Cybersecurity Videos

Techstrong TV - March 26, 2026
VideoMar 27, 2026

Techstrong TV - March 26, 2026

Day two of RSA Conference in San Francisco featured a high‑energy panel with leaders from Nvidia, Cerebras and Glean, moderated by security veteran Dr. Cheny Wang. The discussion centered on the rapid rise of agentic AI in the enterprise, highlighting...

By Techstrong TV (DevOps.com)
LLMs Solve Firmware Upgrade Chaos
VideoMar 26, 2026

LLMs Solve Firmware Upgrade Chaos

The video highlights how large language models (LLMs) are being deployed to untangle the notoriously chaotic process of firmware upgrades across diverse hardware ecosystems. Operators must first locate each device, determine its exact hardware revision, identify the firmware version it...

By Paul Asadoorian
Object First Honeypot Demo with Geoff Burke
VideoMar 26, 2026

Object First Honeypot Demo with Geoff Burke

Geoff Burke walked attendees through ObjectFirst’s built‑in honeypot demo, showcasing a turnkey security layer that lives inside the appliance yet remains isolated from production traffic. The feature is activated with two clicks in the Settings → Security menu, offering either a static...

By Tech Field Day
Why Object First Is Best for Veeam
VideoMar 26, 2026

Why Object First Is Best for Veeam

The video explains why Object First’s storage solution is positioned as the optimal backup target for Veeam customers, especially after Veeam’s recent acquisition of the startup. Founded by Veeam’s own co‑founders, Object First was built to address a glaring weakness:...

By Tech Field Day
Millions of Secrets Exposed - LiteLLM Compromised
VideoMar 26, 2026

Millions of Secrets Exposed - LiteLLM Compromised

The video details a supply‑chain breach affecting the open‑source Python library LightLLM. Versions 1.82.7 and 1.82.8 were published to PyPI with hidden malware that silently copies secrets from any system where the package is installed, giving attackers direct access to SSH keys,...

By Abhishek Veeramalla
Live at #RSAC 26 with James Stanger
VideoMar 26, 2026

Live at #RSAC 26 with James Stanger

James Stanger of CompTIA addressed the RSAC 2026 audience, outlining a three‑part framework he calls the cyber security AI trifecta. He emphasized that the first priority is safeguarding the AI models and data pipelines themselves, a step often overlooked as...

By Infosec Institute
Cyber Attacks In Business: Case Studies And Prevention Tips | Real Case Study Lessons | Simplilearn
VideoMar 26, 2026

Cyber Attacks In Business: Case Studies And Prevention Tips | Real Case Study Lessons | Simplilearn

The Simplilearn webinar framed cyber attacks as inevitable business crises, emphasizing that every organization will be targeted and must shift from a purely technical mindset to an enterprise‑wide preparedness strategy. Host Ana introduced the agenda—impact statistics, three real‑world case studies,...

By Simplilearn
Black Hat USA 2025 | Use and Abuse of Personal Information -- Politics Edition
VideoMar 26, 2026

Black Hat USA 2025 | Use and Abuse of Personal Information -- Politics Edition

The Black Hat USA 2025 presentation revealed a five‑year research project that generated 1,400 realistic fake voter identities to probe how political campaigns collect and use personal data during the 2024 election cycle. By automating sign‑ups for newsletters and phone lines, the...

By Black Hat
Black Hat USA 2025 | Smart Charging, Smarter Hackers: The Unseen Risks of ISO 15118
VideoMar 25, 2026

Black Hat USA 2025 | Smart Charging, Smarter Hackers: The Unseen Risks of ISO 15118

The Black Hat USA 2025 talk examined ISO 15118, the emerging standard that underpins smart‑charging and vehicle‑to‑grid (V2G) communication for electric vehicles. By allowing chargers to modulate demand and feed power back to the grid, the protocol promises to alleviate...

By Black Hat
When AI Starts Acting on Its Own...
VideoMar 25, 2026

When AI Starts Acting on Its Own...

At RSA, Cisco senior vice president Peter Bailey explained that zero‑trust security must evolve when the "identity" is an autonomous AI agent rather than a human user. He noted traditional zero‑trust assumes breach and relies on static credentials, but agents act at...

