splunk demo continued<br />21:38 - Dark Mode funny story<br />22:25 - Splunk demo continued<br />24:12 - The toilet story<br />27:56 - Modern Splunk dashboard demo<br />30:45 - AI Canvas demo<br />34:53 - Conclusion<br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! <br /><br />Disclaimer: This video is for educational purposes only.<br />#splunk #cisco #ciscolive<br />...<br />https://www.youtube.com/watch?v=-SXddlIZkUs]]></description><link>https://odysee.com/why-1000-linux-servers-are-a-nightmare:accd0a8900081f8c8bd5f27f6926d774c2945c6c</link><guid isPermaLink="true">https://odysee.com/why-1000-linux-servers-are-a-nightmare:accd0a8900081f8c8bd5f27f6926d774c2945c6c</guid><pubDate>Sun, 01 Mar 2026 14:30:01 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/why-1000-linux-servers-are-a-nightmare/accd0a8900081f8c8bd5f27f6926d774c2945c6c/5d0f3c.mp4" length="234412996" type="video/mp4"/><itunes:title>Why 1000 Linux Servers Are a NIGHTMARE Without This Tool</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/-SXddlIZkUs"/><itunes:duration>2107</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[These 6 Sci-Fi Movies Predicted The AI Nightmare!]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/lhypZBpHGcU" width="480" alt="thumbnail" title="These 6 Sci-Fi Movies Predicted The AI Nightmare!" /></p>Big thanks to Brilliant for sponsoring this video. To try everything Brilliant has to offer, visit https://brilliant.org/davidbombal to start your 30-day free trial or scan the QR code onscreen – You’ll also get 20% off an annual premium subscription<br /><br />Join hacker OTW and David Bombal as they rank the top 6 AI movies that<br />predicted the future of cybersecurity. From Ex Machina to The Matrix, discover which films got 2026 right.<br /><br />In this video, OTW breaks down his curated list of the best Artificial Intelligence movies that every tech enthusiast and cybersecurity professional needs to watch. We aren't just reviewing films; we are analyzing how sci-fi predictions from decades ago are becoming<br />reality in 2026. We discuss the dangers of removing AI guardrails as seen in<br />Companion, the terrifying reality of predictive policing and surveillance mirrored in Minority Report, and the ethical dilemmas of AI consciousness explored in Her and Ex Machina. OTW also dives into 2001: A Space Odyssey<br />and The Matrix to discuss Neuralink, data center energy consumption, and the risks of AI self-preservation.<br /><br />Are we heading toward a dystopian future, or can we still implement the right<br />regulations?<br /><br />// Occupy The Web SOCIAL // <br />X: https://twitter.com/three_cube <br />Website:  https://hackers-arise.net/<br /><br />// Occupy The Web Books // <br />Linux Basics for Hackers 2nd Ed<br />US:  https://amzn.to/3TscpxY<br />UK:  https://amzn.to/45XaF7j<br /><br />Linux Basics for Hackers:<br />US:   https://amzn.to/3wqukgC<br />UK:   https://amzn.to/43PHFev <br /><br />Getting Started Becoming a Master Hacker<br />US: https://amzn.to/4bmGqX2<br />UK:   https://amzn.to/43JG2iA <br /><br />Network Basics for hackers:<br />US:  https://amzn.to/3yeYVyb<br />UK:   https://amzn.to/4aInbGK <br /><br />// OTW Discount // <br />Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://hackers-arise.net/<br /><br />// Playlists REFERENCE //<br />Linux Basics for Hackers:   https://www.youtube.com/watch?v=YJUVNlmIO6E&list=PLhfrWIlLOoKOs-fjCPHdzD2icF2vORfwK&pp=iAQB<br />Mr Robot:  https://www.youtube.com/watch?v=3yiT_WMlosg&list=PLhfrWIlLOoKNYR8uvEXSAzDfKGAPIDB8q&pp=iAQB<br />Hackers Arise / Occupy the Web Hacks:  https://www.youtube.com/watch?v=GxkKszPVD1M&list=PLhfrWIlLOoKOf1Ru_TFAnubVuWc87i-7z&pp=iAQB<br /><br />// David's SOCIAL // <br />Discord: https://discord.com/invite/usKSyzb <br />X: https://www.twitter.com/davidbombal <br />Instagram: https://www.instagram.com/davidbombal <br />LinkedIn: https://www.linkedin.com/in/davidbombal <br />Facebook: https://www.facebook.com/davidbombal.co <br />TikTok: http://tiktok.com/@davidbombal <br />YouTube: https://www.youtube.com/@davidbombal<br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ<br />SoundCloud:  https://soundcloud.com/davidbombal<br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532<br /><br />// MY STUFF //<br /> https://www.amazon.com/shop/davidbombal <br /><br />// SPONSORS // <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com<br /><br />// MENU //<br />0:00 - Coming up<br />0:47 - OTW introduction // OTW books<br />02:02 - Brilliant sponsored segment<br />04:08 - AI in Hollywood and media<br />08:06 - Top 6 movies about AI<br />11:29 - Movie #6 // Guardrails on AI<br />19:27 - Movie #5 // AI-controlled media<br />27:35 - Movie #4 // AI crime detection<br />39:38 - Movie #3 // AI self-preservation<br />48:55 - Movie #2 // Human & AI relationships<br />55:23 - Movie #1 // AI Turing test<br />01:04:57 - Top 6 AI movies summary<br />01:11:02 - Conclusion<br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! <br /><br />Disclaimer: This video is for educational purposes only.<br />#ai #movies #aimovies<br />...<br />https://www.youtube.com/watch?v=lhypZBpHGcU]]></description><link>https://odysee.com/these-6-sci-fi-movies-predicted-the-ai:e7dbc244437d18723c749ac2b7e6c777173e4feb</link><guid isPermaLink="true">https://odysee.com/these-6-sci-fi-movies-predicted-the-ai:e7dbc244437d18723c749ac2b7e6c777173e4feb</guid><pubDate>Fri, 27 Feb 2026 14:30:43 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/these-6-sci-fi-movies-predicted-the-ai/e7dbc244437d18723c749ac2b7e6c777173e4feb/ce4684.mp4" length="237783507" type="video/mp4"/><itunes:title>These 6 Sci-Fi Movies Predicted The AI Nightmare!