ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

30 results

Asso HZV
🇫🇷 The Last Resort: Debugging Embedded Systems with Unconventional Methods - Vincent Lopes

A debugger is always a valuable tool when searching for vulnerabilities, particularly in embedded systems where multiple ...

26:40
🇫🇷 The Last Resort: Debugging Embedded Systems with Unconventional Methods - Vincent Lopes

263 views

6 days ago

SANS Internet Storm Center
SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Sl…

SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Slop; Fortinet Patches Odd ...

6:02
SANS Stormcast Thursday, January 29th, 2026: WebLogic AI Slop; Fortinet Patches; WebLogic AI Sl…

291 views

2 weeks ago

Channel2600
HOPE_16 (2025): ATM Hacking: Past and Present

Roman Pushkin Sunday, August 17, 2025: 1:00 pm (Tobin 201/202): This talk explores the evolution of ATM hacking, from classic ...

54:45
HOPE_16 (2025): ATM Hacking: Past and Present

120 views

2 weeks ago

Channel2600
HOPE_16 (2025): A Red Team Exercise 2025, 15 Years Later

Logan Klein Friday, August 15, 2025: 5:00 pm (Little Theatre): This presentation is about red, blue and purple teams, along with ...

54:08
HOPE_16 (2025): A Red Team Exercise 2025, 15 Years Later

6 views

2 weeks ago

Cloud Computing Insider
The Cloud Security Crisis No One Wants to Admit—61% Failure Rate

In this crucial video, cloud security leader David Linthicum exposes a troubling statistic: 61 percent of cloud security incidents are ...

13:02
The Cloud Security Crisis No One Wants to Admit—61% Failure Rate

7,601 views

10 days ago

Channel2600
HOPE_16 (2025): How I Used and Abused LLMs to Get Top 250 on HTB

Rambo Anderson-You Sunday, August 17, 2025: 3:00 pm (Tobin 201/202): This talk explores an experiment in giving AI ...

46:25
HOPE_16 (2025): How I Used and Abused LLMs to Get Top 250 on HTB

47 views

2 weeks ago

nextapp devCon
Don’t Trust the Device: A Developer’s Guide to Secure Mobile Apps - Sidharth B | droidcon india 2025

Talk: Don't Trust the Device: A Developer's Guide to Secure Mobile Apps Speaker: Sidharth B Event: droidcon India 2025 ...

17:04
Don’t Trust the Device: A Developer’s Guide to Secure Mobile Apps - Sidharth B | droidcon india 2025

151 views

4 weeks ago

Tarushv
Security+ Chapter 6: Application Security

So exam essentials you're going to want to in development you're going to want to follow standardized SDLC and align with OAS ...

56:10
Security+ Chapter 6: Application Security

55 views

13 days ago

Brain Static TV
One Red Dot, Infinite Anxiety: Here's Why

Why does ONE tiny red notification feel impossible to ignore? You can ignore bills. You can ignore emails. You can ignore people ...

5:16
One Red Dot, Infinite Anxiety: Here's Why

4 views

3 weeks ago

Tom Olzak
Secure Coding Practices

In this video, we're going to treat secure coding like an engineering workflow—not a pile of tips. We'll start by identifying common ...

15:58
Secure Coding Practices

11 views

6 days ago

SANS Internet Storm Center
SANS Stormcast Thursday, January 22nd, 2026: Visual Studio Code Scripts; Cisco Unified Comm and…

SANS Stormcast Thursday, January 22nd, 2026: Visual Studio Code Scripts; Cisco Unified Comm and Zoom Vuln; Insufficient ...

6:33
SANS Stormcast Thursday, January 22nd, 2026: Visual Studio Code Scripts; Cisco Unified Comm and…

304 views

3 weeks ago

Tarushv
Security+ Chapter 6 Application Security 4K60fps With Voiceover

Let's start with the software development life cycle or SDLC the SDLC describes all the steps in software development from initial ...

20:36
Security+ Chapter 6 Application Security 4K60fps With Voiceover

13 views

2 weeks ago

CSUITE TECH LABS - CTL
CSUITE TECH LABS - OUR STUDENTS TOOLS DEMO 6

This video from CSUITE TECH LABS demonstrates several tools used in cybersecurity for researching, identifying, and managing ...

13:00
CSUITE TECH LABS - OUR STUDENTS TOOLS DEMO 6

17 views

3 days ago

Asso HZV
🇬🇧 From HTML Injection to Full AWS Account Takeover - Raunak Parmar

Modern web applications often provide features like PDF generation to enhance user experience, but these functionalities can ...

19:00
🇬🇧 From HTML Injection to Full AWS Account Takeover - Raunak Parmar

312 views

10 days ago

Wolfgang Wee Uncut
Glenn Diesen | War in Europe? Ukraine, Iran, Davos, Propaganda

Wolfgang Wee Uncut #737 - Glenn Diesen

2:01:19
Glenn Diesen | War in Europe? Ukraine, Iran, Davos, Propaganda

10,530 views

4 days ago

MysticalOS WoW
Undocumented 12.0.1 Addon Changes in 5 minutes

Blizzard put a lot of UI changes in the World of Warcraft: Midnight 12.0.1 patch notes. This video talks about the addon changes ...

5:25
Undocumented 12.0.1 Addon Changes in 5 minutes

8,985 views

2 days ago

Rhinne
Get 120 Pulls in 1 Day F2P | Oroberyl Farming Guide Endfield

An oroberyl guide for arknights endfield and how to get enough pulls to obtain the limited character. Goes over origiometry as well ...

13:55
Get 120 Pulls in 1 Day F2P | Oroberyl Farming Guide Endfield

139,044 views

2 weeks ago

Kalyskah Karnstein
[WIP] Combat FlowSystem - Kalyskah Debug

Hello everyone! We're reworking the game's combat to make it more dynamic and satisfying, and one of the functionalities we'll be ...

0:49
[WIP] Combat FlowSystem - Kalyskah Debug

263 views

2 weeks ago

Round The Code
This ASP.NET Core mistake exposes your app to attackers

Handle exceptions properly in an API using Minimal APIs: ...

8:11
This ASP.NET Core mistake exposes your app to attackers

381 views

10 days ago

Maxim Masiutin
Information Security Terminology - Lecture 15/16 - Security Risk Management

0:00 Lecture 15: Security Risk Management 0:14 Introduction 1:46 Part 1: The Risk Management Lifecycle / Understanding Risk ...

43:07
Information Security Terminology - Lecture 15/16 - Security Risk Management

3 views

11 days ago