ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

136 results

David Broyles
How Google & Cerner Secure FHIR APIs

Discussion of the real-world implementations by Google Cloud Healthcare API and Cerner, highlighting their security measures.

5:35
How Google & Cerner Secure FHIR APIs

51 views

1 year ago

Chrome for Developers
Hacking Without Being a Hack (Polymer Summit 2016)

Almost everyone has had a moment when they have been asked to build something quickly at 3pm on a Friday. Come explore ...

11:51
Hacking Without Being a Hack (Polymer Summit 2016)

2,140 views

9 years ago

DEFCONConference
DEF CON 23 - miaubiz - Put on Your Tinfo_t Hat if You're My Type

The IDA Pro APIs for interacting with type information are full of opportunities (horrible problems). I will show you how to create ...

16:47
DEF CON 23 - miaubiz - Put on Your Tinfo_t Hat if You're My Type

1,119 views

10 years ago

Rahad Chowdhury
Firebase database takeover vulnerability | firebase exploit

Firebase Database takeover vulnerability | Rahad Chowdhury What is firebase database? Firebase is Google mobile application ...

4:47
Firebase database takeover vulnerability | firebase exploit

8,359 views

3 years ago

DEFCONConference
Michael Stepankin - Apache Solr Injection- DEF CON 27 Conference

Apache Solr is a search platform used by many enterprise companies to add a full text search functionality to their websites.

16:21
Michael Stepankin - Apache Solr Injection- DEF CON 27 Conference

2,249 views

6 years ago

DEFCONConference
DEF CON 30 - Ionut Cernica - Deanonymization of TOR HTTP Hidden Services

Anonymity networks such as Tor are used to protect the identity of people or services. Several deanonymization techniques have ...

18:13
DEF CON 30 - Ionut Cernica - Deanonymization of TOR HTTP Hidden Services

5,938 views

3 years ago

IPFS
NFT Hacking in the Eggverse with Ariel Klevecz

Join eggs-pert and creator of Yaytso, Ariel Klevecz, as he introduces us to the world of algorithmically personalized 3D eggs.

10:15
NFT Hacking in the Eggverse with Ariel Klevecz

282 views

4 years ago

Software Sustainability Institute
HowDescribedIs - CW21 Hack Day Demo

Collaborations Workshop 2021 (https://www.software.ac.uk/cw21) Hack Day Demo: HowDescribedIs by Daniel Garijo, Mattew ...

5:11
HowDescribedIs - CW21 Hack Day Demo

9 views

4 years ago

Software Sustainability Institute
CFF in the wild - CW22 Hack Day Demo

Collaborations Workshop 2022 (https://www.software.ac.uk/cw22) CFF in the wild by Stephan Druskat, Jez Cope, Hugo Gruson, ...

5:06
CFF in the wild - CW22 Hack Day Demo

20 views

3 years ago

DEFCONConference
DEF CON 31 - ELECTRONizing MacOS Privacy - A New Weapon in Your Red Teaming Armory - Wojciech Reguła

MacOS is known for an additional layer of privacy controls called TCC - Transparency, Consent, and Control (TCC) that restricts ...

19:55
DEF CON 31 - ELECTRONizing MacOS Privacy - A New Weapon in Your Red Teaming Armory - Wojciech Reguła

5,529 views

2 years ago

Asso HZV
🇬🇧 From HTML Injection to Full AWS Account Takeover - Raunak Parmar

Modern web applications often provide features like PDF generation to enhance user experience, but these functionalities can ...

19:00
🇬🇧 From HTML Injection to Full AWS Account Takeover - Raunak Parmar

366 views

2 months ago

DEFCONConference
DEF CON 31 - mTLS  When Certificate Authentication Done Wrong Michael Stepankin

Although x509 certificates have been here for a while, they have become more popular for client authentication in zero-trust ...

19:29
DEF CON 31 - mTLS When Certificate Authentication Done Wrong Michael Stepankin

1,992 views

2 years ago

Software Sustainability Institute
Escape room - CW21 Hack Day Demo

Collaborations Workshop 2021 (https://www.software.ac.uk/cw21) Hack Day Demo: Escape room by Thibault Lestang, Laura ...

5:21
Escape room - CW21 Hack Day Demo

14 views

4 years ago

DEFCONConference
DEF CON 24 - Hunter Scott - RT to Win: 50 lines of Python made me the luckiest guy on Twitter

In this talk, I'll share how I won 4 Twitter contests per day, every day, for 9 months straight. I'll discuss the methods I used, the ...

17:17
DEF CON 24 - Hunter Scott - RT to Win: 50 lines of Python made me the luckiest guy on Twitter

209,849 views

9 years ago

DEFCONConference
DEF CON 21 - Zak Blacher - Transcending Cloud Limitations

Transcending Cloud Limitations by Obtaining Inner Piece ZAK BLACHER With the abundance of cloud storage providers ...

12:48
DEF CON 21 - Zak Blacher - Transcending Cloud Limitations

973 views

12 years ago

Software Sustainability Institute
Code Review Cupid - CW22 Hack Day Demo

Collaborations Workshop 2022 (https://www.software.ac.uk/cw22) Code Review Cupid by Declan Bays, Sherman Lo, Felicity ...

5:47
Code Review Cupid - CW22 Hack Day Demo

46 views

3 years ago

B Cyber H
OpenAI Data Exposed: What Happens Now?

OpenAI has confirmed a major data breach — but it wasn't a direct hack. In this video, I break down exactly what happened, how ...

5:40
OpenAI Data Exposed: What Happens Now?

43 views

4 months ago

Chrome for Developers
Crisper: Protecting your Polymer app with CSP -- Polycasts #40

Content Security Policy (CSP) is a set of rules to help mitigate and prevent attacks such as Cross Site Scripting (XSS) and data ...

5:25
Crisper: Protecting your Polymer app with CSP -- Polycasts #40

10,614 views

10 years ago

OpenSecurityTraining2
Vulns1001 06 IntegerOverflow 🌚CVE-2019-3568💬📞 01 Background ACID Flow

View the full free MOOC at https://ost2.fyi/Vulns1001. This class is for C/C++ developers learning secure development, and ...

5:29
Vulns1001 06 IntegerOverflow 🌚CVE-2019-3568💬📞 01 Background ACID Flow

689 views

3 years ago

Alex Demko
Simple Tips to Secure Your Frontend Applications 🔐

Don't miss this essential guide to frontend security Curious about how simple code injections can compromise your whole ...

18:28
Simple Tips to Secure Your Frontend Applications 🔐

199 views

6 months ago