Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
46,562 results
In 2018, a secure communications app called Anom started to gain popularity among organized criminals. Soon, top tier drug ...
1,706,779 views
1 year ago
Yes, anyone can hack IoT devices and I'll show you how! It doesn't matter if you're an experienced pen tester in other fields, ...
292,965 views
Quantum computers will crack RSA and ECC and weaken symmetric encryption, but when? NIST is betting it won't happen before ...
151,167 views
4 months ago
AI is transforming social engineering. Using tools like ChatGPT, Gemini, and Copilot, attackers can make phishing and vishing ...
63,536 views
In December 2021, some ISPs in Russia started blocking Tor's website, along with protocol-level (DPI) and network-level (IP ...
78,344 views
3 years ago
SQL injections seem to be a solved problem; databases even have built-in support for prepared statements, leaving no room for ...
18,671 views
For the last 6 years my colleagues and I have been tracking the activities of the cyber-mercenaries we call Dark Caracal. In this ...
191,086 views
2 years ago
Imagine your home modem as a loaded gun aimed at global security. Our research exposes critical vulnerabilities in ISP-supplied ...
21,279 views
This talk explores the hidden risks in apps leveraging modern AI systems—especially those using large language models (LLMs) ...
153,594 views
C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...
16,243 views
Breaking into secure facilities used to be possible by inserting a listening device (such as an ESPKey) behind an RFID card ...
108,721 views
What are the consequences if an adversary compromises the surveillance cameras of thousands of leading Western ...
20,941 views
5 months ago
Exactly 5 years ago we were presenting ways to hack and root vacuum robots. Since then, many things have changed. Back then ...
131,969 views
You just arrived in some city where the enemy is active. You have a mission to locate and identify a hostile team. They operate in ...
18,867 views
Four years ago, Chris found a vulnerability with a murder for hire site on the dark net. He could exploit that vulnerability to intercept ...
726,573 views
Bug bounty is an intricate game between the bug hunter, the clients, and the intermediary. Like any game, it can be hacked.
83,358 views
The hacking subculture's closest relative is that of the Darknet. Both have knowledgeable people, many of whom are highly ...
504,080 views
Join General Paul M. Nakasone, U.S. Army (Retired), for a deep dive into the realities of modern cyber warfare at DefCon.
10,709 views
With the iPhone 15 & iPhone 15 Pro Apple switched their iPhone to USB-C - and introduced a new proprietary USB-C controller: ...
547,041 views
Who likes paying to ride the subway? Sure, you could hop the fare gates, but that can be athletically challenging and simply isn't ...
421,485 views