Cybersecurity Videos

Use After Free Bugs Are Out of Control @Endingwithali #threatwire #cybersecurity
VideoApr 16, 2026

Use After Free Bugs Are Out of Control @Endingwithali #threatwire #cybersecurity

The video highlights two critical use‑after‑free vulnerabilities discovered in the world’s leading browsers. Chrome and its open‑source counterpart Chromium are affected by CVE‑20265281, a zero‑day flaw in Dawn, the WebGPU implementation, while Firefox suffers from CVE‑202264688, a sandbox‑escape bug in...

By Hak5
FBI Seattle: Winter SHIELD for the Individual User, Part Two
VideoApr 15, 2026

FBI Seattle: Winter SHIELD for the Individual User, Part Two

In the second installment of Operation Winter Shield, FBI Seattle Special Agent Mike Harrington expands the agency’s ten‑step cyber‑security playbook for non‑technical consumers, outlining three additional defenses that mirror corporate best practices. He stresses managing third‑party risk by regularly auditing app...

By FBI
XAI Is Working to Get Grok Approved for Wider Government Use
VideoApr 15, 2026

XAI Is Working to Get Grok Approved for Wider Government Use

Elon Musk’s XAI is pursuing a FedRAMP High authorization to expand its Grok Enterprise chatbot across federal agencies, a move backed by the U.S. Department of Agriculture. The high‑security stamp would signal that Grok meets stringent government standards, opening doors...

By FedScoop
What Anthropic’s Mythos Means For Crypto Security
VideoApr 15, 2026

What Anthropic’s Mythos Means For Crypto Security

Anthropic’s newly released Mythos model has demonstrated an unprecedented ability to locate high‑severity flaws in software that underpins many crypto‑related services. The AI not only identifies vulnerabilities that traditional tools miss, but can also generate functional exploits, dramatically compressing the...

By CNBC (main)
SecTor 2025 | DriveThru Hacking: Now with Delivery
VideoApr 15, 2026

SecTor 2025 | DriveThru Hacking: Now with Delivery

The video presents a research project titled “Drive‑Thru Hacking: Now with Delivery,” demonstrating how dash‑cam devices can be compromised when a vehicle stops at a drive‑through. The team, led by Benjamin So and colleagues, scanned over 1,000 Wi‑Fi SSIDs in...

By Black Hat
🔴 Apr 15's Top Cyber News NOW! - Ep 1111
VideoApr 15, 2026

🔴 Apr 15's Top Cyber News NOW! - Ep 1111

The episode of the Daily Cyber Threat Brief aired on April 15, 2026, blended community chatter with hard‑hitting cyber‑security news. The host, Dr. Gerald Oer, opened with a prediction that at least one story would involve compromised identities, then dove...

By Simply Cyber
Hardware-Software Interface (WiCS Seminars 2026 Week 6)
VideoApr 15, 2026

Hardware-Software Interface (WiCS Seminars 2026 Week 6)

The final WiCS seminar focused on the hardware‑software interface, zeroing in on memory‑safety vulnerabilities that dominate modern cyber‑risk. Presenter Tenhu, a first‑year Cambridge PhD, explained how low‑level bugs in C/C++—from buffer overflows to use‑after‑free—fuel attacks such as WannaCry ransomware and...

By Cambridge Computer Laboratory
When One Person Is the Plan
VideoApr 14, 2026

When One Person Is the Plan

The video stresses that zero‑trust security is built on the premise of an inevitable breach, not on the hope that defenses will never be penetrated. It argues that organizations must pair preventive controls with a clearly documented, rehearsed incident‑response plan...

By Paul Asadoorian
AI Breaks Identity Models
VideoApr 14, 2026

AI Breaks Identity Models

The video argues that artificial‑intelligence workloads no longer fit traditional identity paradigms. Historically, systems distinguished between human users and predictable service accounts—batch jobs, scripts, or headless services—each with a stable, well‑defined identity. The speaker points out that AI agents behave unpredictably,...

By Paul Asadoorian
SecTor 2025 | Sharing Is Caring About an RCE Attack Chain on Quick Share
VideoApr 14, 2026

SecTor 2025 | Sharing Is Caring About an RCE Attack Chain on Quick Share

At SecTor 2025, SafeReach researchers Orya and Cohen unveiled a sophisticated remote‑code‑execution (RCE) attack chain targeting Google’s Quick Share, now available on Windows. The talk detailed how the team reverse‑engineered the Nearby Connections protocol, built a custom "QuickSniff" logger, and leveraged...

By Black Hat
Aviz Network Copilot Demo with Cody McCain
VideoApr 14, 2026

Aviz Network Copilot Demo with Cody McCain

The video demonstrates Aviz Network Copilot, an AI‑powered platform that brings large language models into network operations, showing how it can automate troubleshooting, configuration, and security tasks across multi‑vendor environments. The presenter explains that AI in NetOps evolves from manual configuration...

By Tech Field Day
Hyperscaler Security: ZERO Tolerance for Vendor Breaches! #shorts
VideoApr 14, 2026

Hyperscaler Security: ZERO Tolerance for Vendor Breaches! #shorts

The video highlights a hyperscaler executive’s stark warning: any material breach by a third‑party vendor is unacceptable, citing the recent McCo hack that cost the firm a major client, Facebook. He contrasts that with a prior, minor vendor issue that...

By Jason Lemkin
Sorry Windows 10 Users...
VideoApr 14, 2026

Sorry Windows 10 Users...

In a follow‑up to his earlier warning, the presenter apologizes to Windows 10 users after testing how easy it is to exploit an unpatched system. He rebuilt a Windows 10 1607 VM without updates and spent two hours running Metasploit’s EternalBlue (Double Pulsar) exploit....

By Chris Titus Tech
It Is Always DNS… Even at the Edge: Taming Proxy-Only Lookups Wi... Hector Monsalve & Thomas Gosteli
VideoApr 13, 2026

It Is Always DNS… Even at the Edge: Taming Proxy-Only Lookups Wi... Hector Monsalve & Thomas Gosteli

The session details Rush’s internal platform team tackling edge‑centric Kubernetes deployments, focusing on a stubborn DNS problem that emerged when customer firewalls restrict egress and provide DNS servers that cannot resolve public domains. By leveraging Selium’s service‑mesh capabilities, the team...

By CNCF (Cloud Native Computing Foundation)