ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

113 results

TryHackMe and David Ackerman
Evil-GPT 2 | Practice LLM Hacking Skills TryHackMe Walkthrough

Put your LLM hacking skills to the test, one more time. Practice real LLM hacking techniques in Evil-GPT on TryHackMe. Follow ...

8:02
Evil-GPT 2 | Practice LLM Hacking Skills TryHackMe Walkthrough

578 views

5 days ago

Cloud Security Podcast by Google
EP259 Why DeepMind Built a Security LLM  Sec-Gemini and How It Beats the Generalists

Guest: • Elie Burstein (https://elie.net/) , Distinguished Scientist, Google Deepmind Topics: • What is Sec-Gemini, why are we ...

33:36
EP259 Why DeepMind Built a Security LLM Sec-Gemini and How It Beats the Generalists

23 views

4 days ago

GenAI Summit
AI SAFETY IN PRACTICE – RED TEAMING, GUARDRAILS, AND MONITORING FOR LLM SYSTEMS

Speaker: • Marios Lioutas, Senior Data & AI Consultant, D ONE #AIRisk #RedTeaming #AIGovernance #Jailbreaking ...

18:34
AI SAFETY IN PRACTICE – RED TEAMING, GUARDRAILS, AND MONITORING FOR LLM SYSTEMS

4 views

14 hours ago

Jarno Baselier
Hacking QuickTip 81 - Running HexStrike AI with a Local LLM Model

In our previous video, we demonstrated how to effectively deploy HexStrike in conjunction with public Large Language Models ...

27:00
Hacking QuickTip 81 - Running HexStrike AI with a Local LLM Model

257 views

4 days ago

From Hybrid to Unrestricted Warfare
Hacking the Mind of AI

Based on: BSI Evasion Attacks on LLMs –Countermeasures in Practice A Guide to face Prompt Injections, Jailbreaks and ...

6:56
Hacking the Mind of AI

15 views

4 days ago

Lab Prove Hub
AI Cyberattacks: How Hackers Weaponize Artificial Intelligence (Deepfakes, Phishing & Ransomware)

AI is no longer just a tool for improving customer service—it is being actively weaponized by hackers to automate and amplify ...

6:43
AI Cyberattacks: How Hackers Weaponize Artificial Intelligence (Deepfakes, Phishing & Ransomware)

7 views

4 days ago

Anton Chuvakin
EP259 Why DeepMind Built a Security LLM  Sec-Gemini and How It Beats the Generalists

Guest: • Elie Burstein (https://elie.net/) , Distinguished Scientist, Google Deepmind Topics: • What is Sec-Gemini, why are we ...

33:36
EP259 Why DeepMind Built a Security LLM Sec-Gemini and How It Beats the Generalists

121 views

4 days ago

Adafruit Industries
Deep Dive w/Scott: Yoto hacking & #CircuitPython2026 Wrap-up #adafruit

Join Scott as he wraps up #CircuitPython2026, discusses Yoto hacking and tries to answer any questions folks have. 0:00 Getting ...

1:07:00
Deep Dive w/Scott: Yoto hacking & #CircuitPython2026 Wrap-up #adafruit

171 views

Streamed 5 hours ago

Anton Chuvakin
EP259 Why DeepMind Built a Security LLM Sec-Gemini and How It Beats the Generalists | Cloud...

Guest: Elie Burstein (https://elie.net/), Distinguished Scientist, Google Deepmind Topics: What is Sec-Gemini, why are we building ...

33:36
EP259 Why DeepMind Built a Security LLM Sec-Gemini and How It Beats the Generalists | Cloud...

8 views

4 days ago

CosmoX
Citation-Aware Rubric Rewards: Robust RL for Deep Search Agents (arXiv 2601.06021)

In this video, we review arXiv 2601.06021 and explain how to train reliable LLM-based deep search agents using robust ...

4:44
Citation-Aware Rubric Rewards: Robust RL for Deep Search Agents (arXiv 2601.06021)

0 views

3 days ago

AEG AI ENG
LLMs Under Attack: The Truth About Usage-Based Threats

Are large language models (LLMs) truly secure? "LLMs Under Attack: The Truth About Usage-Based Threats" uncovers the ...

14:36
LLMs Under Attack: The Truth About Usage-Based Threats

12 views

4 days ago

Adafruit Industries
Deep Dive w/Scott: #CircuitPython2026 and LLMs #adafruit

Join Scott as he discusses his #CircuitPython2026 thoughts. He'll also try and answer any questions that folks have. 0:00 getting ...

1:04:11
Deep Dive w/Scott: #CircuitPython2026 and LLMs #adafruit

540 views

Streamed 7 days ago

EVA BENN | CYBERSECURITY | AI
This Free AI Challenge Teaches More Than Most Cybersecurity Courses

Hi, I'm Eva Benn. If you're new here, I break down how AI is changing cybersecurity and what that means for your career. In this ...

11:56
This Free AI Challenge Teaches More Than Most Cybersecurity Courses

334 views

4 days ago

Amn Amine
Cybersecurity Chatbot Using a Fine-Tuned LLM 🤖🔐

In this video, I walk you through how I built a cybersecurity chatbot by fine-tuning a large language model using the Trendyol ...

9:07
Cybersecurity Chatbot Using a Fine-Tuned LLM 🤖🔐

0 views

5 days ago

Punit Darji
OpenCode Vulnerability Explained | CVE-2026-22812 | AI Coding Tool Security Risk

A security vulnerability has been identified in OpenCode, an AI-powered coding assistant used by students and developers.

10:07
OpenCode Vulnerability Explained | CVE-2026-22812 | AI Coding Tool Security Risk

70 views

3 days ago

ABV — AI · Books · Validation
DIY “Vibe Coder” Keyboard Gets Voice Mode — Ugly Hardware, Real AI Control

This is the next iteration of the DIY Vibe Coder keyboard — and now it talks. No polished industrial design. No minimal aluminum ...

1:21
DIY “Vibe Coder” Keyboard Gets Voice Mode — Ugly Hardware, Real AI Control

17 views

5 days ago

Ali
First AI Hack Exposed: How China's Claude Bot Attacked 30 Companies in Seconds

In November 2025, cybersecurity changed forever. Chinese hackers used Anthropic's Claude AI to execute the world's first fully ...

10:44
First AI Hack Exposed: How China's Claude Bot Attacked 30 Companies in Seconds

35 views

2 days ago

LinuxRootHackers
Run DeepSeek-Coder AI on Android Phone 🤖 | Full GuideAndroid Phone Mein AI Coding 🤯 | DeepSeek-Coder

In this video, I will show you how to RUN AI DeepSeek-Coder on Android phone No PC ❌ No Cloud ❌ — pure on-device AI ...

3:47
Run DeepSeek-Coder AI on Android Phone 🤖 | Full GuideAndroid Phone Mein AI Coding 🤯 | DeepSeek-Coder

140 views

6 days ago

GeoTech Pulse
The Zero-Cost AI Trap: How Frictionless Tech Leads to Collapse

How zero-cost, frictionless AI functions as a supernormal stimulus, leading to systemic collapse. Core Argument: AI's elimination of ...

32:01
The Zero-Cost AI Trap: How Frictionless Tech Leads to Collapse

0 views

4 days ago

Punit Darji
What is MCPJam Inspector | Exploit MCPJam Inspector

CVE-2026-23744 is a security vulnerability identified using MCPJam Inspector, a tool designed to analyze and inspect ...

4:59
What is MCPJam Inspector | Exploit MCPJam Inspector

11 views

15 hours ago