ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

132 results

Asso HZV
🇫🇷 The Last Resort: Debugging Embedded Systems with Unconventional Methods - Vincent Lopes

A debugger is always a valuable tool when searching for vulnerabilities, particularly in embedded systems where multiple ...

26:40
🇫🇷 The Last Resort: Debugging Embedded Systems with Unconventional Methods - Vincent Lopes

259 views

5 days ago

Tom Olzak
Ransomware in 2026: It’s Not Just Encryption Anymore

Most people still picture ransomware as a pop-up that says 'pay or your files stay locked.' In 2026, that mental model is ...

9:55
Ransomware in 2026: It’s Not Just Encryption Anymore

133 views

3 weeks ago

Vaant
They Beat a Nation’s Surveillance System — As Teenagers

In a digital age where nothing stays hidden, a group of teenage hackers did the impossible: they infiltrated one of the world's most ...

2:07
They Beat a Nation’s Surveillance System — As Teenagers

177 views

2 weeks ago

SecKC Live
Seckc  Live - January 2026

SecKC Live https://seckc.org WHERE: Knuckleheads Garage - 701 North Montgall Avenue, Kansas City, MO 64120 United States ...

3:04:19
Seckc Live - January 2026

397 views

Streamed 4 weeks ago

Tom Olzak
Threat Intelligence

In this video, I define threat intelligence, or TI. Think of TI as decision support for cybersecurity: it's evidence-based knowledge ...

6:50
Threat Intelligence

41 views

13 days ago

Channel2600
HOPE_16 (2025): Exploiting Emergent Property-Based Vulnerabilities in Large Language Models

David Kuszmar Sunday, August 17, 2025: 2:00 pm (Tobin 201/202): As AI technology expands across both benign and malicious ...

55:12
HOPE_16 (2025): Exploiting Emergent Property-Based Vulnerabilities in Large Language Models

29 views

2 weeks ago

Channel2600
HOPE_16 (2025): A Red Team Exercise 2025, 15 Years Later

Logan Klein Friday, August 15, 2025: 5:00 pm (Little Theatre): This presentation is about red, blue and purple teams, along with ...

54:08
HOPE_16 (2025): A Red Team Exercise 2025, 15 Years Later

6 views

2 weeks ago

WEBNAZAR
Hacking With AI | WebNazar - Vision Thoroughly

How can organizations defend against the rising tide of AI-driven threats? This video reviews the essential cybersecurity tools and ...

18:59
Hacking With AI | WebNazar - Vision Thoroughly

18 views

2 weeks ago

Channel2600
HOPE_16 (2025): ATM Hacking: Past and Present

Roman Pushkin Sunday, August 17, 2025: 1:00 pm (Tobin 201/202): This talk explores the evolution of ATM hacking, from classic ...

54:45
HOPE_16 (2025): ATM Hacking: Past and Present

117 views

2 weeks ago

SANS Internet Storm Center
SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Sl…

SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Slop; Fortinet Patches Odd ...

6:02
SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Sl…

291 views

13 days ago

Channel2600
HOPE_16 (2025): Bureaucracy Hacking - Creating Organizational Exploit Chains for Good

Adam L. Hesch Sunday, August 17, 2025: 10:00 am (Marillac Auditorium): At their core, all bureaucracies are, fundamentally, ...

43:39
HOPE_16 (2025): Bureaucracy Hacking - Creating Organizational Exploit Chains for Good

16 views

2 weeks ago

Beo Beo
The Open Source Library That Broke the Internet

In late 2021, a tiny piece of open-source code nearly broke the internet. Log4Shell wasn't a flashy hack or a zero-day in some ...

8:26
The Open Source Library That Broke the Internet

142 views

6 days ago

Asso HZV
🇬🇧 Up and Down Technique: Exposing Hidden Data from RAG Systems  - Pedro Paniago

Retrieval-Augmented Generation (RAG) systems have revolutionized how LLMs (Large Language Models) access "additional" ...

39:03
🇬🇧 Up and Down Technique: Exposing Hidden Data from RAG Systems - Pedro Paniago

189 views

8 days ago

Jade Ellis
Signed, Sealed, Stolen: How We Patched Critical Vulnerabilities Under Fire [FOSDEM 2026]

What happens when your server starts signing messages you didn't send? Recently, the Continuwuity project (a Rust-based ...

15:57
Signed, Sealed, Stolen: How We Patched Critical Vulnerabilities Under Fire [FOSDEM 2026]

132 views

8 days ago

Tom Olzak
Threat Classification and Management

In this video, we're making cybersecurity feel manageable. When alerts and threats pile up, the real problem is decision-making: ...

12:25
Threat Classification and Management

32 views

10 days ago

Tom Olzak
Managing threats and vulnerabilities

This video covers, at a high level, a practical, general approach to managing threats and vulnerabilities using three connected ...

4:51
Managing threats and vulnerabilities

29 views

3 weeks ago

VulnVibes
Apache bRPC Under Fire: The Silent RCE Risk - CVE-2025-60021

A critical command injection vulnerability (CVE-2025-60021) was discovered in the heap profiler service of Apache bRPC, ...

4:14
Apache bRPC Under Fire: The Silent RCE Risk - CVE-2025-60021

73 views

3 weeks ago

Gnar Coding
POV: You Just Learned What OWASP Top 10 Actually Means

cybersecurity #linux #hacker This video provides a deep look into the OWASP Top 10:2025, This content is for EDUCATIONAL ...

41:03
POV: You Just Learned What OWASP Top 10 Actually Means

152 views

3 weeks ago

Tom Olzak
Vulnerability Scanning and Management

In this video, we're going to demystify vulnerability scanning and—more importantly—learn how to use it without drowning in ...

13:40
Vulnerability Scanning and Management

22 views

10 days ago

Channel2600
HOPE_16 (2025): How I Used and Abused LLMs to Get Top 250 on HTB

Rambo Anderson-You Sunday, August 17, 2025: 3:00 pm (Tobin 201/202): This talk explores an experiment in giving AI ...

46:25
HOPE_16 (2025): How I Used and Abused LLMs to Get Top 250 on HTB

46 views

2 weeks ago

Tom Olzak
How do Defend against Denial of Service Attacks

In this video, we explore Denial of Service attacks—DoS—and Distributed Denial of Service—DDoS. The goal is simple: make a ...

9:42
How do Defend against Denial of Service Attacks

31 views

3 weeks ago

Cloud Computing Insider
The Cloud Security Crisis No One Wants to Admit—61% Failure Rate

In this crucial video, cloud security leader David Linthicum exposes a troubling statistic: 61 percent of cloud security incidents are ...

13:02
The Cloud Security Crisis No One Wants to Admit—61% Failure Rate

7,180 views

9 days ago

ShadowTechUSA
How Hackers Could Paralyze America’s Power Grid in Minutes

AmericaPowerGridCyberattack #USNationalSecurity #HighTechCrimes #CriticalInfrastructureVulnerabilities #NSACyberDefense ...

6:12
How Hackers Could Paralyze America’s Power Grid in Minutes

36 views

9 days ago

Channel2600
HOPE_16 (2025): Meshtastic Attacktastic

Dave 'Heal' Schwartzberg Friday, August 15, 2025: 7:00 pm (Tobin 201/202): In emergencies or off-grid scenarios, Meshtastic ...

50:27
HOPE_16 (2025): Meshtastic Attacktastic

37 views

2 weeks ago

Tom Olzak
Honeypots and Honeynets

In this video, we're talking about honeypots: decoy systems designed to be probed, scanned, and attacked by threat actors—on ...

13:28
Honeypots and Honeynets

21 views

2 weeks ago