Cybersecurity Videos

Lecture 1.2.4B | AI, Cybersecurity & Real-Time Health Systems | Masters in Medical Entrepreneurship
VideoMar 10, 2026

Lecture 1.2.4B | AI, Cybersecurity & Real-Time Health Systems | Masters in Medical Entrepreneurship

The lecture explores how artificial intelligence, cybersecurity, and real‑time health technologies intersect to reshape modern medical entrepreneurship. It outlines the growing reliance on digital infrastructure—ranging from network protection to wearable sensors—and argues that AI‑driven solutions are essential for safeguarding sensitive...

By Universal Digital Health
Black Hat USA 2025 | Advanced Bypass Techniques and a Novel Detection Approach
VideoMar 10, 2026

Black Hat USA 2025 | Advanced Bypass Techniques and a Novel Detection Approach

The Black Hat USA 2025 presentation by Itai Ravia of AIM Security highlighted a growing crisis in AI supply‑chain security: third‑party models can execute malicious code during loading or inference, and back‑door inputs can be silently injected by model authors. Ravia explained that model...

By Black Hat
Black Hat USA 2025 | How Tree-of-AST Redefines the Boundaries of Dataflow Analysis
VideoMar 9, 2026

Black Hat USA 2025 | How Tree-of-AST Redefines the Boundaries of Dataflow Analysis

At Black Hat USA 2025, researchers presented Tree-of-AST, a novel dataflow-analysis approach that adapts tree-based generative reasoning techniques (inspired by Tree-of-Thoughts) to program ASTs to more effectively trace sources to sinks and reason about sanitizers. The presenters — including a...

By Black Hat
What Is the Trump Administration's Cybersecurity Strategy? | Asked & Answered
VideoMar 9, 2026

What Is the Trump Administration's Cybersecurity Strategy? | Asked & Answered

The White House unveiled the 2026 National Cyber Security Strategy, marking the Trump administration’s first comprehensive cyber policy since taking office. While the document is framed in distinctly Trump‑style rhetoric, its structure and six priority pillars echo the 2023 strategy...

By Center for Strategic & International Studies (CSIS)
Stop Credential Stealers With This
VideoMar 9, 2026

Stop Credential Stealers With This

The video addresses the growing threat of credential‑stealing malware and asks how organizations can both detect and neutralize such attacks before they compromise sensitive accounts. It emphasizes that many infections appear benign to end users, making proactive controls essential for...

By Paul Asadoorian
Understanding & Solving RowHammer - Flash Memory Summit 2023 - Prof. Onur Mutlu
VideoMar 9, 2026

Understanding & Solving RowHammer - Flash Memory Summit 2023 - Prof. Onur Mutlu

At the Flash Memory Summit 2023, Prof. Onur Mutlu presented a comprehensive overview of the RowHammer phenomenon affecting DRAM and emerging memory technologies. He traced the vulnerability’s origins, detailed recent experimental findings, and highlighted both hardware and software mitigation strategies....

By Onur Mutlu Lectures
CMMC Is Now In Contracts
VideoMar 9, 2026

CMMC Is Now In Contracts

The video announces that the Cybersecurity Maturity Model Certification (CMMC) has moved from draft status to an enforceable clause in U.S. defense contracts. After the final rule was published in November 2025, the Department of Defense began a phased, multi‑year...

By Paul Asadoorian
🔴 Mar 12's Top Cyber News NOW! - Ep 1087
VideoMar 8, 2026

🔴 Mar 12's Top Cyber News NOW! - Ep 1087

The episode delivers a concise daily roundup of the most pressing cybersecurity headlines, targeting analysts, insiders, and business leaders. It highlights ThreatLocker’s Zero Trust Platform as a streamlined ransomware defense solution. The video also promotes several free or pay‑what‑you‑can training...

By Simply Cyber
Black Hat USA 2025 | Digital Dominoes: Scanning the Internet to Expose Systemic Cyber Risk
VideoMar 8, 2026

Black Hat USA 2025 | Digital Dominoes: Scanning the Internet to Expose Systemic Cyber Risk

The Black Hat USA 2025 talk introduced a novel method for measuring systemic cyber risk, branding it as a "digital domino" problem where failures in a single vendor can topple entire industry chains. Morgani, head of cyber catastrophe modeling at...

