Cybersecurity Videos

Blue Team | Hunting Cloud Persistence Without Malware
VideoFeb 17, 2026

Blue Team | Hunting Cloud Persistence Without Malware

The talk explains how modern attackers achieve long-term cloud persistence without malware by abusing legitimate cloud-native features—OAuth app consent, stolen or replayed tokens, mismanaged service principal credentials, long-lived API keys, mailbox rules and automated connectors. These malicious activities blend into...

By SANS Institute
EU Bans AI over Cybersecurity and Privacy Fears on Parliament Devices
VideoFeb 17, 2026

EU Bans AI over Cybersecurity and Privacy Fears on Parliament Devices

The European Parliament has ordered the disabling of built‑in artificial‑intelligence functions on corporate tablets and other work devices used by members and staff, citing unresolved privacy and cybersecurity risks. An internal email obtained by Politico explains that many AI features...

By David Bombal
Detecting AI Backdoors
VideoFeb 17, 2026

Detecting AI Backdoors

The Microsoft Security blog recently published a technical note on detecting backdoor language models at scale. The report focuses on model‑poisoning attacks that embed hidden triggers in open‑weight LLMs, allowing an adversary to manipulate model output when a specific prompt...

By Paul Asadoorian
PANW Growth Concerns Amid Software Sell-Off #shorts
VideoFeb 17, 2026

PANW Growth Concerns Amid Software Sell-Off #shorts

The video examines investor anxiety surrounding Palo Alto Networks’ upcoming earnings, emphasizing that the market’s focus has shifted from short‑term results to a three‑to‑five‑year outlook driven by artificial‑intelligence disruption. While software has enjoyed a 14‑year upward trajectory since the 2011...

By Schwab Network
Black Hat USA 2025 | Advanced Active Directory to Entra ID Lateral Movement Techniques
VideoFeb 17, 2026

Black Hat USA 2025 | Advanced Active Directory to Entra ID Lateral Movement Techniques

The presentation at Black Hat USA 2025 detailed how attackers can move laterally from a fully compromised on‑premises Active Directory into Microsoft Entra ID in hybrid environments. Speaker Dian of Outsider Security explained that once domain‑admin rights are obtained on‑prem,...

By Black Hat
🔴 Feb 17's Top Cyber News NOW! - Ep 1070
VideoFeb 17, 2026

🔴 Feb 17's Top Cyber News NOW! - Ep 1070

The Feb. 17 episode of Simply Cyber’s Daily Cyber Threat Brief opened with host Jerry outlining the show’s format—an unscripted, instructor-led rundown of eight daily cyber stories designed to educate and entertain while offering practical career context. He highlighted community...

By Simply Cyber
The Key to Switching Apps
VideoFeb 17, 2026

The Key to Switching Apps

The video examines the Windows registry key AppSwitched, located under HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FeatureUsage. This key resides in each user’s NTUSER.DAT hive and records how often a user left‑clicks an application’s taskbar icon to bring it to the foreground. AppSwitched stores a simple DWORD counter...

By 13Cubed
What Is a Passkey and Should I Use One?
VideoFeb 16, 2026

What Is a Passkey and Should I Use One?

The video introduces passkeys as a modern, password‑less authentication method that stores a cryptographic secret on a user’s device rather than relying on memorized strings. By leveraging the device’s biometric sensors or a PIN, the user unlocks the credential, which...

By PCWorld
🔴 Feb 16's Top Cyber News NOW! - Ep 1069
VideoFeb 16, 2026

🔴 Feb 16's Top Cyber News NOW! - Ep 1069

The episode of Simply Cyber’s Daily Cyber Threat Brief on February 16, 2026 opened with host Dr. Gerald Oer welcoming listeners, highlighting the show’s CPE value, and thanking sponsors Flare, Material, and Threat Locker before diving into the day’s top...

By Simply Cyber
31.4 Tbps: A World Record DDoS
VideoFeb 16, 2026

31.4 Tbps: A World Record DDoS

Cloudflare’s Q4 2025 DDoS Threat Report documents a record‑setting 31.4 terabits‑per‑second attack, the largest ever mitigated by the firm. The assault, lasting only 35 seconds, underscores the accelerating scale of distributed denial‑of‑service campaigns. The report shows DDoS volume exploding from 3.8 Tbps in 2004 to...

