Cybersecurity Videos

Long-Term Data Storage for Home Users
VideoApr 5, 2026

Long-Term Data Storage for Home Users

The video from explainingcomputers.com examines long‑term data storage options for home users, borrowing enterprise concepts of backup versus archive, and aims to guide individuals on preserving photos, videos, and legal documents. It reviews five media categories—internal/external HDDs, SSDs, USB/flash cards, writable...

By ExplainingComputers
Black Hat USA 2025 | Kernel-Enforced DNS Exfiltration Security
VideoApr 4, 2026

Black Hat USA 2025 | Kernel-Enforced DNS Exfiltration Security

The presentation by independent researcher Vang Parnes focuses on the growing threat of DNS‑based command‑and‑control (C2) and tunneling techniques targeting Linux systems, especially in cloud environments. He outlines why DNS is the favored back‑door for advanced persistent threats (APTs), citing...

By Black Hat
How to Find Out if Your Computer Is Part of a Botnet—And What to Do About It
VideoApr 4, 2026

How to Find Out if Your Computer Is Part of a Botnet—And What to Do About It

Off‑brand gadgets like streaming sticks or digital frames often arrive pre‑loaded with residential proxy software, a hidden tool that turns home routers into nodes of a massive botnet—over two million devices reported. The video warns shoppers to scrutinize unknown brands...

By Wall Street Journal (WSJ)
Black Hat USA 2025 | Burning, Trashing, Spacecraft Crashing
VideoApr 4, 2026

Black Hat USA 2025 | Burning, Trashing, Spacecraft Crashing

The Black Hat USA 2025 session, led by Mileno Star and Andre of Vision Space, highlighted the growing cyber‑risk landscape for space systems. With commercial constellations such as Starlink and OneWeb proliferating alongside renewed military satellite launches, the orbital environment now presents a...

By Black Hat
How Attackers Bypass MFA Today
VideoApr 4, 2026

How Attackers Bypass MFA Today

The video explains current techniques attackers use to defeat multi‑factor authentication (MFA), focusing on the AITM (Authentication‑In‑The‑Middle) attack and abuse of the device‑code OAuth flow. In the AITM scenario, threat actors intercept the Microsoft identity API response, extract the one‑time MFA...

By Paul Asadoorian
Techstrong TV - April 3, 2026
VideoApr 4, 2026

Techstrong TV - April 3, 2026

At RSAC, Techstrong’s host sat down with longtime security analyst Rich Vogle to discuss his recent move to the Cloud Security Alliance (CSA) as chief analyst. The conversation centered on Vogle’s new mandate: expanding CSA’s reach beyond vendors to serve...

By Techstrong TV (DevOps.com)
Black Hat USA 2025 | Universal and Context-Independent Triggers for Precise Control of LLM Outputs
VideoApr 4, 2026

Black Hat USA 2025 | Universal and Context-Independent Triggers for Precise Control of LLM Outputs

The Black Hat presentation introduced a novel class of prompt‑injection attacks called universal adversarial triggers, which allow attackers to hijack large language model (LLM) outputs with a single, reusable token sequence. By decoupling the malicious payload from the trigger,...

By Black Hat
NPM Axious Hack: Popular Applications Potentially Infected by a RAT?
VideoApr 3, 2026

NPM Axious Hack: Popular Applications Potentially Infected by a RAT?

The video examines a recent supply‑chain compromise of the widely‑used NPM package Axios, which was hijacked to distribute a remote‑access tool (RAT) that briefly infected an estimated 100 million computers. The malicious payload is delivered in three platform‑specific variants—a Windows PowerShell script,...

By The PC Security Channel
Handing Over The Keys to Your Kingdom: AI-Driven Security Woes
VideoApr 3, 2026

Handing Over The Keys to Your Kingdom: AI-Driven Security Woes

The video warns that AI agents and DevSecOps tools, despite holding extensive permissions, suffer from weak oversight, creating a "credential‑drift" crisis. Recent supply‑chain attacks have compromised popular utilities such as Trivy, Axios, LiteLLM, OpenAI Codex, and Claude Code. The speaker...

