Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
3,922 results
In this video I discuss how advanced persistent threat actors managed to backdoor xz-utils and almost gained system RCE on ...
230,745 views
2 months ago
In this video I discuss how desktop ubuntu 23.10 got trolled with an insulting Ukrainian language translation and the most severe ...
85,198 views
8 months ago
Secure the Linux Kernel with eBPF Linux Security Module - Vandana Salve, Independent Consultant Linux security module (LSM) ...
641 views
In this video I discuss how Hackers using Tor get caught by divulging too many details about themselves and how they conduct ...
414,842 views
5 months ago
Mentor: Greg Kroah-Hartman, Kernel Maintainer & Fellow, The Linux Foundation There is a lot of misunderstanding about how the ...
2,983 views
CHAPTERS: 0:00 - Intro 0:48 - How the backdoor was discovered 2:11 - Security Vulnerability Details 4:56 - Open Source ...
68,839 views
Let's see some good security practices that can be applied on a server (best on: GNU/Linux) to proactively protect a web ...
14 views
Firefox used to be one of the most popular web browsers. Now, barely anyone uses it. What happened to this once great free and ...
44,282 views
1 month ago
There is a lot of misunderstanding about how the Linux kernel deals with security vulnerabilities. This talk will go into how the ...
924 views
In this video I show you how to install and verify TailsOS safely. 0:00 What is tails? 1:41 Installing Tails from different host OS's ...
398,901 views
9 months ago
Keynote: Linux Kernel Security Demystified - Greg Kroah-Hartman, Linux Kernel Developer & Fellow, The Linux Foundation.
1,286 views
6 months ago
In this video I discuss whether or not you should use a VPN before connecting to Tor and why this isn't a good idea in most ...
758,746 views
Mitigating Hackers with Hardening on Linux – An Overview for Developers, Focus on BoF (Buffer Overflow) - Kaiwan Billimoria, ...
244 views
11 months ago
In this video I discuss how the hacker responsible for the Vastaamo data breach incident was caught due to numerous OPSEC ...
494,498 views
4 months ago
In this video I go over the 2023 edition of the Darknet Market Buyers Bible located on the darknet market noob subdread. I do not ...
315,323 views
Time Stamps 00:00 - Which DNS Service is Best for Filtering Malicious Sites 00:30 - Services Tested Quad9, Cloudflare Families, ...
88,051 views
q3k will go over his efforts to get code execution on _all_ Apple iPod Nano devices. We'll start out with a general overview of the ...
958 views
For the last 6 years my colleagues and I have been tracking the activities of the cyber-mercenaries we call Dark Caracal. In this ...
104,162 views
Today I talk about my first week on NixOS. I have positive and negative things to say. PULL IT DOWN FOR THE GOOD STUFF ...
62,067 views
In this video, we'll discuss how to collect endpoint logs with Elastic Agent and send those logs to Security Onion. For more ...
3,805 views
3 months ago