X has rolled out “end-to-end encrypted” DMs (XChat), but experts warn the current setup isn’t ready for real privacy. In this breakdown, we explain how public/private key crypto should work,...
Big thank you to DeleteMe for sponsoring this video. Go to http://joindeleteme.com/Bombal to receive a 20% discount. Discover how hackers are weaponising AI-generated images to create malware—and how you can...
F5 breach shows how vendor compromises cascade to thousands of networks. Learn the risks, Cisco IOS XE rootkit angle, and Zero-Trust steps to harden fast. Are you exposed? #f5 #breach...
Ever wondered what rm -rf / really does? In this lab-safe demo we explain rm flags, the no-preserve-root fail-safe, and show fast VM snapshot recovery so you can learn without...
AI hallucinations hit a real case: a Deloitte review for Australia contained fake citations and errors. Here’s why verification matters for government reports and AI assisted work. #ai #hallucinations #deloitte
Cloud-reliant gadgets can become pricey paperweights when support ends. This short breaks down smart speaker shutdowns, vendor lock-in, and safer offline buys for privacy and security. #bose #cloud #privacy
The notorious spyware vendor NSO Group, known for developing the Pegasus malware, has faced financial issues since losing a long legal battle against the secure messaging platform WhatsApp as well...
Big thanks to ThreatLocker for sponsoring my trip to Black Hat 2025. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal David Bombal sits down with...
Learn exactly how to expose a private IIS web server to the internet using Cisco static NAT. We configure ip nat inside source static, inside-local, inside-global, set Gi0/0/0 as the...
This video explains how disposable (“temp”) email services like Guerrilla Mail and Temp Mail work, when to use them to avoid spam and protect your real inbox, and their limitations/risks...
Airlines are selling passenger and PNR data via an airline-owned broker to US agencies, including the Secret Service. Here’s what gets shared, why it matters, and how it affects your...
At DEF CON 33, a researcher showed how two API authentication flaws in a centralised dealer portal for a top automaker enabled national admin access across 1,000+ US dealers. With...