By OpenSSF
When Vendors Skip Linux Support
VideoApr 3, 2026

When Vendors Skip Linux Support

The video discusses why many hardware vendors choose not to provide Linux drivers, contrasting the open‑source freedoms of Linux with the practical challenges users face when support is absent. The speaker emphasizes that Linux’s free, modifiable nature—often described as “Libre” or...

By Paul Asadoorian
Practical Security for AI-Generated Code
VideoApr 3, 2026

Practical Security for AI-Generated Code

Milan Williams, product manager at Segrep, opened the session by warning that AI‑driven code generators are no longer limited to single‑line suggestions; they now produce thousands of lines of code and execute shell commands with elevated credentials. He framed the...

By MLOps Community
AI Configures Vulnerabilities for You
VideoApr 2, 2026

AI Configures Vulnerabilities for You

Claude, Anthropic’s large language model, is being used to automate the configuration of vulnerable instances across a range of security appliances—SonicWall, Fortinet, F5, Citrix—so analysts can focus on testing rather than manual setup. The speaker demonstrates asking Claude to “enable”...

By Paul Asadoorian
From Gut to Gold Standard: The Admiralty System in CTI
VideoApr 2, 2026

From Gut to Gold Standard: The Admiralty System in CTI

The presentation introduces the Admiralty Scale, a century‑old British Navy framework, as a rigorous method for evaluating source credibility and information reliability in cyber threat intelligence (CTI). Freddy argues that modern CTI suffers from opaque reporting, unverified claims, and bias,...

By SANS Digital Forensics and Incident Response
Hunting North Korea’s Contagious Interview Operation
VideoApr 2, 2026

Hunting North Korea’s Contagious Interview Operation

The presentation by senior threat analyst Kir Boyenko details North Korea’s state‑sponsored “contagious interview” campaign, which masquerades as recruiter outreach, test assignments, or take‑home exams to trick developers into executing malicious code. By targeting open‑source ecosystems—primarily npm, but also Python,...

By SANS Digital Forensics and Incident Response
Black Hat Stories | Or Yair, Security Research Team Lead at SafeBreach
VideoApr 2, 2026

Black Hat Stories | Or Yair, Security Research Team Lead at SafeBreach

Ori Yair, security research team lead at SafeBreach, reflects on his Black Hat experiences, from his first nerve‑wracking speaking slot to his ongoing focus on Windows‑based vulnerability research. He frames the conference as a catalyst for turning technical curiosity into...

By Black Hat
Does DNSSEC Give You Encrypted DNS?
VideoApr 2, 2026

Does DNSSEC Give You Encrypted DNS?

The video clarifies a common misconception: DNSSEC does not provide encrypted DNS traffic. Instead, it adds cryptographic signatures to DNS resource records, allowing resolvers to verify that the data originated from the authoritative source and has not been altered. Implementing DNSSEC...

By David Bombal
🔴 Apr 2's Top Cyber News NOW! - Ep 1102
VideoApr 2, 2026

🔴 Apr 2's Top Cyber News NOW! - Ep 1102

The episode’s headline story is Apple’s unexpected decision to back‑port a security fix for iOS 18, targeting the Darksword exploit that silently hijacks iPhones through compromised web pages. While Apple typically forces users onto the latest OS to streamline development, the...

By Simply Cyber
Black Hat USA 2025 | Ghost Calls: Abusing Web Conferencing for Covert Command & Control
VideoApr 1, 2026

Black Hat USA 2025 | Ghost Calls: Abusing Web Conferencing for Covert Command & Control

The Black Hat USA 2025 talk introduced “ghost calls,” a technique that hijacks commercial web‑conferencing platforms to create covert, short‑term command‑and‑control (C2) channels. Presenter Adam Crosser explained that traditional C2 methods—socks proxies, long‑term implants, or peer‑to‑peer tunnels—often suffer from latency,...

By Black Hat
No More Routers In The US - Threat Wire
VideoApr 1, 2026

No More Routers In The US - Threat Wire

The episode covers a wave of supply‑chain compromises by the threat actor known as Team PCP, alongside a sweeping FCC decision to ban foreign‑made consumer routers and a scandal involving compliance startup Delve. Alli Diamond walks through each incident, highlighting...

