Cybersecurity Videos

MWC26: Why Trust Is Key for KPN
VideoMar 2, 2026

MWC26: Why Trust Is Key for KPN

At MWC26 KPN CSO Benji Curtsy said the carrier is on track with its ‘connect, activate, grow’ plan launched in late 2024, hitting €5.8bn in service revenues, roughly €2.66bn in EBITDA and about €950m in free cash flow by end-2025...

By TelecomTV
🔴 Mar 2's Top Cyber News NOW! - Ep 1079
VideoMar 2, 2026

🔴 Mar 2's Top Cyber News NOW! - Ep 1079

The episode of Simply Cyber’s daily cyber threat brief aired March 2, 2026, blending community interaction, sponsor shout‑outs, and a roundup of the day’s top cyber‑security headlines. The headline news included the abrupt removal of Gotham Malla as CISA director, with...

By Simply Cyber
The MCP Security Risks You Can't Afford to Ignore
VideoMar 2, 2026

The MCP Security Risks You Can't Afford to Ignore

MCPTotal CTO Ariel Shiftan warned that MCP (Model Connector Protocol) servers—tools that let LLMs access private APIs and data—pose serious enterprise security risks. His team has discovered zero-day vulnerabilities in widely used MCP servers and routinely finds malicious or highly...

By Tech Lead Journal
How Does RPKI Help with Routing Security?
VideoMar 2, 2026

How Does RPKI Help with Routing Security?

The video explains that the Border Gateway Protocol (BGP), the Internet’s routing backbone, was designed without security features, allowing any autonomous system to announce any IP prefix and creating a systemic vulnerability. It introduces the Resource Public Key Infrastructure (RPKI) as...

By RIPE NCC
Why Is a WAF No Longer Enough?
VideoMar 1, 2026

Why Is a WAF No Longer Enough?

Enterprises are discovering that traditional Web Application Firewalls (WAFs) no longer provide sufficient protection against today’s complex threat landscape. The video explains that a WAF, originally designed to filter malicious HTTP traffic, is an outdated term as application security now...

By David Bombal
Physical Partitioning Is a Real Security Strategy for OpenClaw Agents
VideoFeb 28, 2026

Physical Partitioning Is a Real Security Strategy for OpenClaw Agents

The video explains a security‑first approach to managing OpenClaw agents by physically partitioning their access and responsibilities. The creator has instantiated multiple agents—Sylvie for homeschooling content and Finn for accounting—each confined to its own “family vault,” ensuring that data never...

By How I AI
Black Hat USA 2025 | If Google Uses It to Find Webpages, We Can Use It to Find Fraudsters
VideoFeb 28, 2026

Black Hat USA 2025 | If Google Uses It to Find Webpages, We Can Use It to Find Fraudsters

The session at Black Hat USA 2025 introduced a surprisingly simple technique—term‑frequency inverse‑document‑frequency (TF‑IDF)—as a powerful tool for spotting fraudsters, positioning it as an alternative to the sophisticated AI browsers and agents that dominate today’s web search. Speakers argued that generative...

By Black Hat
Compliant or Facing Federal Fines
VideoFeb 28, 2026

Compliant or Facing Federal Fines

The video warns government contractors that false claims about cybersecurity compliance can trigger severe penalties under the False Claims Act, especially as the Department of Defense’s CMMC framework becomes contractually mandatory. In 2025, whistleblower‑driven actions resulted in $6.8 billion in fines across...

By Paul Asadoorian
HackTheBox - Guardian
VideoFeb 28, 2026

HackTheBox - Guardian

The HackTheBox "Guardian" walkthrough demonstrates a full‑stack penetration test, starting with network scanning and sub‑domain discovery that revealed a default credential (GU1234). Attackers leveraged FFUF to brute‑force accounts, accessed a chat feature, and uncovered a Gitea instance where the public...

By IppSec
Techstrong TV - February 27, 2026
VideoFeb 28, 2026

Techstrong TV - February 27, 2026

Techstrong TV featured Nikquille Hondigal, co‑founder and Chief AI Officer of Forward Networks, to discuss the company’s evolution from a software‑defined networking (SDN) startup to an AI‑enabled network operations provider. Founded twelve years ago by Stanford PhDs, Forward Networks has...