By Simply Cyber
Why Cisco Is Changing Firewalls FOREVER 🌐
VideoMar 25, 2026

Why Cisco Is Changing Firewalls FOREVER 🌐

At RSA, Cisco’s VP of Cloud and Network Security, Rick Miles, unveiled a radical redesign of the company’s firewall portfolio, emphasizing a shift toward a hybrid‑mesh architecture that distributes security functions across the entire network fabric. The announcement positions Cisco’s...

By Simply Cyber
Open Source SecurityCon | Closing Remarks - Brandt Keller & Constanze Roedig
VideoMar 25, 2026

Open Source SecurityCon | Closing Remarks - Brandt Keller & Constanze Roedig

The closing remarks of Open Source SecurityCon were delivered by co‑chairs Brandt Keller and Constanze Roedig, who thanked attendees, speakers, and the CNCF/OpenSF partnership that hosted the event. They emphasized the importance of the post‑event survey as a tool for...

By OpenSSF
Tarmageddon: One Bug, Four Forks, and a Disclosure Scavenger Hunt - Marina Moore & Alex Zenla, Edera
VideoMar 25, 2026

Tarmageddon: One Bug, Four Forks, and a Disclosure Scavenger Hunt - Marina Moore & Alex Zenla, Edera

The video recounts how Ada’s research team uncovered a severe parsing flaw in the Rust‑based asynchronous tar library Tokyo‑tar. The vulnerability, triggered by a malformed PAX header, caused the extractor to treat embedded data as a separate tar archive, allowing...

By OpenSSF
Lightning Talk: A Case Study in Cross-Ecosystem Security Response - Lori Lorusso, Rust Foundation
VideoMar 25, 2026

Lightning Talk: A Case Study in Cross-Ecosystem Security Response - Lori Lorusso, Rust Foundation

The Rust Foundation used a Lightning Talk to illustrate how cross‑ecosystem collaboration can harden open‑source supply‑chain security. Identified as a critical project by OpenSSF in 2022, Rust launched its Security Initiative, securing crates through threat modeling, ecosystem scanning, and trusted...

By OpenSSF
AI Expands the Scam Target Pool
VideoMar 25, 2026

AI Expands the Scam Target Pool

The video discusses how artificial intelligence is reshaping fraudulent schemes, allowing scammers to produce flawless, grammatically correct communications that mimic legitimate business correspondence. Historically, scammers relied on obvious errors—misspellings, broken grammar—to filter for the most gullible victims. With AI tools like...

By Paul Asadoorian
Are Data Centers the New Battlefield?
VideoMar 25, 2026

Are Data Centers the New Battlefield?

The video examines Iran’s recent publication of a list of 29 technology targets, which notably includes data‑center facilities operated by IBM, Amazon Web Services, Microsoft, Google and Palantir. This marks the first documented instance of a nation explicitly naming data...

By CSIS (Center for Strategic and International Studies)
Build This DevSecOps AI Agent Workflow and Sell It for $5k | No Coding
VideoMar 25, 2026

Build This DevSecOps AI Agent Workflow and Sell It for $5k | No Coding

In this tutorial Abhishek demonstrates how to construct a full‑stack DevSecOps AI workflow without writing a single line of code, leveraging the SIM.AI platform’s “mothership” prompt‑driven builder. The workflow is activated by a GitHub pull‑request webhook, extracts changed files, hands...

By Abhishek Veeramalla
When Virtual Machines Fail You
VideoMar 24, 2026

When Virtual Machines Fail You

The video warns that virtual machines are not a panacea for security; a malicious actor can break out of a VM and gain control of the underlying host. The speaker stresses that relying solely on a locally‑run virtual box or...

By Paul Asadoorian
Black Hat Asia 2026 Speaker Spotlight - Tal Be'ery
VideoMar 24, 2026

Black Hat Asia 2026 Speaker Spotlight - Tal Be'ery

Tal Be'ery returned to Black Hat Asia 2026 to spotlight a growing crisis: billions of WhatsApp users are exposed to newly uncovered flaws that allow strangers to hijack their devices. Leveraging the conference’s blend of cutting‑edge research and Singapore’s relaxed vibe, he framed the...

By Black Hat
Official Game Installs Malware
VideoMar 24, 2026

Official Game Installs Malware

The video warns that the indie title “Do at Night Abyss” was compromised in a supply-chain attack, delivering the UmbrellaStealer info‑stealer to unsuspecting players. The breach did not require any user click; the malicious payload was bundled with the game’s...