</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/lhypZBpHGcU"/><itunes:duration>4339</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[How to hit 650Gbps firewall SPEEDS]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/TjCkYqXtxeI" width="480" alt="thumbnail" title="How to hit 650Gbps firewall SPEEDS" /></p>Discover the ultimate next-generation firewall packing 256 CPU cores and scaling up to an insane 8 terabit cluster throughput. Watch how it handles 650G speeds and 150G TLS encryption effortlessly.<br /><br />Thank you to @Cisco  for sponsoring this video and my trip to Cisco Live EMEA!<br /><br />#cisco #ciscolive #ciscoemea<br />...<br />https://www.youtube.com/watch?v=TjCkYqXtxeI]]></description><link>https://odysee.com/how-to-hit-650gbps-firewall-speeds:a9749d9b71cff451605495504bb0b9db023b6ee7</link><guid isPermaLink="true">https://odysee.com/how-to-hit-650gbps-firewall-speeds:a9749d9b71cff451605495504bb0b9db023b6ee7</guid><pubDate>Wed, 25 Feb 2026 17:00:48 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/how-to-hit-650gbps-firewall-speeds/a9749d9b71cff451605495504bb0b9db023b6ee7/dfc59d.mp4" length="15733242" type="video/mp4"/><itunes:title>How to hit 650Gbps firewall SPEEDS</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/TjCkYqXtxeI"/><itunes:duration>178</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Linux rm: Great power = great responsibility (Learn Linux in 180s)]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/BuCxbVBGfTI" width="480" alt="thumbnail" title="Linux rm: Great power = great responsibility (Learn Linux in 180s)" /></p>#linux #windows #kalilinux<br />...<br />https://www.youtube.com/watch?v=BuCxbVBGfTI]]></description><link>https://odysee.com/linux-rm-great-power-great:c15ee46fc60b8265c3a7acf9ffd8ba86032ea2f7</link><guid isPermaLink="true">https://odysee.com/linux-rm-great-power-great:c15ee46fc60b8265c3a7acf9ffd8ba86032ea2f7</guid><pubDate>Tue, 24 Feb 2026 22:00:20 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/linux-rm-great-power-great/c15ee46fc60b8265c3a7acf9ffd8ba86032ea2f7/e1c443.mp4" length="13287597" type="video/mp4"/><itunes:title>Linux rm: Great power = great responsibility (Learn Linux in 180s)</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/BuCxbVBGfTI"/><itunes:duration>166</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Sandbox ESCAPE in Chrome]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/GD5Xp0KQkiE" width="480" alt="thumbnail" title="Sandbox ESCAPE in Chrome" /></p>Google patches the first Chrome Zero Day of 2026. This critical CSS exploit allows sandbox escapes via malicious HTML. Update your browser and audit your extensions now to stay safe.<br /><br />#chrome #google #zeroday<br />...<br />https://www.youtube.com/watch?v=GD5Xp0KQkiE]]></description><link>https://odysee.com/sandbox-escape-in-chrome:6417ab05f591067108937696d4276da7b5174390</link><guid isPermaLink="true">https://odysee.com/sandbox-escape-in-chrome:6417ab05f591067108937696d4276da7b5174390</guid><pubDate>Sun, 22 Feb 2026 16:30:08 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/sandbox-escape-in-chrome/6417ab05f591067108937696d4276da7b5174390/c1164f.mp4" length="13491900" type="video/mp4"/><itunes:title>Sandbox ESCAPE in Chrome</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/GD5Xp0KQkiE"/><itunes:duration>139</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Is It Always DNS? Wireshark Packet Analysis]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/9b4EjMsB5bg" width="480" alt="thumbnail" title="Is It Always DNS? Wireshark Packet Analysis" /></p>In this deep dive, David Bombal is joined by Wireshark expert Chris Greer to<br />strip down the most critical protocol on the internet: DNS. We move beyond the<br />theory to show you exactly what DNS looks like "on the wire." Chris reveals why a staggering 92% of malware uses DNS for Command and Control (C2) and how you can use packet analysis to detect these breaches before they spread. We also debunk common myths about DNS only using UDP, explore the "Librarian" analogy for Root Servers, and walk through a live capture of a request to a real website.<br /><br />What You Will Learn:<br />•Malware Detection: Why 92% of malware relies on DNS and how to spot C2 traffic.<br />• Packet Anatomy: A line-by-line breakdown of DNS headers, Transaction IDs, and Flags in Wireshark.<br />• The TCP Myth: Why blocking TCP port 53 on your firewall can break yournetwork (and why DNS needs it).<br />• Troubleshooting: How to measure DNS latency (response time) to pinpoint<br />slow network performance.<br />• Recursive Lookups: Understanding the chain from your PC to the Root Servers and back.<br /><br />Big thanks to Infoblox for sponsoring this video.  