ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

593 results

BSidesMunich
NTLM Reflection Is Dead, Long Live...: Story Of An Accidental Windows RCE - Guillaume André & Wil
28:46
NTLM Reflection Is Dead, Long Live...: Story Of An Accidental Windows RCE - Guillaume André & Wil

21 views

2 weeks ago

Plandi+
Mega Man 1 - Arbitrary Code Execution% (ACE)

If you've ever played Mega Man 1 before, you'll know that this game is held together by duct tape and dreams. But what if we ...

22:36
Mega Man 1 - Arbitrary Code Execution% (ACE)

84 views

13 days ago

David Bombal
Firewall Demo with Cisco Hybrid Mesh Firewall: The Future of Network Security

In this video, we dive into a real-world Red Team vs. Blue Team scenario. We simulate a cyberattack on a Finance Application that ...

28:39
Firewall Demo with Cisco Hybrid Mesh Firewall: The Future of Network Security

239,501 views

6 days ago

BSidesMunich
Navigating The Volatile Vulnerability Landscape: Strategies For Resilience - Jerry Gamblin

Um we're going to keep it consistent with CVE JSON schema 5.1 so the CVE program and EUVD are able to change back and ...

25:52
Navigating The Volatile Vulnerability Landscape: Strategies For Resilience - Jerry Gamblin

27 views

2 weeks ago

Matt Johansen
LIVE: Cybersecurity guy talks AI and hacks

... you claude code also vulnerable to prompt injection everything is vulnerable to prompt injection prompt injection is an unsolved ...

2:59:22
LIVE: Cybersecurity guy talks AI and hacks

228 views

Streamed 7 days ago

OTbase OT Asset Inventory Software
Polski Cyber Attack

We discuss the cyber attack against Polish critical infrastructure from December 2025, based on the official report: ...

29:17
Polski Cyber Attack

324 views

Streamed 2 weeks ago

Security Weekly - A CRA Resource
Code of Hammurabi, RockYou, MimicRat, Trustconnect, Introsort, AI, Josh Marpet & More - SWN #557

The Code of Hammurabi, Rockyou, MimicRat, Google, Trustconnect, Introsort, AI, Josh Marpet, and More on this episode of the ...

35:03
Code of Hammurabi, RockYou, MimicRat, Trustconnect, Introsort, AI, Josh Marpet & More - SWN #557

249 views

6 days ago

Security Weekly - A CRA Resource
Firmware Backdoors Be Spying On You - PSW #914

AI says that this is the show where we turn coffee into threat intelligence and cigar smoke into packet captures. This week: - a ...

2:06:15
Firmware Backdoors Be Spying On You - PSW #914

609 views

7 days ago

Software Engineering Institute | Carnegie Mellon University
Temporal Memory Safety in C and C++: An AI-Enhanced Pointer Ownership Model

... that allowed authenticated attackers to achieve remote code execution through a use-after-free flaw in the Lua scripting engine.

24:25
Temporal Memory Safety in C and C++: An AI-Enhanced Pointer Ownership Model

803 views

2 weeks ago

Patch My PC
PATCH NOW: Notepad RCE, Fake 7-Zip Malware, BeyondTrust 9.9 | Patch Tuesday Support Group Feb 2026

A Notepad remote code execution flaw. A live 7-Zip trojan site. Critical remote support exploits. This Patch Tuesday was chaos.

1:05:16
PATCH NOW: Notepad RCE, Fake 7-Zip Malware, BeyondTrust 9.9 | Patch Tuesday Support Group Feb 2026

356 views

13 days ago

hardwear.io
Hardwear.io NL 2025: Modern memory error exploitation via speculative execution attacks: Anil Kurmus

Talk Title: Modern memory error exploitation via speculative execution attacks Speaker: Anil Kurmus Abstract: Speculative ...

32:14
Hardwear.io NL 2025: Modern memory error exploitation via speculative execution attacks: Anil Kurmus

198 views

2 weeks ago

Matt Johansen
LIVE: This week in Cybersecurity w/ mattjay

Let's hang and talk about this week's news in infosec. I'm collecting stories for my newsletter @ vulnu.com.

1:28:28
LIVE: This week in Cybersecurity w/ mattjay

202 views

Streamed 4 weeks ago

OWASP Los Angeles
When Agents Execute: RCE Paths in LLM-Powered Coding Tools

We now examine how LLM-powered coding agents can be weaponized end-to-end, including paths to remote code execution.

1:01:06
When Agents Execute: RCE Paths in LLM-Powered Coding Tools

65 views

4 weeks ago

Hardware Files
Big Warning: I Made 3 SSH Mistakes and Almost Got HACKED

I thought my server was secure… until I realized I made 3 critical SSH mistakes that almost got me hacked. In this video, I break ...

29:38
Big Warning: I Made 3 SSH Mistakes and Almost Got HACKED

150 views

9 days ago

Tezcan Erşayan (AIT)
January 2026 Cyber Security Bulletin – AITwin 🔒🗝️🔓

... including three actively exploited zero-days. n8n: Full remote code execution risk through an unauthenticated file read chain.

31:34
January 2026 Cyber Security Bulletin – AITwin 🔒🗝️🔓

160 views

10 days ago

7urb0
Research Review #-2: RCE in Google's AI code editor Antigravity (sudi)

In this research review episode, we dive into sudi's very well written description of the process of discovering how Antigravity's ...

34:01
Research Review #-2: RCE in Google's AI code editor Antigravity (sudi)

659 views

2 weeks ago

APIsec University
Hacking MCP: Supply Chain Attacks & Tool Execution Hijacking | Paul Zenker, Justin Szczepaniak

... code execution on your machine. Justin then introduces a new vulnerability class they discovered: Tool Execution Hijacking.

25:31
Hacking MCP: Supply Chain Attacks & Tool Execution Hijacking | Paul Zenker, Justin Szczepaniak

131 views

9 days ago

AxisOfEasy
iPhone Users NEED to Know This - Data At Risk

A three-CVE exploit chain gave attackers arbitrary code execution on any unpatched Apple device. Google TAG discovered it in ...

23:51
iPhone Users NEED to Know This - Data At Risk

47 views

6 days ago

Nate Butler Explains
Security Awareness

Security Awareness.

1:04:21
Security Awareness

0 views

Streamed 4 weeks ago

RITSEC
RITSEC General Meeting | Week 5
3:32:01
RITSEC General Meeting | Week 5

57 views

Streamed 13 days ago