ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

382 results

Goda Go
AI Coding Agents Have a Dirty Secret

Go to https://piavpn.com/godago to get 83% off from our sponsor Private Internet Access with 4 months free! Security researcher ...

10:37
AI Coding Agents Have a Dirty Secret

770 views

6 days ago

Problematic Solver
How a USB Rubber Ducky / BADUSB Works

This educational series covers the topic of USB Rubber Duckies, AKA "BADUSBs." Rubber duckies have become nearly ...

14:05
How a USB Rubber Ducky / BADUSB Works

142 views

4 weeks ago

Wild West Hackin' Fest
"Everything is a Proxy if You Try Hard Enough"- Old RFCs, New Exploits | Ken Pyle

"Everything is a Proxy if You Try Hard Enough" - Exploiting Old RFCs for New Types of Exploitation Speaker: Ken Pyle The core ...

53:53
"Everything is a Proxy if You Try Hard Enough"- Old RFCs, New Exploits | Ken Pyle

1,261 views

3 weeks ago

DevSec Path
Input Validation: Why Attackers Hate This Technique

In this video we break down one of the easiest and most effective application security techniques you can add to your code.

4:04
Input Validation: Why Attackers Hate This Technique

11 views

9 days ago

Zero Abstractions
I Built My Own Cheat Engine In C++ (Memory Hacking)

So I decided to program a software cheating engine using the c plus plus programing language! In this video, I demonstrate how I ...

3:50
I Built My Own Cheat Engine In C++ (Memory Hacking)

77 views

12 days ago

CodeRabbit
VIBE CODING GONE WRONG: I Built an AI App in Hours...Then Hacked EVERY User (Secure with CodeRabbit)

I Built a "Perfect" AI App in Hours… Then Hacked EVERY User in 1 Prompt (Don't Ship This!) You vibe-code a full-stack app with ...

13:50
VIBE CODING GONE WRONG: I Built an AI App in Hours...Then Hacked EVERY User (Secure with CodeRabbit)

243 views

5 days ago

Hacker Gallery
How Fake Reports Broke Bug Bounties

Learn for free on Brilliant for a full 30 days: https://brilliant.org/HackerGallery/ . You'll also get 20% off an annual Premium ...

2:11:01
How Fake Reports Broke Bug Bounties

719 views

4 days ago

Proper Honest Tech
How Secure are Apple Products REALLY?

Go to https://nordvpn.com/pht to get a 2-year plan plus 4 additional months with a huge discount. It's risk-free with Nord's 30-day ...

27:04
How Secure are Apple Products REALLY?

76,434 views

5 days ago

The Russian Dude
CRUCIAL SHIFT Just Happened on Ukrainian Frontlines. INTRODUCING: Deadly UGV Units

A major shift is unfolding on Ukraine's frontlines, and it's changing how this war is fought in real time. As FPV drones turn supply ...

13:06
CRUCIAL SHIFT Just Happened on Ukrainian Frontlines. INTRODUCING: Deadly UGV Units

28,056 views

10 hours ago

Astarte Cybersecurity
Browser & IDE extension security with John Tuckner of Secure Annex

John wrote his own tooling and started his own company to surface security issues in browser and IDE extensions. Through his ...

46:30
Browser & IDE extension security with John Tuckner of Secure Annex

145 views

13 days ago

TeamT5 杜浦數位安全
[#Podcast] #DeepDive Special Edition: What We Learned from 2025's Biggest Hacks

In 2025, cybersecurity entered a fundamentally different phase. The most impactful breaches no longer relied on novel exploits ...

16:07
[#Podcast] #DeepDive Special Edition: What We Learned from 2025's Biggest Hacks

41 views

4 weeks ago

TECHtalk
Using AI agents? Prepare to be attacked

AI agents are exploding across the enterprise—but security hasn't caught up. In this episode of Today in Tech, host Keith Shaw ...

41:31
Using AI agents? Prepare to be attacked

2,482 views

3 weeks ago

On The Block (by Espeo Software)
Why Most Web3 Vulnerabilities Come From Design, Not Exploits

About Zealynx Zealynx helps DeFi and Web3 teams secure every layer of their projects, from smart contracts to dApps and ...

44:09
Why Most Web3 Vulnerabilities Come From Design, Not Exploits

52 views

5 days ago

Wiz
CodeBreach: Hijacking the AWS Console with Yuval Avrahami

Everything you need to know about CodeBreach with Yuval Avrahami On this episode of Crying Out Cloud, Eden Koby Naftali ...

17:21
CodeBreach: Hijacking the AWS Console with Yuval Avrahami

1,220 views

2 weeks ago

DevGames3085
The Ultimate Solo Game Dev Mistakes to Avoid (Dev Tips)

This video isn't theory — it's dev reality. No “top 10 tips” from someone who shipped nothing. Every lesson in here came from ...

59:27
The Ultimate Solo Game Dev Mistakes to Avoid (Dev Tips)

141 views

13 days ago

Threat Labs
How AI Systems Get Attacked | Introduction

Artificial Intelligence is everywhere—from assignments and office work to automation and decision-making. But what happens ...

3:10
How AI Systems Get Attacked | Introduction

19 views

9 days ago

Wild West Hackin' Fest
Web Application Authorization: Taming the Perfect Storm | Tim Tomes

Web Application Authorization: Taming the Perfect Storm Presenter: Tim Tomes Access control vulnerabilities are everywhere.

54:49
Web Application Authorization: Taming the Perfect Storm | Tim Tomes

324 views

2 weeks ago

Com Lucro Trader
How Professional Traders Exploit Liquidity Using ICT Turtle Soup Trading Strategy

Most traders lose money not because they lack strategies, but because they do not understand how liquidity actually moves the ...

17:01
How Professional Traders Exploit Liquidity Using ICT Turtle Soup Trading Strategy

1,238 views

5 days ago

StackHawk
API Security for the AI Era with GigaOm

Dig into GigaOm's API Security Radar report and learn what it takes to build your API security program for the AI era.

1:00:24
API Security for the AI Era with GigaOm

25 views

7 days ago

Merogenomics
Parasites-cancer immunological puppet show: how anti-parasitic drugs might fight tumors (#206)

Regulatory T cells — the immune system's “peacekeepers” — can be exploited by parasites, creating conditions that tumors later ...

24:00
Parasites-cancer immunological puppet show: how anti-parasitic drugs might fight tumors (#206)

21,740 views

2 weeks ago