For more information on Infoblox have a look at their website:  https://www.infoblox.com/ <br /><br />// Chris Greer’s SOCIAL // <br />YouTube:  https://www.youtube.com/chrisgreer <br />Udemy:  https://www.udemy.com/user/chris-greer-13/?srsltid=AfmBOoq4i6e9-KExvR77vigyHXmQSuE-w4SgSUmDNDNxioD8gvUYuzS6 <br />LinkedIn:  https://www.linkedin.com/in/cgreer/ <br />Website:  https://packetpioneer.com/ <br /><br />// Specific Website REFERENCE // <br />https://github.com/packetpioneer/youtube/blob/main/dns_bombalbasic.pcapng <br />https://github.com/packetpioneer/youtube/blob/main/dns_bombalfulllookup.pcapng <br />https://www.wireshark.org/certifications/ <br />https://packetschool.teachable.com/ <br /><br />// WCA Course REFERENCE// <br />https://packetschool.teachable.com/l/pdp/wca <br /> <br /><br />// Chris’ DNS Series on YouTube ‘’ <br />https://youtu.be/fRRR0sU0BnY <br /><br />// Link to YouTube VIDEO: <br />https://youtu.be/3FPaTvCJojQ <br /><br />// David's SOCIAL //  <br />Discord: https://discord.com/invite/usKSyzb  <br />X: https://www.twitter.com/davidbombal  <br />Instagram: https://www.instagram.com/davidbombal  <br />LinkedIn: https://www.linkedin.com/in/davidbombal  <br />Facebook: https://www.facebook.com/davidbombal.co  <br />TikTok: http://tiktok.com/@davidbombal  <br />YouTube: https://www.youtube.com/@davidbombal <br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ <br />SoundCloud:  https://soundcloud.com/davidbombal <br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532 <br /><br /><br />// MY STUFF // <br />https://www.amazon.com/shop/davidbombal  <br /><br />// SPONSORS //  <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com <br /><br />// MENU // <br />0:00 - Coming up <br />0:52 - More Wireshark! // It's always DNS <br />02:45 - Infoblox sponsored segment <br />03:37 - DNS basics in Wireshark // How DNS works <br />06:52 - Analysing the DNS packet capture <br />08:32 - Destination address explained <br />10:09 - Transaction ID explained <br />11:13 - Flags explained <br />13:26 - Questions, Answer RRs & Additional RRs explained <br />15:39 - Additional records explained <br />17:07 - Response walkthrough <br />19:24 - Real DNS packet capture walkthrough <br />21:17 - Quick Wireshark tip <br />22:32 - Walkthrough continued <br />25:55 - Going deeper // How DNS resolver works <br />32:41 - More on Chris Greer YouTube channel and more to come <br />35:36 - Conclusion <br /><br /><br />Please note that links listed may be affiliate links and provide me with a small percentage<br />/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!  <br /> <br />Disclaimer: This video is for educational purposes only. <br />#dns #infoblox #wireshark<br />...<br />https://www.youtube.com/watch?v=9b4EjMsB5bg]]></description><link>https://odysee.com/is-it-always-dns-wireshark-packet:86248956f209b372d0f7b0c80a1598793bef4fcb</link><guid isPermaLink="true">https://odysee.com/is-it-always-dns-wireshark-packet:86248956f209b372d0f7b0c80a1598793bef4fcb</guid><pubDate>Sun, 22 Feb 2026 14:30:08 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/is-it-always-dns-wireshark-packet/86248956f209b372d0f7b0c80a1598793bef4fcb/499ba2.mp4" length="280502292" type="video/mp4"/><itunes:title>Is It Always DNS? Wireshark Packet Analysis</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/9b4EjMsB5bg"/><itunes:duration>2193</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[BBC Reporter Hacked via AI Vibe Coding Platform - do you trust these platforms?]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/A8KypDGjjYQ" width="480" alt="thumbnail" title="BBC Reporter Hacked via AI Vibe Coding Platform - do you trust these platforms?" /></p>#cybersecurity #ai #bbc<br />...<br />https://www.youtube.com/watch?v=A8KypDGjjYQ]]></description><link>https://odysee.com/bbc-reporter-hacked-via-ai-vibe-coding:7d1c6a23b068a9538320e865626979e36a8f5dbf</link><guid isPermaLink="true">https://odysee.com/bbc-reporter-hacked-via-ai-vibe-coding:7d1c6a23b068a9538320e865626979e36a8f5dbf</guid><pubDate>Sat, 21 Feb 2026 16:00:12 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/bbc-reporter-hacked-via-ai-vibe-coding/7d1c6a23b068a9538320e865626979e36a8f5dbf/2e4f25.mp4" length="16848664" type="video/mp4"/><itunes:title>BBC Reporter Hacked via AI Vibe Coding Platform - do you trust these platforms?</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/A8KypDGjjYQ"/><itunes:duration>179</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[1.2M Exposed: WHY Port 23 is a Nightmare]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/YoJbnUP1VLk" width="480" alt="thumbnail" title="1.2M Exposed: WHY Port 23 is a Nightmare" /></p>Think Telnet is dead? Think again. We used Shodan to find over 1.2 million devices still exposing Port 23. See why leaving your Linux servers or IP cameras open is a massive cybersecurity risk.<br /><br />#telnet #linux #shodan<br />...<br />https://www.youtube.com/watch?v=YoJbnUP1VLk]]></description><link>https://odysee.com/1.2m-exposed-why-port-23-is-a-nightmare:65693b8ef35a289bd29adf8485f64314cc9d5d38</link><guid isPermaLink="true">https://odysee.com/1.2m-exposed-why-port-23-is-a-nightmare:65693b8ef35a289bd29adf8485f64314cc9d5d38</guid><pubDate>Fri, 20 Feb 2026 15:30:31 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/1.2m-exposed-why-port-23-is-a-nightmare/65693b8ef35a289bd29adf8485f64314cc9d5d38/fd529e.mp4" length="17259768" type="video/mp4"/><itunes:title>1.2M Exposed: WHY Port 23 is a Nightmare</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/YoJbnUP1VLk"/><itunes:duration>165</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Hacking LLMs: How to Prevent Prompt Injection Attacks Now]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/aR5V30SUK6k" width="480" alt="thumbnail" title="Hacking LLMs: How to Prevent Prompt Injection Attacks Now" /></p>In this video, we dive into a real-world Red Team vs. Blue Team scenario. We simulate a cyberattack on a Finance Application that has integrated a new LLM Chatbot. You’ll see firsthand how attackers use Prompt Injection to bypass standard rules, how they move laterally through Kubernetes clusters, and how they attempt to execute Zero Day exploits.