By Black Hat
Black Hat USA 2025 | Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Apps
VideoMar 8, 2026

Black Hat USA 2025 | Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Apps

The Black Hat USA 2025 talk introduced MCAN, a novel framework for detecting taint‑style vulnerabilities in microservice‑structured web applications. The presenters highlighted how modern architectures replace monoliths with independent services behind a gateway, creating new attack surfaces where malicious input...

By Black Hat
Freddy Arthur - NICE Actimize - Money20/20 Europe
VideoMar 7, 2026

Freddy Arthur - NICE Actimize - Money20/20 Europe

At Money20/20 Europe, Freddy Arthur, EMEA Fraud Strategy Leader at NICE Actimize, discussed the firm’s 25‑year legacy in financial crime prevention. He highlighted the company’s multi‑layered fraud detection platform that blends internal, third‑party and identity risk data. Arthur emphasized continuous...

By FF News | Fintech Finance
HackTheBox - ExpressWay
VideoMar 7, 2026

HackTheBox - ExpressWay

The video walks through the Hack The Box "ExpressWay" machine, illustrating how a seemingly simple box can be compromised by leveraging old, overlooked vulnerabilities. The presenter starts with a UDP Nmap scan, discovers the IKE service on port 500, and uses...

By IppSec
Techstrong TV - March 6, 2026
VideoMar 7, 2026

Techstrong TV - March 6, 2026

TechStrong TV hosted Dennis Mandich, co‑founder and CTO of Crypt, to discuss the emerging quantum security landscape and the company’s inclusion in the Quantum Security 25 list. Mandich outlined his 20‑year intelligence background, the formation of the Quantum Economic Development...

By Techstrong TV (DevOps.com)
Black Hat USA 2025 | Reinventing Agentic AI Security With Architectural Controls
VideoMar 6, 2026

Black Hat USA 2025 | Reinventing Agentic AI Security With Architectural Controls

At Black Hat USA 2025, David Brockle III of NCC Group opened his briefing by framing AI security as a modern parallel to the early web’s reliance on firewalls. He argued that today’s AI guardrails function like statistical heuristics—useful but...

By Black Hat
Ransomware Before Windows Even Starts
VideoMar 6, 2026

Ransomware Before Windows Even Starts

The video demonstrates a proof‑of‑concept ransomware that infects a system at the bootloader level, allowing malicious code to execute before Windows even begins loading. By compromising the bootloader and bypassing Secure Boot, the attacker can establish a foothold that sidesteps...

By Paul Asadoorian
Data Security in the Age of AI: Proactive Strategies to Protect Your Most Valuable Assets
VideoMar 6, 2026

Data Security in the Age of AI: Proactive Strategies to Protect Your Most Valuable Assets

The webcast, led by Peter Sleven, senior information‑security manager at Bank of Ireland, examined how enterprises can safeguard data as AI adoption accelerates. Sleven framed data security as a prerequisite for successful AI projects and outlined a roadmap that spans...

By SANS Institute
Webinar: Security Analysis of Critical 5G Interface | 5G Security | Telecom Security | TelcoLearn
VideoMar 6, 2026

Webinar: Security Analysis of Critical 5G Interface | 5G Security | Telecom Security | TelcoLearn

The webinar, hosted by Telan’s Sanjay Kumar and delivered by telecom researcher Arpit, examined why 5G interface security must move from an optional add‑on to a built‑in requirement. It traced the evolution of 5G’s service‑based architecture, highlighted the critical...

By TelcoLearn
ThreatLocker CEO Told Me the Codename... Project Elephant
VideoMar 5, 2026

ThreatLocker CEO Told Me the Codename... Project Elephant

The video features ThreatLocker’s CEO previewing an upcoming product reveal, internally dubbed “Project Elephant.” The initiative follows the company’s recent success with zero‑trust endpoint protection, which now operates without generating alerts unless left in monitor mode. Key insights include the realization...

By Simply Cyber
Cybersecurity Careers: Cloud Security Engineer (7 of 9 Careers)
VideoMar 5, 2026

Cybersecurity Careers: Cloud Security Engineer (7 of 9 Careers)

The video spotlights the cloud security engineer track, emphasizing its distinct importance amid soaring demand for cloud expertise. Host Joe South outlines three career tiers—junior, senior, and lead—each with escalating responsibilities within an organization’s cloud defense posture. Junior engineers primarily monitor...