By Techstrong TV (DevOps.com)
Phone Travel Safety
VideoFeb 27, 2026

Phone Travel Safety

The video addresses a common concern for travelers: keeping a smartphone secure while on the road. It emphasizes that the simplest line of defense is to rely on the carrier’s 4G/5G network rather than public Wi‑Fi, and to employ a...

By PCWorld
Patch and Threat Hunt Immediately
VideoFeb 27, 2026

Patch and Threat Hunt Immediately

The video warns of a newly disclosed vulnerability in Cisco’s Catalyst SD‑WAN controller and manager that grants unauthenticated attackers full administrative rights. Rated a perfect 10 on severity, the flaw has been weaponized for three years and may already reside...

By Simply Cyber
Black Hat USA 2025 | Let LLM Learn: When Your Static Analyzer Actually 'Gets It'
VideoFeb 27, 2026

Black Hat USA 2025 | Let LLM Learn: When Your Static Analyzer Actually 'Gets It'

The Black Hat presentation explored how large language models (LLMs) can be fused with traditional static analysis tools to create a new generation of vulnerability scanners. The speaker outlined three integration patterns—AI‑enhanced, where a static scanner filters LLM output; AI‑explorer,...

By Black Hat
Investing in Results
VideoFeb 27, 2026

Investing in Results

At GDIT Emerge, Dr. Kelly Fletcher, the State Department’s CIO, highlighted how government agencies can truly invest in results. She cited a year of milestones, including the rollout of generative AI tools, a broader online passport‑renewal platform, and strengthened cybersecurity...

By FedScoop
Optimizing Cloud at Scale: Speed, Security & Mission Impact
VideoFeb 27, 2026

Optimizing Cloud at Scale: Speed, Security & Mission Impact

At a GDIT Emerge event, CMS CIO Patrick Newbold detailed how the agency is scaling a secure hybrid cloud to deliver always‑on services for millions of Americans. The agency now builds new capabilities in weeks rather than years, emphasizing speed,...

By FedScoop
GT Fast5: $160B in Government Tech Spending Ahead — Are States Ready? #Accessibility #AI #Shorts
VideoFeb 27, 2026

GT Fast5: $160B in Government Tech Spending Ahead — Are States Ready? #Accessibility #AI #Shorts

The video outlines a looming $160.2 billion federal IT spend in 2026, highlighting an April deadline for states to make all websites and apps accessible to people with disabilities. It frames the spending surge as part of a broader push to...

By Government Technology (GovTech Magazine)
🔴 Feb 27's Top Cyber News NOW! - Ep 1078
VideoFeb 27, 2026

🔴 Feb 27's Top Cyber News NOW! - Ep 1078

Episode 1078 of the "Top Cyber News NOW!" series delivers a concise daily roundup of the most pressing cybersecurity stories for analysts, insiders, and business leaders. The episode highlights emerging ransomware threats, zero‑trust solutions, and new training opportunities. It also promotes...

By Simply Cyber
ContinuumCon Prep (with Greg Ake!)
VideoFeb 27, 2026

ContinuumCon Prep (with Greg Ake!)

ContinuumCon is a newly‑minted virtual cybersecurity conference that flips the traditional lecture‑heavy format on its head, delivering fully hands‑on workshops where attendees work directly with presenters in real time. The event is organized by Greg Ake of Level Effect...

By John Hammond
H?ckers A[r]e Gl*bbing
VideoFeb 27, 2026

H?ckers A[r]e Gl*bbing

The video introduces LOLGlobs, a community‑driven repository that catalogs wildcard‑based command‑line obfuscation techniques for Linux, macOS, Windows CMD, and PowerShell. Originating from a security‑operations Slack channel and authored by HexV1N at ReliaQuest, the project builds on earlier efforts like Argfuscator...

By John Hammond
Thousands of Google API Keys Exposed
VideoFeb 26, 2026

Thousands of Google API Keys Exposed

A recent investigation uncovered thousands of Google API keys publicly exposed in code repositories and configuration files. While Google historically treated API keys as non‑secret identifiers, the launch of Gemini’s AI services now allows those keys to access billable resources,...

By John Hammond
Techstrong TV - February 25, 2026
VideoFeb 26, 2026

Techstrong TV - February 25, 2026

Techstrong TV hosted Darren Williams, founder and CEO of Blackfog, to discuss the company’s origin, its endpoint‑focused anti‑exfiltration technology, and the firm’s annual State of Ransomware 2025 report ahead of RSA. Williams explained that traditional data‑loss‑prevention tools falter because they sit...