<br /><br />More importantly, we show you how to defend against it. Using Cisco’s Hybrid Mesh Firewall, AI Defense, and Secure Workload, we demonstrate how to:<br />1. Detect & Block Prompt Injections: safeguarding your LLMs from manipulation.<br />2. Secure Kubernetes: using micro-segmentation to isolate threats in the cloud.<br />3. Inspect Encrypted Traffic: utilizing the Encrypted Visibility Engine (EVE) to<br />spot malware in TLS flows without decryption. <br /><br />Whether you are a Network Engineer, Security Analyst, or just interested in how AI is changing the cybersecurity landscape, this demo is packed with practical insights<br /><br />Big thank you to Cisco for sponsoring my trip to Cisco Live Amsterdam. <br /><br />// Ant Ducker SOCIALS // <br />LinkedIn:  https://www.linkedin.com/in/ant-ducker-0052801/ <br />YouTube channel dCloud:  https://www.youtube.com/@CiscodCloud <br /><br />// Website REFERENCE  // <br />Cisco Security Cloud control:  https://sign-on.security.cisco.com/ <br />Cisco.com:  https://www.cisco.com/site/us/en/solutions/security/hybrid-mesh-firewall/index.html <br /><br />// YouTube Video REFERENCE // <br />Rick Miles’ video will be linked at a later stage once published. <br /><br />// David's SOCIAL //  <br />Discord: https://discord.com/invite/usKSyzb  <br />X: https://www.twitter.com/davidbombal  <br />Instagram: https://www.instagram.com/davidbombal  <br />LinkedIn: https://www.linkedin.com/in/davidbombal  <br />Facebook: https://www.facebook.com/davidbombal.co  <br />TikTok: http://tiktok.com/@davidbombal  <br />YouTube: https://www.youtube.com/@davidbombal <br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ <br />SoundCloud:  https://soundcloud.com/davidbombal <br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532 <br /><br />// MY STUFF // <br />https://www.amazon.com/shop/davidbombal  <br /><br />// SPONSORS //  <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com <br /> <br />// MENU // <br />0:00 - Coming Up <br />01:29 - Intro <br />02:20 - Demo Overview <br />03:57 - Demo Begins <br />09:35 - Adding Guardrails <br />11:45 - Secure Workloads <br />14:30 - Segmentation Workflow <br />18:33 - Overviewing Finance App <br />21:02 - Encrypted Visibility Engine <br />24:34 - Firewall Obversability and Control <br />25:44 - Ant's Advice For The Youth <br />26:40 - How to Learn Hybrid Mesh Firewall <br />28:16 - Conclusion <br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!  <br /><br />Disclaimer: This video is for educational purposes only.<br />#cisco #ciscolive  #ciscoemea<br />...<br />https://www.youtube.com/watch?v=aR5V30SUK6k]]></description><link>https://odysee.com/hacking-llms-how-to-prevent-prompt:d0a7f7c1d77670b4ea076501b5f2507a694d7495</link><guid isPermaLink="true">https://odysee.com/hacking-llms-how-to-prevent-prompt:d0a7f7c1d77670b4ea076501b5f2507a694d7495</guid><pubDate>Fri, 20 Feb 2026 14:30:00 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/hacking-llms-how-to-prevent-prompt/d0a7f7c1d77670b4ea076501b5f2507a694d7495/d93d3a.mp4" length="204788599" type="video/mp4"/><itunes:title>Hacking LLMs: How to Prevent Prompt Injection Attacks Now</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/aR5V30SUK6k"/><itunes:duration>1718</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Learn, Certify And Get Rewarded! (ZTW 2026)]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/m6-QstjgmNI" width="480" alt="thumbnail" title="Learn, Certify And Get Rewarded! (ZTW 2026)" /></p>This video is sponsored by ThreatLocker!<br /><br />Join me at ThreatLocker’s Zero Trust World 2026 in Florida! Experience hands-on hacking labs with the USB rubber ducky and Prompt Engineering Malware. You can register at: https://ztw.com/. Use code ZTWBOMBAL26 to save $200 on registration.<br /><br />#ztw26 #zerotrust #threatlocker<br />...<br />https://www.youtube.com/watch?v=m6-QstjgmNI]]></description><link>https://odysee.com/learn%2C-certify-and-get-rewarded!-%28ztw:197a1a936142250f90eecafc9f9684a95e122791</link><guid isPermaLink="true">https://odysee.com/learn%2C-certify-and-get-rewarded!-%28ztw:197a1a936142250f90eecafc9f9684a95e122791</guid><pubDate>Thu, 19 Feb 2026 15:30:34 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/learn,-certify-and-get-rewarded!-(ztw/197a1a936142250f90eecafc9f9684a95e122791/11fb04.mp4" length="6701118" type="video/mp4"/><itunes:title>Learn, Certify And Get Rewarded! (ZTW 2026)</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/m6-QstjgmNI"/><itunes:duration>55</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[They’ve scamming with AI Clones of YOUR Voice]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/fr0Wt_awkg0" width="480" alt="thumbnail" title="They’ve scamming with AI Clones of YOUR Voice" /></p>Criminals are using AI voice cloning to bypass bank security and set up unauthorized direct debits. Here is how the new 2026 scam works and why you must stop using voice authorization immediately.<br /><br />#ai #aivoice #security<br />...