ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

40 results

Asso HZV
🇫🇷 The Last Resort: Debugging Embedded Systems with Unconventional Methods - Vincent Lopes

A debugger is always a valuable tool when searching for vulnerabilities, particularly in embedded systems where multiple ...

26:40
🇫🇷 The Last Resort: Debugging Embedded Systems with Unconventional Methods - Vincent Lopes

318 views

2 weeks ago

SANS Internet Storm Center
SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Sl…

SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Slop; Fortinet Patches Odd ...

6:02
SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Sl…

292 views

4 weeks ago

Channel2600
HOPE_16 (2025): ATM Hacking: Past and Present

Roman Pushkin Sunday, August 17, 2025: 1:00 pm (Tobin 201/202): This talk explores the evolution of ATM hacking, from classic ...

54:45
HOPE_16 (2025): ATM Hacking: Past and Present

166 views

1 month ago

Tom Olzak
Secure Coding Practices

In this video, we're going to treat secure coding like an engineering workflow—not a pile of tips. We'll start by identifying common ...

15:58
Secure Coding Practices

17 views

2 weeks ago

Tarushv
Security+ Chapter 6: Application Security

So exam essentials you're going to want to in development you're going to want to follow standardized SDLC and align with OAS ...

56:10
Security+ Chapter 6: Application Security

55 views

4 weeks ago

DevConf
Governing Global Vulnerabilities: Standards for Open Source Resilience- DevConf.IN 2026

Title: Governing Global Vulnerabilities: Standards for Open Source Resilience Speaker(s): Yogesh Mittal --- Effective Vulnerability ...

36:52
Governing Global Vulnerabilities: Standards for Open Source Resilience- DevConf.IN 2026

126 views

8 days ago

Channel2600
HOPE_16 (2025): A Red Team Exercise 2025, 15 Years Later

Logan Klein Friday, August 15, 2025: 5:00 pm (Little Theatre): This presentation is about red, blue and purple teams, along with ...

54:08
HOPE_16 (2025): A Red Team Exercise 2025, 15 Years Later

10 views

1 month ago

Joseph Zambreno
02/17/26: Lect-04 (cont.)

... have that vulnerability being able to actually exploit that kind of thing requires some fairly low-level uh double E style knowledge ...

45:58
02/17/26: Lect-04 (cont.)

0 views

9 days ago

Tom Olzak
Network Security Resources

In this video, we're building a “go to shelf” of trusted online network security resources—the places professionals check when they ...

13:04
Network Security Resources

18 views

6 days ago

CSUITE TECH LABS - CTL
CSUITE TECH LABS - OUR STUDENTS TOOLS DEMO 6

This video from CSUITE TECH LABS demonstrates several tools used in cybersecurity for researching, identifying, and managing ...

13:00
CSUITE TECH LABS - OUR STUDENTS TOOLS DEMO 6

21 views

2 weeks ago

Yale Applied Cryptography Laboratory
Detecting Smart Contract State Inconsistency Bugs | Yinxi Liu, RIT

Abstract: Ethereum smart contracts determine state transition results not only by the previous states, but also by a mutable global ...

30:44
Detecting Smart Contract State Inconsistency Bugs | Yinxi Liu, RIT

12 views

13 days ago

Cloud Computing Insider
The Cloud Security Crisis No One Wants to Admit—61% Failure Rate

In this crucial video, cloud security leader David Linthicum exposes a troubling statistic: 61 percent of cloud security incidents are ...

13:02
The Cloud Security Crisis No One Wants to Admit—61% Failure Rate

15,168 views

3 weeks ago

Channel2600
HOPE_16 (2025): How I Used and Abused LLMs to Get Top 250 on HTB

Rambo Anderson-You Sunday, August 17, 2025: 3:00 pm (Tobin 201/202): This talk explores an experiment in giving AI ...

46:25
HOPE_16 (2025): How I Used and Abused LLMs to Get Top 250 on HTB

51 views

1 month ago

SANS Internet Storm Center
SANS Stormcast Friday, February 20th, 2026: DynoWiper Analysis; Vibe Passwords; IDE Extension V…

SANS Stormcast Friday, February 20th, 2026: DynoWiper Analysis; Vibe Passwords; IDE Extension Vulns; Gransstream GXP ...

6:20
SANS Stormcast Friday, February 20th, 2026: DynoWiper Analysis; Vibe Passwords; IDE Extension V…

292 views

7 days ago

Asso HZV
🇫🇷 DCOM Turns 30: Revisiting a Legacy Interface in the Modern Threatscape  - Julien Bedel

Part of Windows operating system for over 20 years, DCOM (Distributed Component Object Model) has received a lot of attention ...

52:27
🇫🇷 DCOM Turns 30: Revisiting a Legacy Interface in the Modern Threatscape - Julien Bedel

338 views

13 days ago

MysticalOS WoW
Undocumented 12.0.1 Addon Changes in 5 minutes

Blizzard put a lot of UI changes in the World of Warcraft: Midnight 12.0.1 patch notes. This video talks about the addon changes ...

5:25
Undocumented 12.0.1 Addon Changes in 5 minutes

9,616 views

2 weeks ago

Joseph Zambreno
02/12/26: Lect-04

... with that information how can we potentially use existing vulnerability and exploit databases uh to determine what things can be ...

39:41
02/12/26: Lect-04

20 views

2 weeks ago

Tarushv
Security+ Chapter 6 Application Security 4K60fps With Voiceover

Let's start with the software development life cycle or SDLC the SDLC describes all the steps in software development from initial ...

20:36
Security+ Chapter 6 Application Security 4K60fps With Voiceover

15 views

4 weeks ago

CyberNews AI
Operation Olalampo: Iran's MuddyWater Unleashes AI Tools on MENA

A deep dive into Operation Olalampo, a new campaign by the Iranian hacking group MuddyWater targeting the Middle East and ...

3:49
Operation Olalampo: Iran's MuddyWater Unleashes AI Tools on MENA

8 views

3 days ago

Asso HZV
🇬🇧 From HTML Injection to Full AWS Account Takeover - Raunak Parmar

Modern web applications often provide features like PDF generation to enhance user experience, but these functionalities can ...

19:00
🇬🇧 From HTML Injection to Full AWS Account Takeover - Raunak Parmar

346 views

3 weeks ago