By Hak5
They're Selling Your Address to ICE Right Now
VideoApr 1, 2026

They're Selling Your Address to ICE Right Now

The video exposes a hidden industry that aggregates billions of personal data points—addresses, income, vehicle registrations, health conditions, and even ethnicity—into commercial dossiers sold to private litigators, debt collectors, and government agencies. Platforms such as Thomson Reuters Clear, LexisNexis Accurant,...

By Lawful Masses with Leonard French
David Brin on Agentic AI, Accountability and the Fight Ahead
VideoApr 1, 2026

David Brin on Agentic AI, Accountability and the Fight Ahead

David Brin, celebrated sci‑fi author and AI thinker, opened a session at RSAC by framing today’s AI surge as an evolutionary leap. He contrasted the historic symbolic‑logic path to artificial general intelligence with the rapid ascendancy of large language models...

By Techstrong TV (DevOps.com)
Why Vector Databases Are Becoming an AI Security Blind Spot | Nicolas Dupont of Cyborg
VideoApr 1, 2026

Why Vector Databases Are Becoming an AI Security Blind Spot | Nicolas Dupont of Cyborg

At RSA 2024, Nicolas Dupont of Cyborg warned that vector databases—core to enterprise AI inference—are becoming a hidden security blind spot as organizations centralize proprietary data for retrieval. He explained that vector databases operate on raw embeddings in plaintext because distance...

By Techstrong TV (DevOps.com)
Black Hat USA 2025 | Practical Attacks on Nostr, a Decentralized Censorship-Resistant Protocol
VideoApr 1, 2026

Black Hat USA 2025 | Practical Attacks on Nostr, a Decentralized Censorship-Resistant Protocol

The Black Hat USA 2025 session, led by HKuma of NICT Japan, examined practical attacks on Nostr, a decentralized, censorship‑resistant social networking protocol. The talk highlighted how Nostr shifts trust to client devices, eliminating central servers, and presented the researchers’...

By Black Hat
Course Overview - Web Security
VideoApr 1, 2026

Course Overview - Web Security

The video introduces Stanford’s advanced cyber‑security program, co‑directed by Neil Dwani with professors Dan Bonet and Zakir Demerich, to train professionals in defending web applications against today’s most damaging threats. It positions the course as essential for anyone who builds,...

By Stanford Online
Why Hide My Email FAILS
VideoApr 1, 2026

Why Hide My Email FAILS

The video examines Apple’s claim of being a privacy‑first company against a recent court filing that shows the tech giant handed the FBI the real iCloud address behind its “Hide My Email” feature. The disclosure occurred during an investigation of...

By David Bombal
Black Hat USA 2025 | Uncovering and Responding to the Tj-Actions Supply Chain Breach
VideoApr 1, 2026

Black Hat USA 2025 | Uncovering and Responding to the Tj-Actions Supply Chain Breach

The presentation detailed a supply‑chain breach that hit the popular TJ‑actions/change‑files GitHub Action. On March 14, an automated alert flagged an unexpected outbound request, leading the Step Security team to discover that the action’s release tags had been repointed to a...

By Black Hat
Executive Interview: Securing Healthcare's Hidden Attack Surface with James Winebrenner
VideoApr 1, 2026

Executive Interview: Securing Healthcare's Hidden Attack Surface with James Winebrenner

In this Unhack executive interview, Drex Deford sits down with James Weinbrenner, co‑founder of Elicity, to discuss the company’s approach to securing the hidden attack surface that pervades modern healthcare environments. Weinbrenner outlines how Elicity leverages an identity‑graph platform to...

By This Week Health
Millions of JS Devs Just Got Penetrated by a RAT…
VideoMar 31, 2026

Millions of JS Devs Just Got Penetrated by a RAT…

The video reports a supply‑chain breach affecting the popular JavaScript HTTP client Axios, where two malicious versions were uploaded to the npm registry, embedding a precision‑guided remote access Trojan (RAT). The attack inserts a rogue dependency called plain‑crypto‑js that runs a...

By Fireship
AI Cyber Defense Ops Course Launch!
VideoMar 31, 2026

AI Cyber Defense Ops Course Launch!

Just Hacking Training used a livestream to unveil a new AI Cyber Defense Ops course led by instructor Anton, spotlighting practical blue-team techniques that incorporate AI tools like Claude. The platform emphasized its hands-on, affordable model—on-demand labs, free and extended...