<br />https://www.youtube.com/watch?v=fr0Wt_awkg0]]></description><link>https://odysee.com/they%E2%80%99ve-scamming-with-ai-clones-of:952fb3448d612c426136c38f4979522a56a91d29</link><guid isPermaLink="true">https://odysee.com/they%E2%80%99ve-scamming-with-ai-clones-of:952fb3448d612c426136c38f4979522a56a91d29</guid><pubDate>Wed, 18 Feb 2026 16:30:30 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/they’ve-scamming-with-ai-clones-of/952fb3448d612c426136c38f4979522a56a91d29/5312ad.mp4" length="16833297" type="video/mp4"/><itunes:title>They’ve scamming with AI Clones of YOUR Voice</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/fr0Wt_awkg0"/><itunes:duration>178</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[3 Ways AI Agents Break Security And How to Avoid Mistakes]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/A2GIi6cUqmc" width="480" alt="thumbnail" title="3 Ways AI Agents Break Security And How to Avoid Mistakes" /></p>In this video David speaks to Peter Bailey (SVP and GM of Cisco’s Security business). AI agents are moving fast inside enterprises, and CISOs are hitting the brakes for one reason: the attack surface is expanding at machine speed. In this interview, we break down how agentic AI changes security, why MCP servers and agent tool access create new risks, and what a zero trust approach looks like when the “user” is a non-deterministic agent. We cover real-world problems like shadow MCP servers, agents touching sensitive systems and PII, and why traditional perimeter controls and firewalls are not enough when traffic is encrypted and actions happen too quickly downstream.<br /><br />You’ll also hear what Cisco is doing across the AI lifecycle: AI Defense for model scanning, provenance and guardrails, plus new protections focused on agent identity, dynamic authorization, behavior monitoring, and revocation. On the networking side, we discuss how SD-WAN and secure access (SASE) can add visibility and policy control for AI usage, including prioritizing latency-sensitive AI traffic while still enforcing security. If you’re a<br /><br />security engineer, network engineer, or CISO trying to move from AI hype to safe deployment, this video gives you a practical mental model and the controls to start building now.<br /><br />Big thank you to @Cisco for sponsoring this video and for sponsoring my trip to Cisco Live Amesterdam. <br /><br />// Peter Baily’ SOCIALS // <br />LinkedIn:  https://www.linkedin.com/in/peterhbailey/ <br />Guest Bio:  https://newsroom.cisco.com/c/r/newsroom/en/us/executives/peter-bailey.html <br /><br />// David's SOCIAL //  <br />Discord: https://discord.com/invite/usKSyzb  <br />X: https://www.twitter.com/davidbombal  <br />Instagram: https://www.instagram.com/davidbombal  <br />LinkedIn: https://www.linkedin.com/in/davidbombal  <br />Facebook: https://www.facebook.com/davidbombal.co  <br />TikTok: http://tiktok.com/@davidbombal  <br />YouTube: https://www.youtube.com/@davidbombal <br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ <br />SoundCloud:  https://soundcloud.com/davidbombal <br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532 <br /><br />// MY STUFF // <br />https://www.amazon.com/shop/davidbombal  <br /><br />// SPONSORS //  <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com <br /> <br />// MENU // <br />0:00 - Coming Up <br />0:30 - Introduction <br />01:15 - CISOs Problems with AI <br />02:35 - Real Issues with AI Agents <br />04:29 - Growth of the Attack Surface <br />05:34 - Concern of Poisoned AI and MCP <br />08:09 - What is the Kill-chain <br />10:16 - AI with Built-in Security <br />11:56 - Best Practises for AI Security <br />14:08 - Cisco Innovations for AI <br />16:48 - Cisco’s Red Team for own AI <br />18:27 - Secure AI in Public Places <br />20:09 - Should You get into Cyber Security <br />21:26 - Advice To Your Younger Self <br />22:29 - Outro <br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!  <br /><br /> <br /><br />Disclaimer: This video is for educational purposes only.<br />#cisco #ciscoemea #ciscolive<br />...<br />https://www.youtube.com/watch?v=A2GIi6cUqmc]]></description><link>https://odysee.com/3-ways-ai-agents-break-security-and-how:a2e28cd2228efbc436d77893fd78d6a0dd7e0522</link><guid isPermaLink="true">https://odysee.com/3-ways-ai-agents-break-security-and-how:a2e28cd2228efbc436d77893fd78d6a0dd7e0522</guid><pubDate>Wed, 18 Feb 2026 14:30:16 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/3-ways-ai-agents-break-security-and-how/a2e28cd2228efbc436d77893fd78d6a0dd7e0522/ef63b7.mp4" length="285047933" type="video/mp4"/><itunes:title>3 Ways AI Agents Break Security And How to Avoid Mistakes</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/A2GIi6cUqmc"/><itunes:duration>1355</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[EU bans AI over cybersecurity and privacy fears on Parliament devices]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/gbe8WpriumA" width="480" alt="thumbnail" title="EU bans AI over cybersecurity and privacy fears on Parliament devices" /></p>EU Parliament blocks AI tools over cyber, privacy fears: AI features on EU devices sent data to cloud, prompting the Parliament’s IT support to switch them off.<br /><br />Sources:<br />https://www.politico.eu/article/eu-parliament-blocks-ai-features-over-cyber-privacy-fears/<br /><br />https://www.theregister.com/2026/02/17/european_parliament_bars_lawmakers_from/<br /><br />https://www.techradar.com/pro/eu-parliament-bans-ai-use-on-government-work-devices<br /><br />#privacy #cybersecurity #security<br />...