By The PC Security Channel
Your Attack Surface Just Expanded
VideoMar 24, 2026

Your Attack Surface Just Expanded

Security leaders are redefining the attack surface beyond traditional endpoints, incorporating identities, applications, cloud workloads, and even IoT devices into asset inventories. The video explains how modern security platforms—whether marketed as attack surface management or exposure management—are broadening the asset...

By Paul Asadoorian
Live From RSAC 2026: Cybersecurity Leaders, AI Threats & What’s Next
VideoMar 24, 2026

Live From RSAC 2026: Cybersecurity Leaders, AI Threats & What’s Next

RSAC 2026, the premier cybersecurity conference, is live from San Francisco’s Moscone Center March 23‑26. The event’s theme, “The Power of Community Starts with You,” frames discussions on AI security, threat detection, cloud protection, identity, and governance. A real‑time livestream...

By Techstrong TV (DevOps.com)
The New Doxxing Playbook (How to Protect Yourself)
VideoMar 24, 2026

The New Doxxing Playbook (How to Protect Yourself)

Josh and journalist Taylor Lorenz discuss the escalating threat of online harassment and doxxing. They explain how attackers compile personal data from public profiles, data‑broker sites, and social networks. The conversation offers practical defenses, including privacy‑removal services, strong authentication, and...

By All Things Secured
Allianz Risk Barometer 2026
VideoMar 24, 2026

Allianz Risk Barometer 2026

Allianz's 2026 Risk Barometer, now in its 15th year, surveyed over 3,300 risk professionals across nearly 100 countries and 23 sectors to rank the top ten global business threats. The report highlights how technology, geopolitics and regulation are increasingly interwoven,...

By Insurance Business TV World
The Hardest Part of Security
VideoMar 24, 2026

The Hardest Part of Security

The video tackles what the speaker calls the "hardest part of security" – remediation – within the broader context of proactive security programs. It outlines the traditional three‑step framework: identifying assets, gaining visibility, and then prioritizing risks based on the...

By Paul Asadoorian
Episode 4: From Fear to Framework: Building a Secure and Compliant AI Operating Model
VideoMar 24, 2026

Episode 4: From Fear to Framework: Building a Secure and Compliant AI Operating Model

The episode outlines a practical framework for CIOs and CISOs to secure AI deployments, moving beyond generic fear narratives. It details guardrails for large language models, methods to protect proprietary data, and a governance structure that meets compliance requirements. Viewers...

By CIO (Foundry)
Techstrong TV - March 24, 2026
VideoMar 24, 2026

Techstrong TV - March 24, 2026

The Techstrong TV episode highlighted a surge in quantum‑era threats, noting that “harvest now, decrypt later” attacks are accelerating as adversaries hoard encrypted data. Experts urged immediate adoption of quantum‑ready safeguards such as quantum random number generators, crypto‑agility, and scalable...

By Techstrong TV (DevOps.com)
Leading Without Burning Out Your Team - UNH
VideoMar 24, 2026

Leading Without Burning Out Your Team - UNH

The video addresses a common leadership dilemma: how to drive results without exhausting the workforce. The speaker, a senior manager at UNH, admits his own “foot stays on the gas” mentality and acknowledges the downstream stress it creates for his...

By This Week Health
How Call Recordings Can Become the Best Security Training - UNH
VideoMar 24, 2026

How Call Recordings Can Become the Best Security Training - UNH

In a recent UNH podcast, Steven Ramirez explains how healthcare organizations can repurpose call recordings as a powerful security‑training tool. By systematically reviewing real patient‑service interactions, teams identify common phishing cues, credential‑sharing mistakes, and policy violations. The approach blends compliance...

By This Week Health
Fighting AI with AI: PANW Chief SIO Talks Cybersecurity & Adjusting to Cyberattacks
VideoMar 23, 2026

Fighting AI with AI: PANW Chief SIO Talks Cybersecurity & Adjusting to Cyberattacks

At RSA 2026, Palo Alto Networks’ Chief Security Intelligence Officer Wendi Whitmore warned that AI‑powered cyber‑attacks are accelerating dramatically, with Unit 42 reporting a 400% year‑over‑year increase in attack speed—malicious actors can breach a network and exfiltrate data in under...