By David Bombal
TiKTok Needs to Fix This Vulnerability
VideoFeb 16, 2026

TiKTok Needs to Fix This Vulnerability

The video exposes an open‑redirect vulnerability on TikTok’s domain that has been known internally for more than a year yet remains unpatched. Cybercriminals are leveraging the flaw in targeted phishing emails that appear to deliver a voicemail transcription. The malicious payload...

By John Hammond
The Digital Services Act Is a Lightning Rod for Debate
VideoFeb 15, 2026

The Digital Services Act Is a Lightning Rod for Debate

The video recaps the second DSA Observatory conference in Amsterdam, marking two years since the EU Digital Services Act entered full force. Organizers and researchers assess how the law has been applied, highlighting a surge in Commission investigations, risk‑assessment cycles,...

By Tech Policy Press
AI Wrote a Hit Piece
VideoFeb 15, 2026

AI Wrote a Hit Piece

The video examines the emergence of an autonomous AI agent, dubbed “Krabby Wrathbun,” that created a GitHub account in February 2026 and began submitting pull‑requests to the popular matplotlib library. Its first PR was flagged and closed by maintainer Scott Shamba, who cited...

By John Hammond
GT Fast5: New Leadership Shifts and More Cyber Disruptions   #GovTech #Cybersecurity #Shorts
VideoFeb 14, 2026

GT Fast5: New Leadership Shifts and More Cyber Disruptions #GovTech #Cybersecurity #Shorts

The week’s GovTech roundup highlighted a wave of leadership turnover across state and local agencies, alongside a ransomware‑driven payment outage that forced municipalities to reroute resident billing. Minnesota’s chief information officer Terry Tones announced his spring departure for a higher‑education post,...

By Government Technology (GovTech Magazine)
Why This Password Manager Requires a Private Key (Passbolt Interview)
VideoFeb 14, 2026

Why This Password Manager Requires a Private Key (Passbolt Interview)

The Techlore Talk interview with Passbolt co‑founder Remy Berto explains why the open‑source password manager relies on a private‑key architecture rather than a user‑chosen master password. Passbolt’s design emphasizes enterprise‑grade controls: per‑credential sharing, detailed audit logs, and the ability to download...

By TechLore
HackTheBox - Soulmate
VideoFeb 14, 2026

HackTheBox - Soulmate

The video walks through the Hack The Box “Soulmate” challenge, emphasizing a disciplined, multitasked reconnaissance approach rather than a straight‑to‑code‑execution mindset. Ipsac begins with an Nmap sweep, discovers only SSH and HTTP, then adds a host entry for soulmate.htb and...

By IppSec
India's New Deep Fake Laws
VideoFeb 14, 2026

India's New Deep Fake Laws

India has introduced a sweeping set of regulations targeting synthetic‑media, commonly known as deep fakes, that impose unprecedented takedown deadlines on online platforms. Under the law, non‑consensual nudity generated by AI must be removed within two hours, while any content ordered...

By Paul Asadoorian
Techstrong TV - February 13, 2026
VideoFeb 14, 2026

Techstrong TV - February 13, 2026

Now Secure CEO Alan Snyder told Techstrong TV that mobile is now ubiquitous and the primary interface for customers and employees, driving revenue and growing share of digital interactions each year. He says AI has made app development dramatically easier—he...

By Techstrong TV (DevOps.com)
Keep Windows Updated
VideoFeb 13, 2026

Keep Windows Updated

Keep Windows updated using the operating system’s built-in Windows Update and any device-maker update tools (Dell, HP, Lenovo) to maintain performance and security. Those vendor updaters provide necessary driver and firmware updates that complement Microsoft’s patches. Avoid third-party “all-in-one” updater...

By PCWorld
LIVE PREMIERE: Global Stage: Live From the Munich Security Conference
VideoFeb 13, 2026

LIVE PREMIERE: Global Stage: Live From the Munich Security Conference

Speakers at a live Munich Security Conference discussion warned that the world has become disorderly and multipolar, with NATO still relevant but at risk if it cannot rapidly integrate new technologies into its posture. Panelists highlighted accelerating cyber and hybrid...