<br />https://www.youtube.com/watch?v=gbe8WpriumA]]></description><link>https://odysee.com/eu-bans-ai-over-cybersecurity-and:f36f7ad20d375df51fbbc59e736d3a38c357a4b3</link><guid isPermaLink="true">https://odysee.com/eu-bans-ai-over-cybersecurity-and:f36f7ad20d375df51fbbc59e736d3a38c357a4b3</guid><pubDate>Tue, 17 Feb 2026 22:15:03 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/eu-bans-ai-over-cybersecurity-and/f36f7ad20d375df51fbbc59e736d3a38c357a4b3/b2b14b.mp4" length="17888665" type="video/mp4"/><itunes:title>EU bans AI over cybersecurity and privacy fears on Parliament devices</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/gbe8WpriumA"/><itunes:duration>176</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[NVIDIA Cisco switch?]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/WZJ2OCh17s4" width="480" alt="thumbnail" title="NVIDIA Cisco switch?" /></p>See why Jensen Huang signed this Cisco switch featuring NVIDIA Spectrum X silicon. We explore the massive collaboration uniting NX-OS and Cisco SONiC for an AI full stack. <br /><br />Thank you to @Cisco sponsoring this video and my trip to Cisco Live EMEA!<br />#cisco #nvidia #ciscolive<br />...<br />https://www.youtube.com/watch?v=WZJ2OCh17s4]]></description><link>https://odysee.com/nvidia-cisco-switch:b7fce834641da756e2a0990af14cc9ab4147deac</link><guid isPermaLink="true">https://odysee.com/nvidia-cisco-switch:b7fce834641da756e2a0990af14cc9ab4147deac</guid><pubDate>Tue, 17 Feb 2026 16:00:46 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/nvidia-cisco-switch/b7fce834641da756e2a0990af14cc9ab4147deac/a49058.mp4" length="7375753" type="video/mp4"/><itunes:title>NVIDIA Cisco switch?</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/WZJ2OCh17s4"/><itunes:duration>83</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Official Cisco Ethical Hacking Course Is FREE]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/gbZfgoBN6tA" width="480" alt="thumbnail" title="Official Cisco Ethical Hacking Course Is FREE" /></p>Cisco just announced massive changes for 2026, including free AI training, a new Ethical Hacking certificate, and the return of the Wireless track. In this video, I sit down with Ryan and Lacey from Cisco to break down the biggest updates to the certification portfolio since 2020. Whether you are looking to break into Red Teaming with the new Ethical Hacker track, recertify your CCNA/CCNP using free CE credits, or master the new AI infrastructure, this guide covers everything you need to know to level up your career for free. <br /><br />What's Inside:<br />• Free AI Training: How to get 16+ CE credits through the new RevUp program.<br />• Ethical Hacking: Details on the new "Red Team" certificate and where to find the free course.<br />• Wireless is Back: The return of the CCNP and CCIE Wireless tracks.<br />• Cybersecurity Overhaul: CyberOps is evolving into CCNA/CCNP Cybersecurity.<br />• Recertification Hack: How to use these free courses to renew your existing certifications without paying for exams.<br /><br />Big thank you to Cisco for sponsoring my trip to Cisco Live Amsterdam<br /><br />// Ryan Rose’s SOCIAL //<br />LinkedIn:  https://www.linkedin.com/in/ryanrose3/<br />Cisco Blogs:  https://blogs.cisco.com/author/ryanrose<br />X:  https://x.com/RyanRose<br /><br />// Lacey Senko SOCIAL //<br />LinkedIn:  https://www.linkedin.com/in/laceycsenko/<br /><br />// Websites and YouTube Channel links //<br />Learn Cisco:  https://www.youtube.com/@CiscoUtube<br />Cisco U:  https://u.cisco.com/<br />Cisco Networking Academy:  https://www.cisco.com/site/us/en/learn/training-certifications/training/netacad/index.html<br />Cisco Learning Network:  https://learningnetwork.cisco.com/s/<br />Netacad:  https://www.netacad.com<br />Free Ethical Hacking Course: https://www.cisco.com/site/us/en/learn/training-certifications/certifications/ethical-hacker/index.html<br /><br />// David's SOCIAL // <br />Discord: https://discord.com/invite/usKSyzb <br />X: https://www.twitter.com/davidbombal <br />Instagram: https://www.instagram.com/davidbombal <br />LinkedIn: https://www.linkedin.com/in/davidbombal <br />Facebook: https://www.facebook.com/davidbombal.co <br />TikTok: http://tiktok.com/@davidbombal <br />YouTube: https://www.youtube.com/@davidbombal<br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ<br />SoundCloud:  https://soundcloud.com/davidbombal<br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532<br /><br />// MY STUFF //<br /> https://www.amazon.com/shop/davidbombal <br /><br />// SPONSORS // <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com<br /><br />// MENU //<br />0:00 - Coming Up<br />0:36 - Introduction<br />0:48 - Rev Up Updates<br />02:36 - What are CE Credits?<br />03:27 - Cisco Learning Network Community<br />06:14 - How Cisco CCNA Changes Lives<br />07:06 - Cisco Live Announcements Training<br />12:04 - Navigating Cisco Learning Network Site<br />14:25 - CiscoU Free Account <br />14:49 - Cyber & AI Security Learning Track<br />17:16 - Ethical Hacker Certificate<br />19:16 - Everything under the Learn with Cisco Brand<br />21:20 - Passing of Knowledge through Cisco<br />23:13 - Where Does a Person Start?<br />24:35 - Parting Words<br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! <br /><br />Disclaimer: This video is for educational purposes only.