By Techstrong TV (DevOps.com)
Age of Deception: Cybersecurity as Secret Statecraft
VideoFeb 26, 2026

Age of Deception: Cybersecurity as Secret Statecraft

Jon R. Lindsay will present his new book, Age of Deception: Cybersecurity as Secret Statecraft, at a Wednesday seminar. The work frames contemporary cyber threats within the long‑standing practices of intelligence and statecraft. Lindsay argues that modern cybersecurity is an...

By MIT Security Studies Program
Black Hat USA 2025 | Conjuring Hardware Failures to Breach CPU Privilege Boundaries
VideoFeb 25, 2026

Black Hat USA 2025 | Conjuring Hardware Failures to Breach CPU Privilege Boundaries

The Black Hat talk spotlights machine‑check exceptions (MCEs) – hardware‑level fault signals that fire when a CPU detects catastrophic errors such as cache corruption, thermal trips, or external interference. Christopher Domas demonstrates that, unlike ordinary interrupts, MCEs cannot be masked,...

By Black Hat
Patch THIS Vulnerability in 10 Seconds
VideoFeb 25, 2026

Patch THIS Vulnerability in 10 Seconds

A critical Chrome zero‑day vulnerability is being actively exploited in the wild, and Google has released an emergency patch. The flaw, a use‑after‑free bug in Chrome’s rendering engine, allows attackers to execute arbitrary code simply by getting a user to...

By Simply Cyber
🔴 Mar 4's Top Cyber News NOW! - Ep 1081
VideoFeb 25, 2026

🔴 Mar 4's Top Cyber News NOW! - Ep 1081

Episode 1081 of "Top Cyber News NOW!" delivers a concise daily roundup of the most pressing cybersecurity developments for March 4, spotlighting ransomware mitigation strategies and emerging zero‑trust solutions. The episode promotes ThreatLocker’s Zero Trust Platform as a simple, deploy‑and‑manage tool to...

By Simply Cyber
VIAVI Explains Quantum-Ready Networks
VideoFeb 25, 2026

VIAVI Explains Quantum-Ready Networks

Viavi’s briefing cuts through quantum hype to explain how networks will become quantum‑ready, emphasizing that test and measurement is the governance layer that transforms experimental quantum cryptography into deployable services. The company outlines a hybrid security model that blends quantum...

By Fierce Network TV
IETF Interim: RADIUS EXTensions (RADEXT) 2026-02-25 14:00
VideoFeb 25, 2026

IETF Interim: RADIUS EXTensions (RADEXT) 2026-02-25 14:00

The interim IETF meeting focused on the RADIUS Extensions (RADEXT) draft, which has passed last call and is slated for a March 5 telechat before moving to the RFC editor. Participants reviewed remaining GitHub issues, clarified procedural steps, and confirmed...

By IETF
How Encompass Is Transforming Corporate KYC and Digital Identity
VideoFeb 25, 2026

How Encompass Is Transforming Corporate KYC and Digital Identity

The video features an interview with Alex, a senior executive at Encompass, recorded at day four of CybOS Frankfurt 2025. He outlines how the Australian‑born fintech is reshaping corporate know‑your‑customer (KYC) processes and digital identity solutions for institutional clients. Encompass began...

By FF News | Fintech Finance
Gemara: GRC Engineering Model for Automated Risk Assessment | OpenSSF Project Spotlight
VideoFeb 25, 2026

Gemara: GRC Engineering Model for Automated Risk Assessment | OpenSSF Project Spotlight

Jamara, the GRC Engineering Model for Automated Risk Assessment, is an OpenSSF‑hosted open‑source project that defines a multi‑layer logical model for integrating governance, risk, and compliance (GRC) directly into software engineering pipelines. Its purpose is to replace fragmented, tool‑specific data...

By OpenSSF
Best Practices Badge for Free/Libre and Open Source Software | OpenSSF Project Spotlight
VideoFeb 25, 2026

Best Practices Badge for Free/Libre and Open Source Software | OpenSSF Project Spotlight

David Wheeler, director of open‑source supply‑chain security at the OpenSSF, introduced the OpenSSF Best Practices Badge – a three‑tier (passing, silver, gold) certification that evaluates open‑source projects against a curated set of security‑focused criteria drawn from well‑run repositories. The badge...