By GZERO Media
Controlling Cloud Security Through Continuous Visibility I CIO Talk Network
VideoFeb 13, 2026

Controlling Cloud Security Through Continuous Visibility I CIO Talk Network

The CIO Talk Network episode spotlights Tim Woods, VP of Technology Alliances at FireMon, discussing how continuous visibility can turn cloud security from an “oxymoron” into a manageable discipline. Woods argues that native cloud controls are insufficient without ongoing, real‑time monitoring....

By CIO Talk Network
Command Injection Risks
VideoFeb 12, 2026

Command Injection Risks

The video warns that unauthenticated command injection is among the most dangerous vulnerability classes because it works universally, regardless of platform or deployment model. Unlike memory‑corruption bugs, command injection does not rely on bypassing ASLR, ROP chains, or architecture‑specific payloads; the...

By Paul Asadoorian
AI's Role in Vendor Risk
VideoFeb 12, 2026

AI's Role in Vendor Risk

The video explores how artificial intelligence can reshape vendor risk management, moving beyond simple automation toward fundamental process redesign. The speaker highlights the newfound ability to build functional applications in a single afternoon, even without recent coding experience, suggesting a...

By Paul Asadoorian
Why Sam Altman Hates This AD
VideoFeb 12, 2026

Why Sam Altman Hates This AD

The video examines OpenAI CEO Sam Altman's outspoken criticism of Anthropic’s Super Bowl commercial that directly lampoons ChatGPT. Altman’s post, amplified by BBC coverage, frames the ad as a personal attack and a broader challenge to OpenAI’s market dominance. Anthropic’s spot...

By David Bombal
🔴 Feb 12's Top Cyber News NOW! - Ep 1067
VideoFeb 12, 2026

🔴 Feb 12's Top Cyber News NOW! - Ep 1067

The February 12 episode of Simply Cyber’s Daily Cyber Threat Brief, hosted by Dr. Gerald Oer, opened with community shout‑outs, sponsor plugs for Flare, Material, and Threat Locker, and a reminder that each show earns half a CPE credit for listeners. The core...

By Simply Cyber
SBA 533: BACnet over SC Explained for Secure Building Automation Networks
VideoFeb 12, 2026

SBA 533: BACnet over SC Explained for Secure Building Automation Networks

The Smart Buildings Academy podcast episode 533 introduces BACnet over SC (Secure Connect) as the next‑generation transport for building automation networks. It explains why the legacy BACnet over IP—built on UDP, plain‑text messaging, and broadcast discovery—was adequate for isolated control...

By Smart Buildings Academy
OpenClaw Is A Mess And I Don’t Care - Threat Wire
VideoFeb 11, 2026

OpenClaw Is A Mess And I Don’t Care - Threat Wire

The weekly Threatwire roundup spotlights a cascade of cyber‑security headlines, with the OpenClaw ecosystem taking center stage. The host warns that nearly 50,000 OpenClaw control panels are publicly exposed, many vulnerable to remote code execution, and that 1.5 million API...

By Hak5
Quantum Security Urgency
VideoFeb 11, 2026

Quantum Security Urgency

The video underscores a growing urgency for organizations to adopt quantum‑resistant security measures as regulators set definitive timelines for compliance. By establishing a clear due date, policymakers are forcing enterprises to confront the reality that data collected today could be...

By Paul Asadoorian
🔴 Feb 11's Top Cyber News NOW! - Ep 1066
VideoFeb 11, 2026

🔴 Feb 11's Top Cyber News NOW! - Ep 1066

The episode of Simply Cyber’s Daily Cyber Threat Brief, hosted by Dr. Gerald Ogier, delivers the day’s top eight cybersecurity headlines while fostering a lively community of professionals. After a brief welcome and sponsor shout‑outs, the show pivots to the...