<br />#cisco #ciscolive #ciscoemea<br />...<br />https://www.youtube.com/watch?v=gbZfgoBN6tA]]></description><link>https://odysee.com/official-cisco-ethical-hacking-course-is:0e601661e968a03e444d7bb4dfc93fba1542f924</link><guid isPermaLink="true">https://odysee.com/official-cisco-ethical-hacking-course-is:0e601661e968a03e444d7bb4dfc93fba1542f924</guid><pubDate>Tue, 17 Feb 2026 15:01:17 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/official-cisco-ethical-hacking-course-is/0e601661e968a03e444d7bb4dfc93fba1542f924/49bdec.mp4" length="239045453" type="video/mp4"/><itunes:title>Official Cisco Ethical Hacking Course Is FREE</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/gbZfgoBN6tA"/><itunes:duration>1490</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[31.4 Tbps: A World Record DDoS]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/Dvowzzcg42I" width="480" alt="thumbnail" title="31.4 Tbps: A World Record DDoS" /></p>Cloudflare's 2025 report reveals a massive 31.4 Tbps DDoS attack record. Discover how Android TV botnets and hypervolumetric threats are changing cybersecurity forever.<br /><br />#cloudflare #ddos #androidtvbotnet<br />...<br />https://www.youtube.com/watch?v=Dvowzzcg42I]]></description><link>https://odysee.com/31.4-tbps-a-world-record-ddos:090e76d271877f8f668dd4271fe66808d77bc6ab</link><guid isPermaLink="true">https://odysee.com/31.4-tbps-a-world-record-ddos:090e76d271877f8f668dd4271fe66808d77bc6ab</guid><pubDate>Mon, 16 Feb 2026 14:30:10 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/31.4-tbps-a-world-record-ddos/090e76d271877f8f668dd4271fe66808d77bc6ab/8414e9.mp4" length="15019732" type="video/mp4"/><itunes:title>31.4 Tbps: A World Record DDoS</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/Dvowzzcg42I"/><itunes:duration>175</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Starlink AI data WARNING]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/wT1j4FyMQaw" width="480" alt="thumbnail" title="Starlink AI data WARNING" /></p>Starlink is now using your personal data to train AI models by default. Learn how to opt out of this new privacy policy update and why using a VPN is more important than ever in 2026.<br /><br />#starlink #ai #privacy<br />...<br />https://www.youtube.com/watch?v=wT1j4FyMQaw]]></description><link>https://odysee.com/starlink-ai-data-warning:06d02c667157a51b89ca5ad5b0061e69d154499d</link><guid isPermaLink="true">https://odysee.com/starlink-ai-data-warning:06d02c667157a51b89ca5ad5b0061e69d154499d</guid><pubDate>Sun, 15 Feb 2026 15:30:35 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/starlink-ai-data-warning/06d02c667157a51b89ca5ad5b0061e69d154499d/2ab64a.mp4" length="17073459" type="video/mp4"/><itunes:title>Starlink AI data WARNING</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/wT1j4FyMQaw"/><itunes:duration>179</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[Top 7 OSINT tools REVEALED for 2026]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/WHOgdsEiyew" width="480" alt="thumbnail" title="Top 7 OSINT tools REVEALED for 2026" /></p>Are you ready to see the 7 digital investigation tools that completely changed how I look at the internet? In this video, I’m REVEALING a powerful stack of OSINT (Open Source Intelligence) and research tools that most people have zero clue exist. These are absolute game-changers.<br /><br />Subscribe for more cutting-edge tech and security tools: <br />The internet is vast, but finding the right information, or knowing what information about you is out there, requires the right toolkit. I was genuinely shocked by the advanced capabilities of some of these applications.<br />Whether you are a cybersecurity researcher, a journalist, a private investigator, or just someone who wants to master digital reconnaissance and protect their privacy, this list of 7 secret tools will upgrade your skillset immediately. <br /><br />We are breaking down tools for deep email searching, uncovering hidden data in PDFs, mapping global networks, and analyzing trends that standard search engines completely miss.<br /><br />// MJ Banias’ SOCIALS //<br />LinkedIn:  https://www.linkedin.com/in/mjbanias<br />Cloak and Dagger Podcast (Spotify):  https://open.spotify.com/show/6mT8zDMBq5gOfAVZi47pT3<br />The Debrief:  https://thedebrief.org/podcasts/<br />Instagram:  https://www.instagram.com/mjbanias/<br />X:  https://x.com/mjbanias<br />Website:  https://www.bullshithunting.com/<br /><br />// David's SOCIAL // <br />Discord: https://discord.com/invite/usKSyzb <br />X: https://www.twitter.com/davidbombal <br />Instagram: https://www.instagram.com/davidbombal <br />LinkedIn: https://www.linkedin.com/in/davidbombal <br />Facebook: https://www.facebook.com/davidbombal.co <br />TikTok: http://tiktok.com/@davidbombal <br />YouTube: https://www.youtube.com/@davidbombal<br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ<br />SoundCloud:  https://soundcloud.com/davidbombal<br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532<br /><br />// MY STUFF //<br /> https://www.amazon.com/shop/davidbombal <br /><br />// SPONSORS // <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com<br /><br />// MENU //<br />0:00 - Coming Up<br />0:36 - Introduction<br />01:17 - Who is MJ Banias?