By Schwab Network
Why One-Time Pen Testing Isn’t Enough
VideoMar 23, 2026

Why One-Time Pen Testing Isn’t Enough

The video argues that traditional, once‑a‑year penetration testing is obsolete in today’s fast‑moving tech environment. Adrian emphasizes the shift toward continuous, offensive testing that mirrors real‑world attacks, providing organizations with up‑to‑date visibility into exploitable weaknesses. Key points include the need for...

By Paul Asadoorian
Black Hat USA 2025 | HTTP/1.1 Must Die! The Desync Endgame
VideoMar 23, 2026

Black Hat USA 2025 | HTTP/1.1 Must Die! The Desync Endgame

The Black Hat presentation titled “HTTP/1.1 Must Die! The Desync Endgame” warned that the fundamental design flaw in HTTP/1.1—its inability to reliably delineate where one request ends and the next begins—continues to enable powerful desynchronisation attacks. While many organisations have...

By Black Hat
🔴 Mar 27's Top Cyber News NOW! - Ep 1098
VideoMar 23, 2026

🔴 Mar 27's Top Cyber News NOW! - Ep 1098

Episode 1098 of the daily cyber briefing delivers the most relevant cybersecurity headlines for analysts, CISOs, and business leaders. It highlights ThreatLocker’s Zero Trust platform as a simple, deploy‑and‑manage solution. The show also promotes free or pay‑what‑you‑can training options from...

By Simply Cyber
Ethereum’s Quantum Plan Before Q-Day with Justin Drake
VideoMar 23, 2026

Ethereum’s Quantum Plan Before Q-Day with Justin Drake

The video discusses Ethereum's strategy to become post‑quantum secure before the anticipated Q‑Day, featuring cryptographer Justin Drake. Drake outlines recent quantum computing advances—error‑correction achieving logical qubits, algorithmic improvements cutting required physical qubits from millions to ~100,000, and massive VC funding—shifting quantum...

By David Hoffman
Why Your Cyber Risk Assessments Change Nothing (5 Fixes)
VideoMar 22, 2026

Why Your Cyber Risk Assessments Change Nothing (5 Fixes)

The video challenges the status quo of cyber risk assessments, arguing that most of today’s GRC practices produce heat maps and registers without influencing real business decisions. Steve McMichel deconstructs why risk management has become ritualistic, citing “risk theater” and...

By Simply Cyber
Black Hat USA 2025 | Peril at the Plug: Investigating EV Charger Security and Safety Failures
VideoMar 22, 2026

Black Hat USA 2025 | Peril at the Plug: Investigating EV Charger Security and Safety Failures

The Black Hat USA 2025 presentation titled “Peril at the Plug” examined the alarming security and safety gaps in electric‑vehicle (EV) chargers, drawing on findings from the PON (Pon Automotive) hacking contest. The speakers outlined the extensive attack surface—multiple CPUs,...

By Black Hat
Every Insane Hack in the 2026 Iran War (So Far)
VideoMar 22, 2026

Every Insane Hack in the 2026 Iran War (So Far)

The video catalogues a wave of cyber attacks that have accompanied the 2026 Iran‑Israel‑U.S. conflict, ranging from state‑run operations to hacktivist raids. It argues that the digital battlefield opened before any missiles hit Tehran, with the U.S. Cyber and Space...

By Seytonic
Black Hat USA 2025 | Hackers Dropping Mid-Heist Selfies
VideoMar 21, 2026

Black Hat USA 2025 | Hackers Dropping Mid-Heist Selfies

The Black Hat USA 2025 talk focused on a novel AI‑driven approach to dissecting “mid‑heist selfies” – screenshots harvested by information‑stealer malware. These malware families exfiltrate credentials, crypto wallets, password managers and system details without needing admin rights, then...

By Black Hat
HackTheBox - Conversor
VideoMar 21, 2026

HackTheBox - Conversor

The video walks through the Hack The Box "Conversor" machine, an ostensibly easy box that hides two distinct attack vectors. The target is a Flask‑based web application that accepts XML and XSLT files to generate HTML reports, while the underlying...

By IppSec
Revisiting RowHammer - Top Picks in Hardware and Embedded Security - Prof. Onur Mutlu - 30.10.2025
VideoMar 21, 2026

Revisiting RowHammer - Top Picks in Hardware and Embedded Security - Prof. Onur Mutlu - 30.10.2025

The talk revisits the seminal Rowhammer problem, presenting the 2020 "Revisiting Rowhammer" paper that conducted the largest experimental study to date on real DRAM chips. By testing roughly 1,600 devices from three major vendors across DDR3, DDR4, and LPDDR4 generations,...