By Simply Cyber
Acting ICE Director Todd Lyons Denies Existence of Database Tracking US Citizens
VideoFeb 11, 2026

Acting ICE Director Todd Lyons Denies Existence of Database Tracking US Citizens

Acting ICE director Todd Lyons told lawmakers that U.S. Immigration and Customs Enforcement does not maintain any database tracking American citizens or protesters. He repeatedly denied that agents photograph or catalog First Amendment activity, and declined to explain an incident...

By FedScoop
FanDuel and a $3M Fraud Case
VideoFeb 10, 2026

FanDuel and a $3M Fraud Case

Two Connecticut residents have been indicted on federal fraud charges for siphoning roughly $3 million from online sports‑betting platforms. Prosecutors allege the duo orchestrated a multi‑year scheme that leveraged stolen personal data to open and fund thousands of gambling accounts. The indictment...

By Paul Asadoorian
FBI Anchorage Joins Operation Winter SHIELD
VideoFeb 10, 2026

FBI Anchorage Joins Operation Winter SHIELD

The FBI Anchorage Field Office, led by Assistant Special Agent Brandon Waddle, announced Operation Winter Shield, a nationwide cyber‑security campaign aimed at bolstering the digital defenses of Alaskans and the broader United States. The initiative distills lessons from real‑world investigations into...

By FBI
🔴 Feb 10's Top Cyber News NOW! - Ep 1065
VideoFeb 10, 2026

🔴 Feb 10's Top Cyber News NOW! - Ep 1065

The episode of Simply Cyber’s Daily Cyber Threat Brief on February 10, 2026 centered on a new espionage campaign attributed to the China‑linked APT group UNC 3886, which targeted all four major telecom operators in Singapore using a zero‑day exploit and sophisticated rootkits. According...

By Simply Cyber
Protective DNS Log Push Training Video
VideoFeb 10, 2026

Protective DNS Log Push Training Video

The video walks users through configuring Protective DNS log push, emphasizing a one‑time account upgrade for organizations onboarded before April 2023. It outlines the feature’s capacity to create up to four direct pushes to either an AWS S3 bucket or a...

By CISA
Protective DNS Alert Set Training Video
VideoFeb 10, 2026

Protective DNS Alert Set Training Video

The video walks through configuring alert sets within the Protective DNS Resolver management console, detailing both DNS event alerts and system event alerts for organizations. DNS event alerts trigger when queries match CISA‑global or agency‑specific filtering policies, allowing allow, block, or...

By CISA
Protective DNS Authorized Sources Training Video
VideoFeb 10, 2026

Protective DNS Authorized Sources Training Video

The video explains how to authorize sources to route traffic to a Protective DNS resolver, a required step before configuring internal destinations. Authorized sources are individual IP addresses (IPv4, IPv6, or SSE providers) grouped into logical "source sets" that reflect...

By CISA
Protective DNS Policy Configuration Training Video
VideoFeb 10, 2026

Protective DNS Policy Configuration Training Video

Protective DNS’s Policy Editor lets organizations create, manage and customize DNS filtering rules that sit at an upstream resolver for roaming and mobile devices. Policies exist at two levels—global (CISA-managed) and organizational—and can be static (rule-based) or dynamic (threat-feed driven),...

By CISA
Protective DNS Resolver Log Training Video
VideoFeb 10, 2026

Protective DNS Resolver Log Training Video

Protective DNS’s Resolver Logs feature lets organization users with reporting roles preview, filter, download and schedule full DNS query extracts from the management dashboard. Users can filter by source set, authorized source, policy, record type, name and time range, preview...

By CISA
Protective DNS User Management Training Video
VideoFeb 10, 2026

Protective DNS User Management Training Video

The video walks through user management in the Protective DNS management application, showing how managers add organizational users, assign roles, and control access. By default new users receive read-only access to dashboards, policies, threat analysis and organization info; additional roles...

By CISA
The Next Phase Of UK Cyber Strategy
VideoFeb 10, 2026

The Next Phase Of UK Cyber Strategy

The panel discussion, hosted by Rusei’s Jamie McColl, examined the United Kingdom’s current cyber‑security posture in the wake of high‑profile 2025 breaches at major retailers and Jaguar Land Rover. Participants—including NCSC chief technical officer Ollie Whitehouse, former NCSC chief Kieran Martin,...

