ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

128 results

SheHacksPurple
Alice and Bob Learn Secure Coding: Chapter 5

Technology-Specific Security with Dr. Katie Paxton-Fear I'd love to invite you to join me live for another session in the Alice and ...

Upcoming
Alice and Bob Learn Secure Coding: Chapter 5

0 views

0

NetGuardians
🔥Day 78 - Secure Coding Principles Explained | Building Secure Login Systems from Scratch

Welcome to Day 78 of the NetGuardians Certified Basic of Cyber Security. 6 Month journey to become confident in Cybersecurity!

9:14
🔥Day 78 - Secure Coding Principles Explained | Building Secure Login Systems from Scratch

4 views

2 days ago

CyberForgeAI
Coding the Tower of Hanoi: Visual Animation & Java Logic | CyberForgeA

0:00 :- Intro 0:32 :- Tower of Hanoi explanation 4:59 :- Java code for Tower of Hanoi explanation CyberForgeAI — Build secure ...

6:22
Coding the Tower of Hanoi: Visual Animation & Java Logic | CyberForgeA

9 views

6 days ago

Salesforce Trailhead Answers
AgentExchange Security Review | Devise Your Security Strategy

In this video, I complete the lesson “Devise Your Security Strategy” from the “AgentExchange Security Review” module.

6:11
AgentExchange Security Review | Devise Your Security Strategy

1 view

2 days ago

NIDevConf
Application Security in the Age of Vibe Coding - Ciaran Conliffe - Hall 1B - NIDC 2025

Like it or not, the way software is being created is changing. Some developers are using AI assistants to help build their code, ...

31:00
Application Security in the Age of Vibe Coding - Ciaran Conliffe - Hall 1B - NIDC 2025

11 views

4 days ago

DTF Cyber Podcast
Token Bloat is the New AI Waste Problem | #DTF044

Are you caught between a bedrock and a hard place with your organization's cloud budget? In Episode 44 of the DTF Cyber ...

59:37
Token Bloat is the New AI Waste Problem | #DTF044

102 views

2 days ago

WalkingCat
PDC 2005 - Security Symposium, Part 1 - Steve Lipner, Michael Howard - 2005/09

Event: Professional Developers Conference 2005 Title: Security Symposium, Part 1 Speakers: Steve Lipner, Michael Howard ...

1:33:20
PDC 2005 - Security Symposium, Part 1 - Steve Lipner, Michael Howard - 2005/09

14 views

5 days ago

RootAccess
BTMOB 3.6.3 🦇 (ANDROID HACKING SOFTWARE) + Banking Injection #btmob #kl #remote

Contact us: Telegram:t.me/WhiteHatX_PK If you want to buy Bt mob or any latest android and windows hacking rat let me know 1- ...

6:02
BTMOB 3.6.3 🦇 (ANDROID HACKING SOFTWARE) + Banking Injection #btmob #kl #remote

13 views

6 days ago

Cycubix LTD
LLM01: Prompt Injection Explained — OWASP Top 10 for LLMs | AI Security Course

What happens when a hacker tricks an AI into ignoring its own rules? That's Prompt Injection — and it's the #1 risk in the OWASP ...

7:01
LLM01: Prompt Injection Explained — OWASP Top 10 for LLMs | AI Security Course

49 views

5 days ago

One+One-Tech
Securing SwiftPay: From SQL Injection to MFA | Complete Cybersecurity Lab   part 1

In this video, I walk through a complete cybersecurity lab based on a real-world FinTech scenario called SwiftPay. The application ...

21:02
Securing SwiftPay: From SQL Injection to MFA | Complete Cybersecurity Lab part 1

7 views

7 days ago

One+One-Tech
Securing SwiftPay: From SQL Injection to MFA | Complete Cybersecurity Lab

In this video, I walk through a complete cybersecurity lab based on a real-world FinTech scenario called SwiftPay. The application ...

22:11
Securing SwiftPay: From SQL Injection to MFA | Complete Cybersecurity Lab

12 views

7 days ago

I Can't Code
Google just casually stopped an AI from hacking the entire internet…

Google's Threat Intelligence Group found a criminal hacking group using AI to build a working zero-day exploit and only caught it ...

3:57
Google just casually stopped an AI from hacking the entire internet…

47 views

6 days ago

Leadership By Design
What Every Business Leader Needs to Know About Cybersecurity Risk, & Building High-Performing Teams

The episode weaves two threads together throughout: technical mastery and human leadership. The conversation covers team ...

27:06
What Every Business Leader Needs to Know About Cybersecurity Risk, & Building High-Performing Teams

3 views

4 days ago

RedMonk
Tanya Janca on AI Slop, Vibe Coding, & the Future of AppSec

Kate Holterhoff sits down with Tanya Janca, Secure Coding and AI Trainer at SheHacksPurple, to talk about what AI is doing to ...

56:33
Tanya Janca on AI Slop, Vibe Coding, & the Future of AppSec

16 views

14 hours ago

Sonar
Sonar Malicious Package Detection | Block Supply Chain Attacks

Open-source dependencies have revolutionized modern software development, but they have also introduced critical supply ...

3:12
Sonar Malicious Package Detection | Block Supply Chain Attacks

7 views

2 days ago

Breaking Into Cybersecurity
AI Security & Vibe Coding | Shan Kulkarni | BIC

Learn the intersection of AI security and vibe coding with industry expert Shan Kulkarni.\n\n- Discover emerging risks in AI-driven ...

0:25
AI Security & Vibe Coding | Shan Kulkarni | BIC

1 view

3 days ago

Down the Security Rabbithole Podcast
DtSR Episode 706 - Practical AppSec for the AI Vulnpocalypse

Let's talk about how Paolo del Mundo at The Motley Fool thinks about AppSec with the (potential) AI Vulnpocalypse looming.

37:46
DtSR Episode 706 - Practical AppSec for the AI Vulnpocalypse

16 views

Streamed 7 days ago

RootAccess
BTMOB 4.5.2 APK Builder Full Process

Contact us: Telegram:t.me/WhiteHatX_PK If you want to buy Bt mob or any latest android and windows hacking rat let me know 1- ...

3:35
BTMOB 4.5.2 APK Builder Full Process

20 views

7 days ago

Salesforce Trailhead Answers
AgentExchange Security Review | Prepare for the Security Review

In this video, I complete the lesson “Prepare for the Security Review” from the “AgentExchange Security Review” module. 10:35 ...

10:43
AgentExchange Security Review | Prepare for the Security Review

0 views

1 day ago

Cloud9 Learning
THE AI SECURITY NIGHTMARE

Artificial intelligence is no longer just helping defenders. It's now actively being used in real-world cyberattacks. In this video, I ...

6:21
THE AI SECURITY NIGHTMARE

5 views

5 days ago