Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
66,025 results
In this video I discuss the UEFICanIHazBufferOverFlow bug (CVE-2024-0762) and other UEFI/BIOS malware threats as well as ...
135,992 views
1 year ago
Stop chasing every CVE. In this video, we demonstrate a practical, auditable workflow for prioritizing the vulnerabilities most likely ...
448 views
5 months ago
Yes, anyone can hack IoT devices and I'll show you how! It doesn't matter if you're an experienced pen tester in other fields, ...
288,533 views
https://lawrence.video/ Hacker News Articls https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.html Cyera ...
8,601 views
1 month ago
Knowing about and addressing a critical vulnerability before a threat actor can use it is a crucial part of a security program.
379 views
3 years ago
In this video I discuss the Critical Security update that TailsOS had for a currently undisclosed bug that was able to escape the app ...
121,955 views
In this video I discuss a 24 year old bug in the GNU C Library (tracked as CVE-2024-2961) that can allow a threat actor to get ...
132,090 views
c00lkid and builderman wernt right I messed up. STOP TELLING ME.
834,837 views
6 months ago
Think you're safe in your virtual machine? Think again. In this video, we expose the shocking truth about VM vulnerabilities.
8,908 views
Are you Sure your System Applications are Secure? Reduce Exploitation Risk via Application Specific Hardening - Kjell Pirschel, ...
285 views
https://media.ccc.de/v/why2025-99-from-wan-to-nas-a-pwn2own-journey-through-the-soho-attack-surface The SOHO Smashup is ...
481 views
Continuous Integration (CI) systems and similar architecture has taken new direction, especially in the last few years. Automating ...
4,891 views
8 years ago
A new wave of attacks has targeted CentreStack and Triofox servers using an unpatched Local File Inclusion vulnerability ...
64 views
3 months ago
cybersecurity #linux #hacker.
9,487 views
It is no secret that the days of jmp esp are far gone. In the age of Virtualization-Based Security and Hypervisor Protected Code ...
9,874 views
4 years ago
cybersecurity #linux #kali.
3,216 views
SLUB Internals for Exploit Developers - Andrey Konovalov, xairy.io Every Linux kernel exploit that targets a slab memory ...
1,869 views
MS17-010 is the most important patch in the history of operating systems, fixing remote code execution vulnerabilities in the world ...
17,496 views
7 years ago
From the CISR video library (http://www.cisr.us) Skip Thaeler and Jack Stawiski, SPAWAR Integrating Protect, Attack, and Exploit ...
234 views
13 years ago
https://www.huntress.com/blog/vulnerability-reproduced-immediately-patch-screenconnect-23-9-8 Business Technicalities ...
9,051 views
Streamed 1 year ago