ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

37 results

Techie Mist
This Axios Update Could Hack Your System | Developers Must Watch This😳

Axios JavaScript library recently faced a cyber attack where fake versions were uploaded to npm with hidden malware.

2:55
This Axios Update Could Hack Your System | Developers Must Watch This😳

70 views

7d ago

OWASP Foundation
OWASP AppSec Day France Highlight

Managed by the OWASP® Foundation https://owasp.org/

3:02
OWASP AppSec Day France Highlight

48 views

7d ago

Catalin Ionescu
North-South Solve Using a Lesser-Known Tor Trick - picoCTF 2026 - Web Exploitation

picoCTF 2026 capture the flag competition: North-South challenge in Web Exploitation category - full solve walk-through ...

3:37
North-South Solve Using a Lesser-Known Tor Trick - picoCTF 2026 - Web Exploitation

93 views

2w ago

Cybersec3
Cybersec3 FG Platform: DDoS attack, how it automatically blocks the attack [SC1]

In this video we'll see how the Cybersec3 Security Platform, automatically mitigates a DDoS attack. It will detect the attack, activate ...

2:49
Cybersec3 FG Platform: DDoS attack, how it automatically blocks the attack [SC1]

24 views

4w ago

Hardware.ai
Raspberry Pi AI HAT+ 2 Reality Check

Is the Raspberry Pi AI HAT+ 2 actually an AI accelerator? In this video I run real benchmarks and test Hailo 10H performance on ...

8:10
Raspberry Pi AI HAT+ 2 Reality Check

915 views

12d ago

SANS Internet Storm Center
SANS Stormcast Wednesday, April 1st, 2026:  Application Control Bypass; Axios NPM Module Compro…

SANS Stormcast Wednesday, April 1st, 2026: Application Control Bypass; Axios NPM Module Compromise; TeamPCP vs Cloud ...

6:48
SANS Stormcast Wednesday, April 1st, 2026: Application Control Bypass; Axios NPM Module Compro…

385 views

9d ago

Daniel Stenberg
curl 8.19.0 with Daniel Stenberg

8 changes, 4 vulnerabilities and 264 bugs fixed. https://daniel.haxx.se/blog/2026/03/11/curl-8-19-0/

43:52
curl 8.19.0 with Daniel Stenberg

3,552 views

4w ago

Catalin Ionescu
The Add/On Trap Solve - picoCTF 2026 - Reverse Engineering

picoCTF 2026 capture the flag competition: The Add/On Trap challenge in Reverse Engineering category - full solve walk-through ...

4:13
The Add/On Trap Solve - picoCTF 2026 - Reverse Engineering

55 views

2w ago

CNCF [Cloud Native Computing Foundation]
Lightning Talk: Your Most Privileged User Isn't Human: The Agent Security Blinds... Atulpriya Sharma

Connect with our current graduated, incubating, and sandbox projects as the community gathers to further the education and ...

10:31
Lightning Talk: Your Most Privileged User Isn't Human: The Agent Security Blinds... Atulpriya Sharma

57 views

2w ago

Wescan Live
Is Your Password Public? 😱 How to Check for Data Breaches in Seconds

Stop wondering if you've been hacked and start knowing. In this video, I'll show you how to use wescan.live, a powerful and fast ...

6:01
Is Your Password Public? 😱 How to Check for Data Breaches in Seconds

2 views

12d ago

Tony Trejo’s Mobile Tech
iOS Security Audit: 5 Fails Every Dev Ships

You passed the build. Xcode showed zero warnings. And your app still has security bugs that expose your users. In this video ...

6:23
iOS Security Audit: 5 Fails Every Dev Ships

23 views

12d ago

NUS Hackers
FH #288: Oz: The Generative OS

The talk covers a cool project from Hack&Roll 2026 which reimagines the OS in the AI Era! About Friday Hacks Friday Hacks, ...

13:25
FH #288: Oz: The Generative OS

73 views

8d ago

Catalin Ionescu
This picoCTF 2026 Paper-2 "Solve" is a Trap

A GitHub repo claimed to solve picoCTF 2026 Paper-2. It didn't. In this video, we reverse engineer the script, run it safely, and ...

27:03
This picoCTF 2026 Paper-2 "Solve" is a Trap

559 views

3w ago

DrupalCamp NJ
Security in Drupal: what can go wrong?

Let's "get off the island" and look at Drupal security from the point of view of an outsider. The OWASP Top Ten is an industry ...

47:41
Security in Drupal: what can go wrong?

34 views

2w ago

Catalin Ionescu
Paper 2 Solve - picoCTF 2026 - Web Exploitation

picoCTF 2026 capture the flag competition: Paper-2 challenge in Web Exploitation category - full solve walk-through using ...

18:50
Paper 2 Solve - picoCTF 2026 - Web Exploitation

257 views

2w ago

OWASP Foundation
It’s Giving Insecure Vibes: Secure Coding Literacy for Vibe Coders Track 1

Vibe coding has a time and a place: it is great for making quick prototypes, and is very tempting for less technical folks. However ...

54:17
It’s Giving Insecure Vibes: Secure Coding Literacy for Vibe Coders Track 1

103 views

7d ago

Cybersec3
Cybersec3 FG Platform: Human Error Remedation, Firewall disabled [SC2]

In this video we'll see how the Cybersec3 Security Platform, can automatically intercept a human error on a server and fix it.

2:18
Cybersec3 FG Platform: Human Error Remedation, Firewall disabled [SC2]

7 views

4w ago

보안프로젝트[boanproject]
Understanding the Differences Between Cursor AI Agents and OpenClaw Hacking in a Kali Linux Envir...

This is an IT lecture provided by Security Project (https://cafe.naver.com/boanproject). The topic of this lecture is ...

9:52
Understanding the Differences Between Cursor AI Agents and OpenClaw Hacking in a Kali Linux Envir...

466 views

2w ago

Ayush
PriorAuth Agent — Voice-to-Submission Prior Auth with Amazon Nova #AmazonNova

Demo of PriorAuth Agent for the Amazon Nova AI Hackathon. A multi-agent prior authorization system that converts a clinician's ...

2:57
PriorAuth Agent — Voice-to-Submission Prior Auth with Amazon Nova #AmazonNova

20 views

4w ago

보안프로젝트[boanproject]
Hacking AI agents with OpenClaw and Kali Linux. #openclaw #kali #hacker

This is an IT lecture provided by Boan Project (https://cafe.naver.com/boanproject). The topic of this lecture is "Combining ...

16:40
Hacking AI agents with OpenClaw and Kali Linux. #openclaw #kali #hacker

936 views

4w ago