Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
446 results
C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...
16,117 views
2 years ago
There's an escalating arms race between bots and the people who protect sites from them. Bots, or web scrapers, can be used to ...
10,472 views
10 years ago
TLS is the de facto way of securing network connections. It provides an easy way of ensuring confidentiality, integrity and ...
14,607 views
Hacking your health with JavaScript. It was a title that made a lot of sense a couple months ago. So, you know, a couple years ago ...
1,051 views
8 years ago
Apache Spark is one of the major players if not the leader when it comes to distributed computing and processing. Want to use ...
5,427 views
5 years ago
HTTP requests are traditionally viewed as isolated, standalone entities. In this session, I'll introduce techniques for remote, ...
65,107 views
6 years ago
Apache Solr is a search platform used by many enterprise companies to add a full text search functionality to their websites.
2,228 views
How to use CSP to stop XSS KENNETH LEE PRODUCT SECURITY ENGINEER, ETSY INC. Crosssite scripting attacks have ...
1,385 views
12 years ago
In this talk we will tell the story of an insane exploit we used to compromise the otherwise secure KASM Workspaces software.
3,432 views
3 years ago
Return-oriented Programming (ROP) has been the predominate code-reuse attack for over a decade, but there are other options.
1,363 views
Fuzzing is a well-established technique for finding bugs, hopefully exploitable ones, by brute forcing inputs to explore code paths ...
2,210 views
In this video we hear the story how Ezequiel Pereira found a critical vulnerability in Google Cloud and was awarded $164674 in ...
1,076,249 views
4 years ago
MacOS is known for an additional layer of privacy controls called TCC - Transparency, Consent, and Control (TCC) that restricts ...
5,498 views
Almost everyone has had a moment when they have been asked to build something quickly at 3pm on a Friday. Come explore ...
2,140 views
9 years ago
In this talk, we will provide insight into both the documented and undocumented APIs available in Adobe Reader. Several code ...
3,088 views
Google Cloud's security model in many ways is quite different from AWS. Spark jobs, Cloud Functions, Jupyter Notebooks, and ...
7,937 views
macOS local security is shifting more and more to the iOS model, where every application is codesigned, sandboxed and needs to ...
1,962 views
The 2016 WWDC saw the dawn of Apple Pay Web, an API that lets websites embed an Apple Pay button within their web-facing ...
5,275 views
Firebase Database takeover vulnerability | Rahad Chowdhury What is firebase database? Firebase is Google mobile application ...
8,179 views
PBX (Private Branch Exchange) and UC (Unified Communications) servers are the big communication brokers in enterprise ...
4,813 views