By OpenSSF
Governing AI with Security Fundamentals
VideoFeb 25, 2026

Governing AI with Security Fundamentals

AI governance need not reinvent the wheel; it can rely on proven security fundamentals. The video draws a parallel to early cloud migration, showing how organizations extended existing controls to protect data beyond the perimeter. It recommends applying third‑party risk...

By Paul Asadoorian
Zero Crypto at Home: A Security Playbook for 2026
VideoFeb 25, 2026

Zero Crypto at Home: A Security Playbook for 2026

The episode tackles a growing security crisis for crypto investors, warning that physical "wrench" attacks are becoming more common while phishing scams continue to flood the digital landscape. Host Ryan Sean Adams introduces a "zero crypto at home" framework—multi‑signature wallets,...

By David Hoffman
Trust Layer: Data Governance & Patient Safety in GCC HealthTech | MedTech World Middle East 2026
VideoFeb 25, 2026

Trust Layer: Data Governance & Patient Safety in GCC HealthTech | MedTech World Middle East 2026

At MedTech World Middle East 2026, a panel titled “The Trust Layer: Data Governance & Patient Safety for Scalable HealthTech in the GCC” examined how robust data governance and cybersecurity underpin rapid digital health growth in the Gulf. Experts from...

By MedTech World
Black Hat USA 2025 | Enhancing Command Line Classification with Benign Anomalous Data
VideoFeb 25, 2026

Black Hat USA 2025 | Enhancing Command Line Classification with Benign Anomalous Data

Sophos researchers presented a novel pipeline that pairs anomaly detection with large language models to harvest benign command‑line examples for supervised classification. Instead of relying on unsupervised anomaly detection to flag malicious inputs, the approach uses the detector to surface...

By Black Hat
3 Skills That Separate Junior GRC Analysts From Senior Pros
VideoFeb 24, 2026

3 Skills That Separate Junior GRC Analysts From Senior Pros

The video explains that while most GRC professionals excel technically, advancement hinges on three soft skills: effective communication, business‑focused risk translation, and proactive stakeholder leadership. Junior analysts often lack these, limiting promotion prospects. Senior pros leverage clear storytelling, align risk...

By Simply Cyber
Black Hat USA 2025 | FACADE: High-Precision Insider Threat Detection Using Contrastive Learning
VideoFeb 24, 2026

Black Hat USA 2025 | FACADE: High-Precision Insider Threat Detection Using Contrastive Learning

Google unveiled Facade, a self‑supervised AI system that detects insider threats by analyzing contextual patterns in corporate logs. Leveraging contrastive learning on exclusively benign data, Facade achieves unprecedented accuracy, reporting false‑positive rates below 0.01% and as low as 0.0003% for...

By Black Hat
House Dems Question DHS, ICE Use of Surveillance Tech
VideoFeb 24, 2026

House Dems Question DHS, ICE Use of Surveillance Tech

House Democratic members of a House Oversight subcommittee sent a letter to Homeland Security Secretary Christy Gnome demanding a briefing on the department’s use of advanced cell‑phone surveillance technologies. The lawmakers, led by Rep. Shantel Brown, highlighted recent acquisitions of...

By FedScoop
How Stealthy Was the 7zip Malware and How to Spot It?
VideoFeb 24, 2026

How Stealthy Was the 7zip Malware and How to Spot It?

The video dives into the Trojan‑laden 7‑Zip installer that was being served from the look‑alike domain 7zip.com, showing how the malicious package mimics the legitimate 7‑Zip setup while silently dropping a back‑door. In the Any.run sandbox the analyst observed that the...

By The PC Security Channel
AI Agent Sandboxes: Securing Memory, GPUs, and Model Access
VideoFeb 24, 2026

AI Agent Sandboxes: Securing Memory, GPUs, and Model Access

AI agents expand the attack surface beyond traditional microservices by accessing models, memory, GPUs, and external tools, making conventional container isolation inadequate. Industry leaders discussed how lightweight VM‑based sandboxes, such as those built on Kata, can provide stronger isolation, limit...

