Cybersecurity Videos

Beyond Vendor Risk: Real-Time GRC, AI, and Protecting App User Data - Jadee Hanson - CSP #221
VideoFeb 9, 2026

Beyond Vendor Risk: Real-Time GRC, AI, and Protecting App User Data - Jadee Hanson - CSP #221

The episode centers on Vanta’s Agentic Trust platform and its role in protecting application user data through real‑time governance, risk, and compliance (GRC). Host Jessica Hoffman interviews JD Hanson, Vanta’s security and technology lead, who explains how the company uses...

By Paul Asadoorian
🔴 Feb 9's Top Cyber News NOW! - Ep 1064
VideoFeb 9, 2026

🔴 Feb 9's Top Cyber News NOW! - Ep 1064

Episode 1064 of Simply Cyber’s Daily Cyber Threat Brief recapped the most pressing cybersecurity developments on February 9, 2026, ranging from AI‑assistant abuse to federal hardware mandates. The show highlighted OpenClaw’s new partnership with Google‑owned VirusTotal, which hashes each uploaded skill and checks...

By Simply Cyber
Accelerating Incident Detection and Response I CIO Talk Network
VideoFeb 9, 2026

Accelerating Incident Detection and Response I CIO Talk Network

The CIO Talk Network episode focuses on the growing difficulty enterprises face in detecting and responding to security incidents. Host Sanjor Bal and Paul Corp CISO Nares Fidila discuss how manual, skill‑dependent processes and numerous handoffs—especially for endpoint alerts—extend dwell...

By CIO Talk Network
Privacy Isn't What I Thought It Was
VideoFeb 9, 2026

Privacy Isn't What I Thought It Was

In the latest Techlore video, host Henry reflects on a decade‑long obsession with extreme privacy measures and argues that privacy should be viewed as a means to achieve broader goals rather than a final destination. He walks through the technical toys...

By TechLore
How 1 iPhone FOILED the FBI
VideoFeb 7, 2026

How 1 iPhone FOILED the FBI

Apple’s Lockdown Mode prevented the FBI from extracting data from a Washington Post reporter’s iPhone during a recent home raid, according to court filings and TechRadar. Agents seized multiple devices, forced the reporter to unlock a work MacBook with her...

By David Bombal
ClawdBot Full Tutorial for Beginners: SECURE Setup Guide
VideoFeb 7, 2026

ClawdBot Full Tutorial for Beginners: SECURE Setup Guide

The video is a step‑by‑step tutorial on deploying ClawdBot (also known as OpenClaw) with a focus on airtight security. It warns that many quick‑fire YouTube guides leave critical vulnerabilities, exposing API keys, email accounts, and even crypto wallets to attackers....

By Tech With Tim
Why Everyone Should Use an Ad Blocker (AdGuard Interview)
VideoFeb 7, 2026

Why Everyone Should Use an Ad Blocker (AdGuard Interview)

The Techlore Talk interview with Andre from AdGuard centers on why modern users should adopt an ad‑blocking solution and how the company has expanded beyond simple browser extensions. Starting as a premium ad blocker in 2009, AdGuard now offers DNS‑level...

By TechLore
HackTheBox - Signed
VideoFeb 7, 2026

HackTheBox - Signed

The video walks through solving the HackTheBox "Signed" machine, an assumed‑breach challenge centered on a Microsoft SQL Server 2022 instance. Starting with default credentials, the presenter demonstrates initial enumeration, discovers that the guest account lacks XP cmd shell privileges, and pivots to...

By IppSec
JHT Course Launch: Dark Web 2 - CTI Researcher
VideoFeb 6, 2026

JHT Course Launch: Dark Web 2 - CTI Researcher

The video is a step‑by‑step tutorial on building a responsive login page using HTML, CSS, and a touch of JavaScript. It begins with a clean HTML boilerplate, emphasizing a mobile‑first approach and setting up a container for the form elements....

By John Hammond
🔴 Feb 6's Top Cyber News NOW! - Ep 1063
VideoFeb 6, 2026

🔴 Feb 6's Top Cyber News NOW! - Ep 1063

The episode of Simply Cyber’s Daily Cyber Threat Brief opened with host Dr. Gerald Ogier welcoming listeners and outlining the show’s format—daily cyber headlines, community interaction, and CPE credit opportunities. The centerpiece of the news roundup was Substack’s admission of...

By Simply Cyber
Rethinking Segmentation for Better Security I CIO Talk Network
VideoFeb 6, 2026

Rethinking Segmentation for Better Security I CIO Talk Network

In this CIO Talk Network episode, host Sanjal interviews Ariel Zitlin, CTO and co‑founder of Guardicore, about why traditional network segmentation is no longer sufficient for modern enterprises. The discussion highlights how the proliferation of cloud, bare‑metal, virtualization, and container...