By Infosec Institute
Dem Lawmakers Press IRS CEO Frank Bisignano on the IRS-ICE Data-Sharing Agreement
VideoMar 5, 2026

Dem Lawmakers Press IRS CEO Frank Bisignano on the IRS-ICE Data-Sharing Agreement

Democratic lawmakers grilled IRS Chief Executive Frank Bisignano Thursday over a court‑ordered finding that the agency illegally shared confidential taxpayer data with Immigration and Customs Enforcement. The hearing focused on a staggering 42,695 instances where the IRS transferred immigration‑related information to...

By FedScoop
How Vyntra Keeps Real-Time Payments Fast and Safe
VideoMar 5, 2026

How Vyntra Keeps Real-Time Payments Fast and Safe

The video introduces Vyntra, a fintech startup focused on guaranteeing that real‑time payments are both instantaneous and secure. Co‑founder Joel explains the company’s mission to bridge two market gaps: monitoring payment‑speed service‑level agreements and preventing fraud or money‑laundering. Vyntra’s solution emerged...

By FF News | Fintech Finance
How Datavillage Uses AI to Accelerate Fraud Investigations
VideoMar 5, 2026

How Datavillage Uses AI to Accelerate Fraud Investigations

The video features a product‑owner from DataVillage speaking at the FF Tattoo Studio during Cypus 2025, introducing the company’s AI‑driven fraud‑investigation platform. DataVillage encrypts client data before feeding it to machine‑learning models, allowing multiple financial institutions to share information securely. The AI...

By FF News | Fintech Finance
Black Hat USA 2025 | Use and Abuse of Palo Alto's Remote Access Solution
VideoMar 5, 2026

Black Hat USA 2025 | Use and Abuse of Palo Alto's Remote Access Solution

The presentation examined Palo Alto’s GlobalProtect remote‑access solution, focusing on its split‑tunnel feature that lets administrators whitelist domains such as *.zoom.us to bypass the VPN. The speaker, a security engineer with pentesting background, demonstrated how the feature intertwines DNS resolution...

By Black Hat
Techstrong TV - March 5, 2026
VideoMar 5, 2026

Techstrong TV - March 5, 2026

AI-driven code assistants are delivering functional software faster, but security safeguards are lagging, prompting Endor Labs to launch a real‑time intelligence layer that vets open‑source models for AI‑induced vulnerabilities. Meanwhile, Xurrent highlights a shift in IT service management from reactive...

By Techstrong TV (DevOps.com)
LIVE: 🕵️ Memory Forensics | Blue Cape | Cybersecurity
VideoMar 5, 2026

LIVE: 🕵️ Memory Forensics | Blue Cape | Cybersecurity

The live TCM stream focused on memory forensics, walking viewers through a hands‑on analysis of a Windows 10 memory image using the open‑source Volatility framework. Hosted by a seasoned practitioner, the session drew from the Practical Windows Forensics course now hosted...

By The Cyber Mentor
Black Hat USA 2025 | Turning Camera Surveillance on Its Axis
VideoMar 5, 2026

Black Hat USA 2025 | Turning Camera Surveillance on Its Axis

At Black Hat USA 2025, Noam Moshe of Claroty Team82 exposed a critical flaw in Axis Communications’ Access Remoting protocol, the encrypted channel used by enterprises to manage fleets of IP cameras remotely. The protocol, built on MTLS and NLMSSP authentication,...

By Black Hat
A World Without Truth: Building TrustOps for the AI Era
VideoMar 4, 2026

A World Without Truth: Building TrustOps for the AI Era

The Gartner Thinkcast episode, hosted by Karen Stokes Lockhart, spotlights a looming "world without truth" where misinformation, disinformation, and the newer category of malinformation threaten every strategic decision. Dave Aaron quantifies the problem as a $1 trillion global risk—about 1% of...

By Gartner
Is the Apple App Store Safe?
VideoMar 4, 2026

Is the Apple App Store Safe?

The video examines whether the Apple App Store can be considered safe, outlining Apple’s pre‑release vetting process that scans every submitted app for malware, data stealers and viruses. Apple relies on an automated scanning system because manual review of millions of...

By PCWorld
Inside the FBI Podcast: Introducing Ahead of the Threat, Season Two
VideoMar 4, 2026

Inside the FBI Podcast: Introducing Ahead of the Threat, Season Two

The FBI Cyber Division announced the launch of Season 2 of its “Ahead of the Threat” podcast, hosted by cyber assistant director Brett Leatherman. The series will feature government and industry experts discussing the bureau’s cyber strategy, emerging threats, and practical...