<br />03:55 - MJ Banias’ Favourite OSINT Tools<br />04:28 - Bullsh*t Hunting<br />06:10 - Tool 1 - WhatsMyName Web<br />09:47 - Tool 2 - DorkGPT and Dork Search Pro<br />14:30 - Tool 3 - OD Crawler<br />16:59 - Tool 4 - Kagi Browser<br />21:55 - Tool 5 - Ubikron<br />26:35 - Tool 6 - newspapers.com and Judy Records<br />34:56 - Tool 7 - OSINT Industries<br />40:15 - Maltego<br />42:54 - Darkside and Breach Data<br />49:03 - Privacy Laws in America and beyond<br />50:57 - Plugs From MJ Banias<br />51:35 - MJ Banias Socials<br />52:25 - Outro <br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! <br /><br />Disclaimer: This video is for educational purposes only.<br />#osint #osinttools #privacy<br />...<br />https://www.youtube.com/watch?v=WHOgdsEiyew]]></description><link>https://odysee.com/top-7-osint-tools-revealed-for-2026:126baff11904b98b34a11555f357ff922fb46960</link><guid isPermaLink="true">https://odysee.com/top-7-osint-tools-revealed-for-2026:126baff11904b98b34a11555f357ff922fb46960</guid><pubDate>Sun, 15 Feb 2026 14:30:32 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/top-7-osint-tools-revealed-for-2026/126baff11904b98b34a11555f357ff922fb46960/063420.mp4" length="723316245" type="video/mp4"/><itunes:title>Top 7 OSINT tools REVEALED for 2026</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/WHOgdsEiyew"/><itunes:duration>3167</itunes:duration><itunes:explicit>false</itunes:explicit></item><item><title><![CDATA[The 100Tbps AI Switch: Inside the Beast]]></title><description><![CDATA[<p><img src="https://thumbnails.lbry.com/1kV6nCqcjZs" width="480" alt="thumbnail" title="The 100Tbps AI Switch: Inside the Beast" /></p>Is this the most powerful network switch ever built? In this interview from Cisco Live, we look at the new generation of Cisco 8000 and Nexus switches capable of routing 100 Terabits per second. We break down why AI data centers are forced to move from air cooling to liquid cooling, and how a single switch chassis can now handle the equivalent mobile traffic of 100 million people.<br /><br />AI models are growing faster than the infrastructure can keep up. To solve this, the network switch had to evolve. In this video, I talk to Will from Cisco about the engineering challenges of building the "G300" generation of switches, hardware so dense that air cooling is no longer enough.<br /><br />We discuss the massive architectural shift occurring in data centers, where Liquid Cooled Switches are becoming the new standard to support 1.6T Ethernet ports and massive GPU clusters.<br /><br />Key Hardware Topics:<br />• The 100 Terabit Chassis: How Cisco architecture handles massive throughput.<br />• Liquid Cooling: Why switches are adopting "direct-to-chip" cooling just like gaming rigs.<br />• Scale-Out Networking: How these switches manage congestion for AI training jobs (Job Completion Time).<br />• Career Insights: Will manages 5,000 engineers and explains why understanding the physical layer and hardware constraints is a superpower for modern developers.<br /><br />Big thanks to Cisco for sponsoring my trip to Cisco Live EMEA and for changing my life and the lives of many other people. <br /><br />//  Will Eatherton SOCIAL //  <br />LinkedIn:   https://www.linkedin.com/in/willeatherton/ <br />Newsroom:  https://newsroom.cisco.com/c/r/newsroom/en/us/executives/will-eatherton.html <br /><br />// David's SOCIAL //  <br />Discord: https://discord.com/invite/usKSyzb  <br />X: https://www.twitter.com/davidbombal  <br />Instagram: https://www.instagram.com/davidbombal  <br />LinkedIn: https://www.linkedin.com/in/davidbombal  <br />Facebook: https://www.facebook.com/davidbombal.co  <br />TikTok: http://tiktok.com/@davidbombal  <br />YouTube: https://www.youtube.com/@davidbombal <br />Spotify:  https://open.spotify.com/show/3f6k6gERfuriI96efWWLQQ <br />SoundCloud:  https://soundcloud.com/davidbombal <br />Apple Podcast:  https://podcasts.apple.com/us/podcast/david-bombal/id1466865532 <br /><br />// MY STUFF // <br />https://www.amazon.com/shop/davidbombal  <br /><br />// SPONSORS //  <br />Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com <br /><br />// MENU // <br />0:00 - Coming up <br />0:49 - Will Eatherton introduction and projects // Hyperscale, neocloud & enterprises <br />08:03 - New Cisco hardware // Silicon One G300 <br />13:18 - Data centers + AI + GPUs <br />16:27 - G300 use case & Cisco Nexus <br />21:56 - Liquid-cooled switches <br />24:12 - Networking as a career path <br />28:41 - Development and opportunities in networking <br />30:14 - Conclusion <br /><br />Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!  <br /><br />Disclaimer: This video is for educational purposes only. <br />#cisco #ciscolive #ciscoemea<br />...<br />https://www.youtube.com/watch?v=1kV6nCqcjZs]]></description><link>https://odysee.com/the-100tbps-ai-switch-inside-the-beast:7129d18264cbc23847743fab9ab66b3a952772d8</link><guid isPermaLink="true">https://odysee.com/the-100tbps-ai-switch-inside-the-beast:7129d18264cbc23847743fab9ab66b3a952772d8</guid><pubDate>Fri, 13 Feb 2026 14:30:03 GMT</pubDate><enclosure url="https://player.odycdn.com/api/v3/streams/free/the-100tbps-ai-switch-inside-the-beast/7129d18264cbc23847743fab9ab66b3a952772d8/eecf20.mp4" length="364101471" type="video/mp4"/><itunes:title>The 100Tbps AI Switch: Inside the Beast</itunes:title><itunes:author>David Bombal</itunes:author><itunes:image href="https://thumbnails.lbry.com/1kV6nCqcjZs"/><itunes:duration>1918</itunes:duration><itunes:explicit>false</itunes:explicit></item></channel></rss>