By CIO Talk Network
AI in Cybersecurity for SOC Analysts
VideoFeb 6, 2026

AI in Cybersecurity for SOC Analysts

The Simply Cyber Fireside chat brings together veteran SOC practitioners Wade Wells and Hayden Covington to explore how artificial intelligence is reshaping day‑to‑day security operations. The conversation centers on concrete AI‑driven workflows—using large‑language models to draft detection rule descriptions,...

By Simply Cyber
The Value of AI - Where Is the Data?
VideoFeb 6, 2026

The Value of AI - Where Is the Data?

The video centers on the difficulty of quantifying AI’s true business value due to a lack of robust data. The speaker acknowledges personal benefits—helping her husband and herself write—but stresses that beyond anecdotal wins, the impact remains fuzzy, especially when...

By Platform Engineering (community)
I DDoS'd Myself (Don't Do This)
VideoFeb 4, 2026

I DDoS'd Myself (Don't Do This)

The video walks through a live demonstration of a denial‑of‑service attack performed on the presenter’s own web server, illustrating both a simple ICMP ping flood and a distributed variant. The host warns viewers that such activities are illegal without permission...

By NetworkChuck
This NEW Setting Locks Down WhatsApp
VideoFeb 3, 2026

This NEW Setting Locks Down WhatsApp

WhatsApp unveiled a new "lockdown" setting that lets users secure their entire account with a single tap. The feature is positioned as a "nuclear option" for those who demand the highest level of privacy, instantly switching every privacy toggle to...

By NetworkChuck
Don't Take Crypto Security for Granted Ft. Ian Rogers From Ledger
VideoJan 29, 2026

Don't Take Crypto Security for Granted Ft. Ian Rogers From Ledger

The Breakpoint 2025 panel in Abu Dhabi featured Ian Rogers, Chief Experience Officer at Ledger, discussing how crypto security and user experience have matured. Rogers framed the current era as a transition from the speculative boom of 2021 to a...

By Real Vision Finance
NEW Lawsuit Could Destroy WhatsApp
VideoJan 28, 2026

NEW Lawsuit Could Destroy WhatsApp

The video examines a newly filed lawsuit accusing WhatsApp of violating its end‑to‑end encryption promises by allowing Meta employees to read private messages. The complaint asserts that Meta engineers can obtain unfettered access to any user’s chat history simply by...

By Seytonic
I Gave Clawdbot (Now Moltbot) Access to My Computer, Calendar, and Emails: Here’s What Happened
VideoJan 28, 2026

I Gave Clawdbot (Now Moltbot) Access to My Computer, Calendar, and Emails: Here’s What Happened

The episode documents a hands‑on trial of Claudebot—now renamed Moltbot—an open‑source AI agent that can act on a user’s desktop, calendar and email. The host invites the bot into a Riverside podcast via Telegram, then walks through granting microphone, camera...

By How I AI
I Flew to Romania to Find Hackers Who Fight Hackers
VideoJan 27, 2026

I Flew to Romania to Find Hackers Who Fight Hackers

A hidden cybercrime-fighting unit inside Bitdefender’s Bucharest headquarters, known as the Draco team, spent over two years dismantling a major ransomware gang by developing free decryptor tools that ultimately forced the criminals to cease operations and saved victims more than...

By NetworkChuck
Hacking AI without Code
VideoJan 26, 2026

Hacking AI without Code

The video explains that large language models (LLMs) are vulnerable to two distinct attack vectors—prompt injection and prompt hacking—where malicious text can override system instructions or bypass safety filters. Prompt injection occurs when an LLM consumes external content, such as a...

By Louis Bouchard
HackTheBox - Imagery
VideoJan 24, 2026

HackTheBox - Imagery

The video walks through the Hack The Box "Imagery" machine, a Flask‑based web application exposing a gallery, login, and bug‑report functionality. The presenter begins with standard port scanning, identifies HTTP on port 8000, and confirms the service runs WorkZug on...

By IppSec
What Is Zero Trust? (And Why Hackers Hate It)
VideoJan 20, 2026

What Is Zero Trust? (And Why Hackers Hate It)

The video explains zero‑trust security, a model where no user, device, or request is trusted by default and must be continuously verified, authenticated, and authorized. It argues that as hackers become more sophisticated, traditional perimeter defenses are insufficient, making zero‑trust...

By NetworkChuck
NEW Bluetooth Headphone Hack Is Real and Bad
VideoJan 16, 2026

NEW Bluetooth Headphone Hack Is Real and Bad

The video spotlights a newly disclosed “Whisper Pair” vulnerability that lets attackers hijack Bluetooth headphones and earbuds supporting Google’s Fast Pair protocol, alongside brief rundowns of recent Logitech and Telegram security flaws. Researchers found that many manufacturers fail to enforce the...