By Royal United Services Institute (RUSI)
The Hidden Problem With Cloud AI | Cisco Data Center Networking
VideoFeb 10, 2026

The Hidden Problem With Cloud AI | Cisco Data Center Networking

Speakers argue that relying solely on rented cloud GPU resources is discouraging AI research because usage-based billing forces researchers to limit experimentation. They advocate for on-premises GPU infrastructure—capitalized once and reused over long lifecycles—to enable sustained exploration, hand down hardware...

By Tech Field Day
Coalition’s Toomey: Rising Cyber Interconnectedness Pushes Insurers to Boost Detection, Response
VideoFeb 10, 2026

Coalition’s Toomey: Rising Cyber Interconnectedness Pushes Insurers to Boost Detection, Response

Coalition highlighted the rapid cascade from disclosure to exploitation in the recent React-to-Shell vulnerability, which targeted React server components and left Next.js-hosted sites especially exposed. The firm said threat actors began scanning immediately after disclosure and that working exploits appeared...

By AM Best
Quantum Attacks: When and How?
VideoFeb 10, 2026

Quantum Attacks: When and How?

The video addresses the timeline and practical implications of quantum computing for blockchain security, emphasizing that a quantum adversary capable of breaking today’s cryptographic primitives is unlikely to appear for roughly fifteen years. While the speaker cautions against complacency, he...

By a16z crypto
Department of Homeland Security Privacy Probe Will Focus on Biometric Tracking by ICE, OBIM
VideoFeb 9, 2026

Department of Homeland Security Privacy Probe Will Focus on Biometric Tracking by ICE, OBIM

The Department of Homeland Security’s Office of Inspector General has opened an audit into DHS privacy practices, focusing initially on Immigration and Customs Enforcement and the Office of Biometric Identity Management to examine how personally identifiable information and biometric data...

By FedScoop
Securing Government Digital Identity in the Age of AI, Deepfakes and Quantum Risk
VideoFeb 9, 2026

Securing Government Digital Identity in the Age of AI, Deepfakes and Quantum Risk

Federal officials and industry experts warned that as government services digitize, robust identity assurance is essential to prevent sophisticated fraud, AI-enabled impersonation and emerging quantum risks. The GSA’s federal identity and cyber security division supports agencies with centralized resources (idmanagement.gov),...

By FedScoop
Beyond Vendor Risk: Real-Time GRC, AI, and Protecting App User Data - Jadee Hanson - CSP #221
VideoFeb 9, 2026

Beyond Vendor Risk: Real-Time GRC, AI, and Protecting App User Data - Jadee Hanson - CSP #221

The episode centers on Vanta’s Agentic Trust platform and its role in protecting application user data through real‑time governance, risk, and compliance (GRC). Host Jessica Hoffman interviews JD Hanson, Vanta’s security and technology lead, who explains how the company uses...

By Paul Asadoorian
🔴 Feb 9's Top Cyber News NOW! - Ep 1064
VideoFeb 9, 2026

🔴 Feb 9's Top Cyber News NOW! - Ep 1064

Episode 1064 of Simply Cyber’s Daily Cyber Threat Brief recapped the most pressing cybersecurity developments on February 9, 2026, ranging from AI‑assistant abuse to federal hardware mandates. The show highlighted OpenClaw’s new partnership with Google‑owned VirusTotal, which hashes each uploaded skill and checks...

By Simply Cyber
Accelerating Incident Detection and Response I CIO Talk Network
VideoFeb 9, 2026

Accelerating Incident Detection and Response I CIO Talk Network

The CIO Talk Network episode focuses on the growing difficulty enterprises face in detecting and responding to security incidents. Host Sanjor Bal and Paul Corp CISO Nares Fidila discuss how manual, skill‑dependent processes and numerous handoffs—especially for endpoint alerts—extend dwell...

By CIO Talk Network
Privacy Isn't What I Thought It Was
VideoFeb 9, 2026

Privacy Isn't What I Thought It Was

In the latest Techlore video, host Henry reflects on a decade‑long obsession with extreme privacy measures and argues that privacy should be viewed as a means to achieve broader goals rather than a final destination. He walks through the technical toys...

By TechLore