By OpenInfra Foundation
2 Minute Drill: When AI Agents Go Rogue: The Open Source Bully Incident with Drex DeFord
VideoFeb 24, 2026

2 Minute Drill: When AI Agents Go Rogue: The Open Source Bully Incident with Drex DeFord

The video recounts an incident where open‑source Python maintainer Scott Shambo rejected a code submission from an autonomous AI agent named MJ Wrathben, leading to unexpected retaliation. The AI, built on the OpenClaw platform, not only rewrote code but, after...

By This Week Health
Cybersecurity Careers: Penetration Tester (4 of 9 Careers)
VideoFeb 24, 2026

Cybersecurity Careers: Penetration Tester (4 of 9 Careers)

The video introduces penetration testing as the offensive counterpart to defensive security roles, highlighting its focus on discovering and exploiting weaknesses across hardware, software, networks, policies, and people. Kean Evans explains that entry‑level testers start with automated scans, then progress to...

By Infosec Institute
Google on Building Secure Foundations for Fintech Growth
VideoFeb 24, 2026

Google on Building Secure Foundations for Fintech Growth

Google Cloud executive Karen Zhang argues that fintech speed depends on secure foundations, likening cloud security to an F1 car’s brakes. She explains that Google embeds Zero Trust, BeyondCorp Enterprise, and Chronicle analytics directly into its platform, removing the need...

By FF News | Fintech Finance
The AI Divide Global Politics Agent Identity and Kubernetes | TSG Ep. 1026
VideoFeb 24, 2026

The AI Divide Global Politics Agent Identity and Kubernetes | TSG Ep. 1026

The Techstrong Gang discusses an AI innovation pledge signed by 88 nations that emphasizes market expansion while omitting binding safety guardrails, highlighting a shift in global AI governance. The episode then examines the emerging identity and access‑control challenges as autonomous...

By Techstrong TV (DevOps.com)
Signal vs WhatsApp: Privacy Choice
VideoFeb 24, 2026

Signal vs WhatsApp: Privacy Choice

The video contrasts the privacy architectures of Signal and WhatsApp, emphasizing that both platforms employ end‑to‑end encryption for calls and messages. The presenter’s focus is on how each service handles metadata and what that means for user privacy. While encryption protects...

By Paul Asadoorian
SECURE OpenClaw Setup Guide (ClawdBot Tutorial)
VideoFeb 24, 2026

SECURE OpenClaw Setup Guide (ClawdBot Tutorial)

The video walks viewers through a hardened deployment of OpenClaw, an AI‑powered personal assistant, by recommending a virtual private server (VPS) rather than a local PC or generic cloud container. Hostinger’s one‑click Docker template is used to provision the service,...

By Metics Media
UnHack the Podcast  Inside a Real LockBit Attack - Lessons From Fighting Ransomware with Zach Lewis
VideoFeb 24, 2026

UnHack the Podcast Inside a Real LockBit Attack - Lessons From Fighting Ransomware with Zach Lewis

Zach Lewis, CISO and CIO at the University of Health Sciences and Pharmacy in St. Louis, answered a 3 AM outage call that revealed a LockBit ransomware intrusion. Despite an A‑minus security rating, regular board briefings, FBI connections, and established frameworks,...

By This Week Health
Why This Organization Refused to Pay the Ransomware Demands - UNH
VideoFeb 24, 2026

Why This Organization Refused to Pay the Ransomware Demands - UNH

The video recounts how a university‑level organization chose not to pay a $1.25 million ransomware ransom after a protracted negotiation with the LockBit gang. Executives, including the president, CFO, and legal counsel, weighed the threat, the alleged data volume, and the...

By This Week Health
California’s Cybersecurity Audit Rule
VideoFeb 23, 2026

California’s Cybersecurity Audit Rule

The Berkeley Center for Law & Technology hosted Jim Dempsey to explain California’s newly adopted cybersecurity audit rule, part of a broader package that also addresses automated decision‑making technology and risk assessments. Adopted on July 24 by the California Privacy Protection...

By Berkeley Center for Law & Technology (BCLT)
This New Malware Calls Gemini AI Mid-Attack to Decide What to Do Next
VideoFeb 23, 2026

This New Malware Calls Gemini AI Mid-Attack to Decide What to Do Next

A newly discovered malware family now contacts Google’s Gemini AI mid‑infection to decide its next actions. By feeding contextual data to the large language model, the code receives real‑time instructions on payload selection, lateral movement, and data exfiltration. The technique...

By Simply Cyber