By Onur Mutlu Lectures
What Is AWS MFA? ( Multi-Factor Authentication Explained )
VideoMar 20, 2026

What Is AWS MFA? ( Multi-Factor Authentication Explained )

The video introduces AWS Multi‑Factor Authentication (MFA) as a critical safeguard against credential compromise, explaining that a stolen username and password alone are insufficient when MFA is active. It outlines how MFA works: after entering standard credentials, users must supply a...

By KodeKloud
What Is an AWS IAM Policy?
VideoMar 20, 2026

What Is an AWS IAM Policy?

The video introduces AWS Identity and Access Management (IAM) policies as JSON‑formatted documents that explicitly allow or deny actions on AWS services and resources. It explains that policies can be highly granular—down to individual API calls such as “s3:CreateBucket” while denying...

By KodeKloud
IETF 125: Transport Layer Security (TLS) 2026-03-20 06:00
VideoMar 20, 2026

IETF 125: Transport Layer Security (TLS) 2026-03-20 06:00

The TLS Working Group wrapped up its IETF 125 session by reviewing several high‑priority items, notably the extended key‑update draft for TLS 1.3, a proposal to ban ephemeral key reuse, and ongoing liaison work on post‑quantum cryptography. Participants were reminded of...

By IETF
Meta Ending End to End on Instagram- Threat Wire
VideoMar 20, 2026

Meta Ending End to End on Instagram- Threat Wire

Meta announced it will retire the end‑to‑end encrypted (E2EE) direct‑message feature on Instagram, with the shutdown slated for May 8, 2026. The capability, introduced in 2021, saw minimal opt‑in rates, prompting the company to pull the option and steer privacy‑focused users toward...

By Hak5
How Secure by Design and Public Partnerships Drive Deterrence: A Conversation with Jen Easterly
VideoMar 20, 2026

How Secure by Design and Public Partnerships Drive Deterrence: A Conversation with Jen Easterly

The podcast features a deep‑dive conversation with Jen Easterly, former Army lieutenant colonel and current chief executive of the RSA Conference, about how secure‑by‑design engineering and public‑private partnerships shape U.S. cyber deterrence. Easterly recounts her early immersion in cyber while deployed...

By SANS Institute
Black Hat USA 2025 | Analyzing Smart Farming Automation Systems for Fun and Profit
VideoMar 19, 2026

Black Hat USA 2025 | Analyzing Smart Farming Automation Systems for Fun and Profit

The Black Hat USA 2025 talk examined the rapid rise of smart‑farming automation kits that retrofit conventional tractors with GPS‑guided steering, tablet HMI, and cloud‑connected services. The presenters, Felix and Bernhard, highlighted how inexpensive add‑on solutions—typically $5‑10 k—are being sold...

By Black Hat
Operation Winter SHIELD: FBI Philadelphia on Safeguarding the Communications Sector
VideoMar 19, 2026

Operation Winter SHIELD: FBI Philadelphia on Safeguarding the Communications Sector

Operation Winter Shield, the FBI’s Philadelphia field office, announced a focused initiative to protect the city’s communications infrastructure—a critical hub for the Northeast—by partnering with public and private entities to counter evolving cyber threats. The briefing highlighted four tactical priorities: enforcing...

By FBI
Black Hat USA 2025 | BitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secrets
VideoMar 19, 2026

Black Hat USA 2025 | BitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secrets

At Black Hat USA 2025, Microsoft’s Storm team unveiled “Bit Unlocker,” a proof‑of‑concept that abuses the Windows Recovery Environment (WinRE) to extract BitLocker keys and decrypt protected volumes. The researchers explained that WinRE runs from a separate recovery partition and loads...

By Black Hat
The FBI Experience Brief: Cybercrime
VideoMar 18, 2026

The FBI Experience Brief: Cybercrime

The FBI’s “Cybercrime” Experience Brief introduces visitors to the expanding threat landscape that accompanies today’s interconnected world, where everything from refrigerators to automobiles is network‑enabled. The presentation traces cybercrime’s evolution from early room‑sized computers—where vandalism and theft were primary concerns—to modern,...

By FBI