By Seytonic
ACCESS Your Home Network From ANYWHERE
VideoJan 8, 2026

ACCESS Your Home Network From ANYWHERE

The video introduces Twin Gate, a service that lets users connect to their home Wi‑Fi network from anywhere without a traditional VPN. By deploying a lightweight connector—often on a Raspberry Pi—owners gain point‑to‑point access to any device on their LAN,...

By NetworkChuck
Your Phone Remembers Everything
VideoJan 7, 2026

Your Phone Remembers Everything

The video titled “Your Phone Remembers Everything” highlights how modern smartphones continuously record user activity, debunking the myth that incognito or private modes erase digital footprints. The presenter demonstrates unified logs that capture everything from opened files to physical movement across...

By Paul Asadoorian
🔴 [PAYLOAD REVIEW] WiFi Pineapple Pager 📟🍍
VideoJan 6, 2026

🔴 [PAYLOAD REVIEW] WiFi Pineapple Pager 📟🍍

The live stream focused on reviewing and integrating community‑submitted payloads and themes for the Wi‑Fi Pineapple Pager, a portable network‑assessment device. Host Jason walked viewers through the pull‑payload utility, demonstrating how entering a PR number (e.g., 97) fetches and tests...

By Hak5
DEF CON 33 Recon Village - Autonomous Video Hunter AI Agents for Real Time OSINT - Kevin Dela Rosa
VideoDec 31, 2025

DEF CON 33 Recon Village - Autonomous Video Hunter AI Agents for Real Time OSINT - Kevin Dela Rosa

Kevin Dela Rosa presented the Autonomous Video Hunter, an AI‑driven system that extracts real‑time open‑source intelligence from video streams. Built on his startup Cloud Glue, the proof‑of‑concept combines multimodal video processing, large‑language‑model planning, and a suite of vision and audio tools...

By DEF CON
DEF CON 33 Recon Village -  Inside the Shadows Tracking RaaS Groups, Cyber Threats - John Dilgen
VideoDec 31, 2025

DEF CON 33 Recon Village - Inside the Shadows Tracking RaaS Groups, Cyber Threats - John Dilgen

John Dilgen, a cyber‑threat intelligence analyst at Reliquest, presented at DEF CON 33’s Recon Village a deep dive titled “Inside the Shadows: Tracking Ransomware‑as‑a‑Service (RaaS) Groups and Evolving Cyber Threats.” He framed the discussion around the staggering $124 billion annual ransomware cost...

By DEF CON
DEF CON 33 Recon Village - How to Become One of Them: Deep Cover Ops - Sean Jones, Kaloyan Ivanov
VideoDec 31, 2025

DEF CON 33 Recon Village - How to Become One of Them: Deep Cover Ops - Sean Jones, Kaloyan Ivanov

The DEF CON 33 Recon Village session, led by Sean Jones and Robert Rosio, explored the art and science of deep‑cover operations within cyber‑criminal ecosystems. The presenters argued that human intelligence (HUMINT) remains indispensable, especially when automated scrapers and...

By DEF CON
Top 10 Things To Do After Installing Kali Linux
VideoDec 29, 2025

Top 10 Things To Do After Installing Kali Linux

The video walks viewers through the first ten practical steps after installing Kali Linux, emphasizing hands‑on reconnaissance rather than passive watching. It begins with Nmap, showing how to scan a local subnet (e.g., 192.168.0.0/24) on public Wi‑Fi, add fast‑scan flags,...

By Loi Liang Yang
SUED For Screenshotting Your TV (Every Second)
VideoDec 23, 2025

SUED For Screenshotting Your TV (Every Second)

The video spotlights a wave of Texas‑filed lawsuits accusing major smart‑TV manufacturers of covertly capturing a screenshot of whatever appears on the screen every second – a practice known as Automated Content Recognition (ACR). Brands such as Highense, LG,...

By Seytonic
7 Tips & Hacks for Ultimate Password Manager Security
VideoDec 17, 2025

7 Tips & Hacks for Ultimate Password Manager Security

The video, hosted by security expert Josh on All Things Secured, walks viewers through seven practical tips for hardening the use of any password manager, using Proton Pass as the demonstration platform. While the content is sponsored by Proton, the...

By All Things Secured
200 Million User Records... Breached
VideoDec 16, 2025

200 Million User Records... Breached

The video centers on a massive data breach affecting premium members of a streaming platform known as "the Hub," where a cyber‑criminal group called Shiny Hunters claims to have exfiltrated 94 GB of data comprising over 200 million user records. The stolen...

By Seytonic
HackTheBox - WhiteRabbit
VideoDec 13, 2025

HackTheBox - WhiteRabbit

The video walks viewers through the Hack The Box “WhiteRabbit” machine, beginning with a standard Nmap scan that reveals three open ports: SSH on 22, HTTP on 80 served by Caddy, and a secondary SSH on 2222 likely running inside...

By IppSec