By FBI
AI Is Supercharging Phishing
VideoMar 4, 2026

AI Is Supercharging Phishing

The video warns that artificial intelligence is dramatically amplifying phishing threats, turning what was once a low‑tech nuisance into a high‑precision weapon against corporate inboxes. By scraping publicly available data and social‑media profiles, AI can generate hyper‑personalized lures at minimal cost....

By Paul Asadoorian
"Humans Shouldn’t Blind-Sign Transactions" - Haseeb Qureshi
VideoMar 4, 2026

"Humans Shouldn’t Blind-Sign Transactions" - Haseeb Qureshi

Haseeb Qureshi, a prominent crypto investor, uses a vivid analogy to argue that the practice of manually blind‑signing blockchain transactions is as reckless as letting humans drive cars without assistance. He predicts that within a decade the industry will view...

By David Hoffman
Cloud Native Live: Kyverno — Battle-Tested Policy to Safeguard Production
VideoMar 4, 2026

Cloud Native Live: Kyverno — Battle-Tested Policy to Safeguard Production

Kyverno has matured into a battle‑tested policy engine for Kubernetes, with a year of enhancements and a broader umbrella of related projects on GitHub. The session showcases real‑world production adoption across diverse industries, highlighting new mutation, validation, and webhook capabilities....

By CNCF (Cloud Native Computing Foundation)
Revolutionizing Linux Maintenance with Update Scripts
VideoMar 4, 2026

Revolutionizing Linux Maintenance with Update Scripts

Paul outlines major upgrades to the update.sh script, now automating cache cleaning, package updates, and kernel management in a single workflow. He also unveils a new utility that scans Linux supply‑chain security and hardware configurations, reporting vulnerabilities and verifying package...

By Paul Asadoorian
2 Minute Drill: Accidentally Raising Your Own Robot Army with Drex DeFord
VideoMar 4, 2026

2 Minute Drill: Accidentally Raising Your Own Robot Army with Drex DeFord

The two‑minute drill highlighted a surprising IoT breach when a Spanish engineer, Sammy, discovered that a single authentication token could control roughly 7,000 robot vacuum cleaners worldwide. By reverse‑engineering the vacuum’s cloud API, Sammy found the token was not bound to...

By This Week Health
Alleged ICE, DHS Location Data Purchases Come Under Scrutiny of Democrats
VideoMar 4, 2026

Alleged ICE, DHS Location Data Purchases Come Under Scrutiny of Democrats

More than 70 House and Senate Democrats have urged the Department of Homeland Security’s inspector general to launch an investigation into alleged warrantless purchases of Americans’ location data by Immigration and Customs Enforcement. The inquiry will focus on the legality...

By FedScoop
Who’s Really in Control of AI?
VideoMar 4, 2026

Who’s Really in Control of AI?

Automation and AI-driven playbooks are reshaping IT and security operations, but ensuring humans stay in control remains a core governance challenge. Structured decision paths and predefined validation steps allow systems to operate within known routes, escalating to operators when encountering...

By Paul Asadoorian
Built-In Security for AI-Driven Networks
VideoMar 3, 2026

Built-In Security for AI-Driven Networks

The discussion centered on the necessity of embedding security directly into AI‑driven telecom networks, as illustrated by HPE’s new integrated telco portfolio unveiled at MWC. With AI increasing the volume of telemetry and the need for centralized training and edge inference,...

By TelecomTV
Minder: Policy-Based Control of Software Security | OpenSSF Project Spotlight
VideoMar 3, 2026

Minder: Policy-Based Control of Software Security | OpenSSF Project Spotlight

Minder, an OpenSSF initiative, provides continuous policy enforcement for software supply chains, monitoring repositories, releases and pull requests to maintain security compliance with minimal friction. The service defines policies, uses webhooks to detect drift, and automatically remediates violations via patches, comments...

By OpenSSF
Crypto Has Too Many Foot-Guns
VideoMar 3, 2026

Crypto Has Too Many Foot-Guns

The speaker argues that signing large crypto transactions feels far riskier than traditional wire transfers, highlighting a proliferation of hidden “foot‑guns” that users must manually spot. He enumerates specific hazards—address‑poisoning attacks, the need to verify middle characters of an address, stale...