By John Hammond
Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn
VideoMar 31, 2026

Ethical Hacking Full Course 2026 [FREE] | Ethical Hacking Tutorial For Beginners | Simplilearn

The video introduces Simplilearn’s Certified Ethical Hacker (CEH) v13 program, positioning it as a response to the staggering frequency of cyber attacks—one every 39 seconds—and the growing demand for skilled security professionals. It outlines the course’s structure, from foundational modules...

By Simplilearn
FireMon Brings Clarity to Firewall Rule Chaos (Sponsored)
VideoMar 31, 2026

FireMon Brings Clarity to Firewall Rule Chaos (Sponsored)

The sponsored episode of Packet Protector spotlights FireMon, a policy‑control platform that aims to tame the growing chaos of firewall rules across on‑prem, cloud and micro‑segmentation environments. Jody Brazil explains that while firewalls have evolved—from ACLs to application‑aware and native cloud...

By Packet Pushers
The WORST Hack of 2026
VideoMar 31, 2026

The WORST Hack of 2026

The video exposes what the creator calls the "worst hack of 2026," a supply‑chain breach of the popular JavaScript HTTP library Axios. An attacker seized the lead maintainer’s long‑lived npm token, altered the package’s package.json to add a single‑line dependency that...

By NetworkChuck
Black Hat USA 2025 | More Flows, More Bugs: Empowering SAST with LLMs and Customized DFA
VideoMar 31, 2026

Black Hat USA 2025 | More Flows, More Bugs: Empowering SAST with LLMs and Customized DFA

The Black Hat USA 2025 talk, presented by Yuan of Tencent Security Winding Lab, detailed a novel approach to strengthening static application security testing (SAST) by marrying large language models (LLMs) with a customized data‑flow analysis (DFA) engine. The session...

By Black Hat
Can Small LLMs Solve Security Flaws?
VideoMar 31, 2026

Can Small LLMs Solve Security Flaws?

The video examines whether compact language models can address the security vulnerabilities that plague larger AI systems, citing an OpenAI paper that claims small models can be engineered to never hallucinate. It argues that eliminating hallucinations would make it easier...

By Paul Asadoorian
HOW the NSA Monitors Your VPN
VideoMar 31, 2026

HOW the NSA Monitors Your VPN

The video highlights growing concerns that commercial VPN use may expose Americans to NSA surveillance, prompting six Democratic lawmakers to request clarification from the Director of National Intelligence about whether VPN users lose constitutional protections against warrantless spying. It explains that...

By David Bombal
Utility Resilience And Security I CIO Talk Network
VideoMar 30, 2026

Utility Resilience And Security I CIO Talk Network

The CIO Talk Network episode spotlights utility resilience and security, featuring Ma Chamari, CMS Energy’s vice‑president and chief information officer. The conversation frames the smart‑grid rollout as a catalyst for new physical and cyber threats that utilities must confront. Chamari identifies three...

By CIO Talk Network
AWS AI Practitioner Question 32
VideoMar 30, 2026

AWS AI Practitioner Question 32

The video addresses an AWS AI Practitioner exam scenario where a company builds a customer‑support chatbot on Amazon Bedrock and must block unrelated topics, profanity, and prompt‑injection attempts. It highlights the need for a safety mechanism that can enforce content...

By KodeKloud
Newsday: Hackers Outpace Healthcare Resilience and Surviving a Merger with Drex and Bill
VideoMar 30, 2026

Newsday: Hackers Outpace Healthcare Resilience and Surviving a Merger with Drex and Bill

The episode centers on the looming Sutter‑Alina merger and a recent wave of cyber‑attacks, using the two topics to illustrate how health‑system consolidation and security resilience intersect. Bill Russell and Drex unpack the practical realities of merging two large providers,...

By This Week Health
Security Engineer Roadmap 2026 | How To Become A Security Engineer In 2026 | #Shorts | #Simplilearn
VideoMar 28, 2026

Security Engineer Roadmap 2026 | How To Become A Security Engineer In 2026 | #Shorts | #Simplilearn

The video outlines a step‑by‑step career roadmap for aspiring DevOps engineers targeting the 2026 job market, emphasizing that demand for these roles is surging globally according to Statista data. It argues that beginners should first master foundational infrastructure skills—Linux command...

