ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

125 results

Tom Olzak
Threat Intelligence

In this video, I define threat intelligence, or TI. Think of TI as decision support for cybersecurity: it's evidence-based knowledge ...

6:50
Threat Intelligence

41 views

12 days ago

Tom Olzak
Ransomware in 2026: It’s Not Just Encryption Anymore

Most people still picture ransomware as a pop-up that says 'pay or your files stay locked.' In 2026, that mental model is ...

9:55
Ransomware in 2026: It’s Not Just Encryption Anymore

132 views

3 weeks ago

SecKC Live
Seckc  Live - January 2026

SecKC Live https://seckc.org WHERE: Knuckleheads Garage - 701 North Montgall Avenue, Kansas City, MO 64120 United States ...

3:04:19
Seckc Live - January 2026

395 views

Streamed 4 weeks ago

Vaant
They Beat a Nation’s Surveillance System — As Teenagers

In a digital age where nothing stays hidden, a group of teenage hackers did the impossible: they infiltrated one of the world's most ...

2:07
They Beat a Nation’s Surveillance System — As Teenagers

176 views

2 weeks ago

Asso HZV
🇫🇷 The Last Resort: Debugging Embedded Systems with Unconventional Methods - Vincent Lopes

A debugger is always a valuable tool when searching for vulnerabilities, particularly in embedded systems where multiple ...

26:40
🇫🇷 The Last Resort: Debugging Embedded Systems with Unconventional Methods - Vincent Lopes

251 views

5 days ago

Channel2600
HOPE_16 (2025): Exploiting Emergent Property-Based Vulnerabilities in Large Language Models

David Kuszmar Sunday, August 17, 2025: 2:00 pm (Tobin 201/202): As AI technology expands across both benign and malicious ...

55:12
HOPE_16 (2025): Exploiting Emergent Property-Based Vulnerabilities in Large Language Models

29 views

2 weeks ago

Channel2600
HOPE_16 (2025): ATM Hacking: Past and Present

Roman Pushkin Sunday, August 17, 2025: 1:00 pm (Tobin 201/202): This talk explores the evolution of ATM hacking, from classic ...

54:45
HOPE_16 (2025): ATM Hacking: Past and Present

111 views

2 weeks ago

Channel2600
HOPE_16 (2025): A Red Team Exercise 2025, 15 Years Later

Logan Klein Friday, August 15, 2025: 5:00 pm (Little Theatre): This presentation is about red, blue and purple teams, along with ...

54:08
HOPE_16 (2025): A Red Team Exercise 2025, 15 Years Later

6 views

2 weeks ago

Channel2600
HOPE_16 (2025): Bureaucracy Hacking - Creating Organizational Exploit Chains for Good

Adam L. Hesch Sunday, August 17, 2025: 10:00 am (Marillac Auditorium): At their core, all bureaucracies are, fundamentally, ...

43:39
HOPE_16 (2025): Bureaucracy Hacking - Creating Organizational Exploit Chains for Good

16 views

2 weeks ago

Tom Olzak
Managing threats and vulnerabilities

This video covers, at a high level, a practical, general approach to managing threats and vulnerabilities using three connected ...

4:51
Managing threats and vulnerabilities

29 views

3 weeks ago

SANS Internet Storm Center
SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Sl…

SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Slop; Fortinet Patches Odd ...

6:02
SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Sl…

290 views

13 days ago

Tom Olzak
Threat Classification and Management

In this video, we're making cybersecurity feel manageable. When alerts and threats pile up, the real problem is decision-making: ...

12:25
Threat Classification and Management

31 views

9 days ago

Beo Beo
The Open Source Library That Broke the Internet

In late 2021, a tiny piece of open-source code nearly broke the internet. Log4Shell wasn't a flashy hack or a zero-day in some ...

8:26
The Open Source Library That Broke the Internet

142 views

6 days ago

Tom Olzak
How do Defend against Denial of Service Attacks

In this video, we explore Denial of Service attacks—DoS—and Distributed Denial of Service—DDoS. The goal is simple: make a ...

9:42
How do Defend against Denial of Service Attacks

31 views

3 weeks ago

Tom Olzak
Vulnerability Scanning and Management

In this video, we're going to demystify vulnerability scanning and—more importantly—learn how to use it without drowning in ...

13:40
Vulnerability Scanning and Management

22 views

9 days ago

Gnar Coding
POV: You Just Learned What OWASP Top 10 Actually Means

cybersecurity #linux #hacker This video provides a deep look into the OWASP Top 10:2025, This content is for EDUCATIONAL ...

41:03
POV: You Just Learned What OWASP Top 10 Actually Means

152 views

3 weeks ago

WEBNAZAR
Hacking With AI | WebNazar - Vision Thoroughly

How can organizations defend against the rising tide of AI-driven threats? This video reviews the essential cybersecurity tools and ...

18:59
Hacking With AI | WebNazar - Vision Thoroughly

18 views

2 weeks ago

Jade Ellis
Signed, Sealed, Stolen: How We Patched Critical Vulnerabilities Under Fire [FOSDEM 2026]

What happens when your server starts signing messages you didn't send? Recently, the Continuwuity project (a Rust-based ...

15:57
Signed, Sealed, Stolen: How We Patched Critical Vulnerabilities Under Fire [FOSDEM 2026]

121 views

7 days ago

Channel2600
HOPE_16 (2025): How I Used and Abused LLMs to Get Top 250 on HTB

Rambo Anderson-You Sunday, August 17, 2025: 3:00 pm (Tobin 201/202): This talk explores an experiment in giving AI ...

46:25
HOPE_16 (2025): How I Used and Abused LLMs to Get Top 250 on HTB

46 views

2 weeks ago

ShadowTechUSA
How Hackers Could Paralyze America’s Power Grid in Minutes

AmericaPowerGridCyberattack #USNationalSecurity #HighTechCrimes #CriticalInfrastructureVulnerabilities #NSACyberDefense ...

6:12
How Hackers Could Paralyze America’s Power Grid in Minutes

36 views

8 days ago