By David Hoffman
Can LLMs Really Prioritize AppSec?
VideoMar 3, 2026

Can LLMs Really Prioritize AppSec?

The video questions whether large language models (LLMs) can effectively prioritize application security findings, contrasting them with established static analysis scanners. The speaker notes that LLM tools often generate high‑quality code suggestions but fall short on triaging vulnerabilities. Developers typically ignore...

By Paul Asadoorian
Black Hat USA 2025 | Lost & Found: The Hidden Risks of Account Recovery in a Passwordless Future
VideoMar 3, 2026

Black Hat USA 2025 | Lost & Found: The Hidden Risks of Account Recovery in a Passwordless Future

The Black Hat USA 2025 presentation warned that account‑recovery mechanisms—intended as a safety net for forgotten passwords—are rapidly becoming the most exploitable entry point in a passwordless ecosystem. Speakers Sidra, Gabby, and their research team outlined how recovery flows...

By Black Hat
They Stole Claude’s Brain 16 Million Times
VideoMar 3, 2026

They Stole Claude’s Brain 16 Million Times

The video details how a Chinese state‑sponsored group, identified as GTG 10002, hijacked Anthropic’s Claude—marketed as the world’s safest conversational AI—and repurposed it into an autonomous hacking engine. By falsely presenting the task as authorized defensive security testing, the attackers coaxed...

By NetworkChuck
Cybersecurity Standards Scorecard (2025 Edition)
VideoMar 3, 2026

Cybersecurity Standards Scorecard (2025 Edition)

The webcast, hosted by veteran SANS instructor James Troll, introduces the 2025 edition of the Cybersecurity Standards Scorecard – an annual research effort that catalogues and evaluates the growing universe of cyber‑security frameworks. Troll notes that the SANS database now...

By SANS Institute
🔴 Mar 3's Top Cyber News NOW! - Ep 1080
VideoMar 3, 2026

🔴 Mar 3's Top Cyber News NOW! - Ep 1080

Dr. Gerald Oer hosted Simply Cyber’s live daily threat brief (Episode 1080), walking viewers through eight top cyber stories in an unscripted format and applying two decades of industry experience to offer real-time insights. He emphasized the show’s value for...

By Simply Cyber
Techstrong TV - March 2, 2026
VideoMar 3, 2026

Techstrong TV - March 2, 2026

The RSA Conference 2026 celebrated its 35th anniversary, drawing over 43,000 cybersecurity professionals to discuss AI governance, quantum‑safe cryptography, and empathetic leadership. Dr. Aqib Rashid warned that unchecked agentic automation can magnify minor errors into large‑scale incidents, urging deterministic controls...

By Techstrong TV (DevOps.com)
An App That Detects Smart Glasses
VideoMar 2, 2026

An App That Detects Smart Glasses

An emerging app claims to alert users when smart glasses are nearby, scanning for Bluetooth Low Energy (BLE) advertisement frames emitted by devices such as Ray‑Band and Meta glasses. The tool relies on the brief BLE broadcast that occurs when the...

By Paul Asadoorian
Black Hat USA 2025 |  Pwning User Phishing Training Through Scientific Lure Crafting
VideoMar 2, 2026

Black Hat USA 2025 | Pwning User Phishing Training Through Scientific Lure Crafting

A new eight‑month field study of over 20,000 employees reveals that conventional phishing awareness training fails to meaningfully reduce click rates. The research, presented at Black Hat USA 2025, shows that the success of phishing lures is erratic, with some...

By Black Hat
Operation Winter SHIELD: FBI Philadelphia on Protecting the Transportation and Logistics Sector
VideoMar 2, 2026

Operation Winter SHIELD: FBI Philadelphia on Protecting the Transportation and Logistics Sector

The FBI’s Operation Winter Shield, a cyber‑resilience campaign, is spotlighting the transportation and logistics sector this week. The initiative underscores the critical role of freight corridors, ports, and warehousing in regional supply chains. FBI Philadelphia offers practical guidance on threat...

By FBI
Quantum-Safe Readiness: Operators Prepare for Q-Day
VideoMar 2, 2026

Quantum-Safe Readiness: Operators Prepare for Q-Day

Speakers at the Barcelona discussion warned that “Q-Day” — the point when quantum computers can break today’s encryption — is likely four to eight years away, and urged organizations to act now because adversaries are already harvesting data to decrypt...

By Fierce Network TV