By Simplilearn
What Are You Giving Up?
VideoMar 28, 2026

What Are You Giving Up?

The video stresses the importance of pausing and breathing before entering any transaction, urging viewers to engage their critical faculties rather than reacting impulsively. It frames decision‑making as a moment to assess not just price tags but the broader price...

By Paul Asadoorian
Windows 10 Is Gone - Upgrade, Switch, or Get Hacked?
VideoMar 28, 2026

Windows 10 Is Gone - Upgrade, Switch, or Get Hacked?

The video warns that Microsoft officially ended support for Windows 10 on October 14, 2025, meaning the operating system will no longer receive security patches or bug fixes. The creator emphasizes that while many users still run Windows 10—roughly half of a surveyed 200‑plus...

By Chris Titus Tech
Spot Scam Red Flags Fast
VideoMar 27, 2026

Spot Scam Red Flags Fast

The video centers on practical tips for spotting common scam warning signs, aimed at consumers who encounter suspicious offers online or via phone. Speakers emphasize that offers that appear “too good to be true,” especially steep discounts such as 90% off,...

By Paul Asadoorian
Live From #RSAC 📍 The Future of Human Risk Is Here — Defending Against Scattered Spider Type Attacks
VideoMar 27, 2026

Live From #RSAC 📍 The Future of Human Risk Is Here — Defending Against Scattered Spider Type Attacks

At RSA, Kitron and Theo highlighted the emerging “human risk” landscape, focusing on Scattered Spider‑type attacks that blend email phishing, phone calls, SMS and deep‑fake visual lures. They explained that adversaries are increasingly leveraging omni‑channel social engineering, using AI‑generated deep‑fakes to...

By Infosec Institute
Cyber Week 2026 Wrap Up with Palo Alto Networks: Agents, Prisma AIRS and NGTS (Sponsored)
VideoMar 27, 2026

Cyber Week 2026 Wrap Up with Palo Alto Networks: Agents, Prisma AIRS and NGTS (Sponsored)

The podcast recaps Palo Alto Networks’ RSA 2026 announcements, spotlighting AI‑security guidance and the launch of Next‑Gen Trust Security (NGTS). Executives Ian Swanson and Rich Kana explain why enterprises must secure AI models, agents, and skills throughout the supply chain and...

By Packet Pushers
Upgrade Now!
VideoMar 27, 2026

Upgrade Now!

Apple has issued an urgent iOS 26.4 update for iPhone 11 and newer models, citing 37 critical security flaws that could allow remote compromise. The patch addresses six WebKit vulnerabilities that enable cross‑site scripting, a full‑chain “Dark Sword” exploit leveraging multiple...

By David Bombal
Drex Drill 20260324
VideoMar 27, 2026

Drex Drill 20260324

The video highlights the recent takedown of Hendala, an Iranian‑backed hacking group, by the FBI and Department of Justice after its wiper attack on medical‑technology firm Striker. The operation removed the group’s public‑facing websites, which serve as a propaganda and...

By This Week Health
Key Trends Shaping Modern Information Security (5 Minutes)
VideoMar 27, 2026

Key Trends Shaping Modern Information Security (5 Minutes)

The five‑minute briefing outlines the most consequential trends reshaping information security, from service‑based ransomware to evolving regulatory pressures, and explains why organizations must rethink traditional defenses. It highlights ransomware‑as‑a‑service democratizing attacks, the explosion of insecure IoT endpoints, the shift toward zero‑trust...

By BioTech Whisperer
Black Hat USA 2025 | Evaluating Autonomous Vehicle Resilience
VideoMar 27, 2026

Black Hat USA 2025 | Evaluating Autonomous Vehicle Resilience

The Black Hat USA 2025 presentation from Zuks engineers focused on the resilience of autonomous‑driving vehicles through a human‑in‑the‑loop teleoperation model. Jan Hu and Shane Gupta explained how a remote operator can intervene when the AI’s confidence drops, sending waypoint...

By Black Hat
The Cold Wallet Myth
VideoMar 27, 2026

The Cold Wallet Myth

The video titled "The Cold Wallet Myth" argues that the conventional wisdom of securing crypto with a single hardware wallet and a 24‑word seed is dangerously flawed. It opens with a UK case where a man allegedly lost $176 million because...

By Coin Bureau