ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

720 results

Low Level
I Hacked This Temu Router. What I Found Should Be Illegal.

Learn how to hack and reverse engineer like this: https://www.stacksmash.io MY COURSES Sign-up for my FREE 3-Day C ...

15:45
I Hacked This Temu Router. What I Found Should Be Illegal.

1,708,997 views

2 days ago

RunSafe Security Inc.
From NIST to Nation-State: Securing Embedded Systems through Compliance and Trust

In this episode of Exploited: The Cyber Truth, host Paul Ducklin is joined by RunSafe Security CEO Joe Saunders and Cordell ...

32:55
From NIST to Nation-State: Securing Embedded Systems through Compliance and Trust

17 views

6 days ago

DigitalAndrew
Firmware Patching: Full Guide

A full guide on how I patch firmware to make modifications to existing firmware for security testing such as adding in a backdoor.

20:59
Firmware Patching: Full Guide

552 views

7 days ago

Fortinet
Fortinet Achieves IEC 62443-4-1 ML2 Certification for Secure Product Development | News

Independent validation of #Fortinet's secure product development lifecycle for industrial automation and control systems, OT, and ...

1:43
Fortinet Achieves IEC 62443-4-1 ML2 Certification for Secure Product Development | News

233 views

6 days ago

Black Hat
Black Hat USA 2025 | Uncovering 'NASty' 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing

While baseband modems are the unseen engines of cellular communication, their proprietary nature, closed-source development, ...

39:04
Black Hat USA 2025 | Uncovering 'NASty' 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing

2,377 views

4 days ago

Uplatz
Modern Access Control: From RBAC to Zero Trust ABAC | Uplatz

Access control is no longer just about roles and permissions — it's about context, identity, risk, and continuous verification.

6:18
Modern Access Control: From RBAC to Zero Trust ABAC | Uplatz

7 views

3 days ago

Hacker Gallery
2 Hours Inside The Dark World of Cybersecurity

Learn for free on Brilliant for a full 30 days: https://brilliant.org/HackerGallery/. You'll also get 20% off an annual Premium ...

2:06:59
2 Hours Inside The Dark World of Cybersecurity

945 views

2 days ago

Embedded Computing Design
ICYMI: Episode 51

Hello Embedded Professionals, Engineers, and Developers! Welcome to In Case You Missed it, the weekly news show all about ...

6:49
ICYMI: Episode 51

18 views

5 days ago

Emergent Mind
Fast, Secure, Adaptable: LionsOS Design, Implementation and Performance

Paper: Fast, Secure, Adaptable: LionsOS Design, Implementation and Performance (2501.06234) Published: 8 Jan 2025.

2:51
Fast, Secure, Adaptable: LionsOS Design, Implementation and Performance

0 views

5 days ago

STMicroelectronics
Decoding complexity: how to navigate PQC migration

Step into the future of security with post-quantum cryptography (PQC) in real-world products. Explore the rich landscape of PQC ...

2:10
Decoding complexity: how to navigate PQC migration

129 views

2 days ago

Uplatz
Private 5G and IIoT: Building the Industrial Nervous System | Uplatz

Modern factories, energy plants, logistics hubs, and smart infrastructure require ultra-reliable, low-latency connectivity. Private 5G ...

7:21
Private 5G and IIoT: Building the Industrial Nervous System | Uplatz

0 views

6 days ago

Embedded Engineering Solutions
Why Great Firmware Is Simple (And Most Engineers Get This Wrong)

In this video, EES Founder Craig Wenger discusses a critical philosophy in embedded systems design: Simplicity is better than ...

1:54
Why Great Firmware Is Simple (And Most Engineers Get This Wrong)

0 views

5 days ago

Ton Does Linux and More!
Linux News: Kernel 7.0, Firefox AI Kill Switch & More

Linux 7.0-rc2 is here and Linus isn't happy about its size. Plus: LTS kernels get extended support, Firefox 148 ships an AI kill ...

7:20
Linux News: Kernel 7.0, Firefox AI Kill Switch & More

4,655 views

1 day ago

Uplatz
Industrial AI Operating System: Engineering the Metaverse Layer | Uplatz

As industries digitize factories, supply chains, energy grids, and cities, a new architectural layer is emerging—an Industrial AI ...

8:23
Industrial AI Operating System: Engineering the Metaverse Layer | Uplatz

0 views

7 days ago

Dr Jon EA: Pico & Pico 2
Inverse Kinematics Demystified: Making Robots Move in Any Direction

Building a Mecanum robot is one thing, but controlling it is where the real magic happens! In this video, we tackle the code ...

17:35
Inverse Kinematics Demystified: Making Robots Move in Any Direction

2,695 views

6 days ago

Industrial Intel
Who Really Makes the Card Machines in America?

You tap your card every day.But the bank doesn't actually build the machine in front of you. In this video, we break down the ...

2:54
Who Really Makes the Card Machines in America?

0 views

6 days ago

dissecto
ScapyCon 25 - Technical Introduction to JTAG and ARM debugging Interfaces - Lukas Magel

In this talk by Lukas Magel (ETAS) we take a deep dive into the physical and logical architecture of JTAG-based ARM debug ...

47:56
ScapyCon 25 - Technical Introduction to JTAG and ARM debugging Interfaces - Lukas Magel

37 views

2 days ago

ROBOTICS SP
RFID based secure door🚪 lock 🔐 system #diy #arduino #esp32 #programming #coding #viralshorts  #viral

RFID Based Smart Door Lock System using ATmega328P I'm excited to share my latest electronics project – a Secure RFID ...

0:41
RFID based secure door🚪 lock 🔐 system #diy #arduino #esp32 #programming #coding #viralshorts #viral

0 views

1 day ago

Cyber Keen Security Solutions Ltd
Qualcomm Video

Transforming ESP32 Based Intelligent Wi-Fi and Alert System to KeenGuard AI.

1:44
Qualcomm Video

0 views

5 days ago

Microsoft Reactor
Get Secure and Stay Secure in the world of agentic AI

Modern development moves fast. We need to secure while maintaining code quality at the speed of agentic AI. Security teams are ...

44:09
Get Secure and Stay Secure in the world of agentic AI

1,025 views

Streamed 1 day ago