ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

119 results

Tom Fieber
Bugforge.io - Abusing a broken authentication mechanism to take over an admin account - Sokudo

Challenge solution walkthrough for Sokudo (Broken Authentication) on bugforge.io 0:00 - Introduction 1:55 - Challenge solution ...

7:39
Bugforge.io - Abusing a broken authentication mechanism to take over an admin account - Sokudo

19 views

15 hours ago

CyberLearn Visual
OWASP Top 10 A07: Authentication Failures Exposed (How Hackers Steal Your Identity!)

Uncover **OWASP Top 10 A07: Identification and Authentication Failures**—the vulnerability letting hackers steal your identity ...

7:05
OWASP Top 10 A07: Authentication Failures Exposed (How Hackers Steal Your Identity!)

0 views

4 days ago

Cyber_Hero
Cybersecurity for Beginners | OWASP Explained 🔐 #cybersecurity #owasp #ethicalhacking

... XSS, CSRF, broken authentication OWASP for beginners and students How attackers exploit web applications How developers ...

5:37
Cybersecurity for Beginners | OWASP Explained 🔐 #cybersecurity #owasp #ethicalhacking

23 views

5 days ago

No_Skins7
roblox grace - the "a broken bond" challenge

this is a challenge, where the rooms are buffed, and more entities are involved here it's called "a broken bond", and this challenge ...

0:21
roblox grace - the "a broken bond" challenge

5,240 views

5 days ago

The BlackBox Security
This Is How Hackers Crack Passwords (And How to Stay Safe)

What really happens when your password is weak? Hackers don't need magic — most passwords fail because of simple mistakes ...

6:58
This Is How Hackers Crack Passwords (And How to Stay Safe)

507 views

6 days ago

STARTUP HAKK
Why Modern Cyber Warfare Doesn’t Use Exploits Anymore

https://StartupHakkSecurity.com/Spencer/?live=2025.12.31 Imagine leaving your front door wide open, not because the lock is ...

3:49
Why Modern Cyber Warfare Doesn’t Use Exploits Anymore

3,672 views

Streamed 7 days ago

Richard Greene
Cybersecurity Made Human: Protect What Matters Online

Lock the digital doors without the panic. We unpack cybersecurity in simple, human terms and show how calm design, not fear or ...

6:12
Cybersecurity Made Human: Protect What Matters Online

0 views

6 days ago

Domain Explorer | Premium Domains & Investing
Access Control Is Broken Without This

Data governance today is about controlling access, not just managing data. In this video, we explain how identity is becoming the ...

3:15
Access Control Is Broken Without This

0 views

4 days ago

AIchievable
Claude Opus 4.5 vs GLM 4.7 – AI Vibe Coding Battle - This Will Be Controversial

Claude Opus 4.5 vs GLM 4.7 – the ultimate vibe coding comparison. I built a real project from scratch with both models to see ...

16:41
Claude Opus 4.5 vs GLM 4.7 – AI Vibe Coding Battle - This Will Be Controversial

6,807 views

4 days ago

CyberLearn Visual
OWASP Top 10 A04: Insecure Design Exposed (Equifax Breach + Fix It Now!)

Uncover **OWASP Top 10 A04: Insecure Design**—the hidden blueprint flaws that turn small bugs into massive breaches like ...

5:16
OWASP Top 10 A04: Insecure Design Exposed (Equifax Breach + Fix It Now!)

0 views

7 days ago

Hack with Elvis
What Many Developers Get Wrong About Authentication and Authorization - Web Application Security

Many developers assume that once a user is authenticated, security is complete. This is a common and dangerous misconception ...

1:03
What Many Developers Get Wrong About Authentication and Authorization - Web Application Security

100 views

3 days ago

SoftwarePlaza
Secure Blink on Fixing What’s Broken in Application & API Security

In this episode we welcome Sonal Khanna, the Co-Founder at Secure Blink, to unpack how AI is reshaping application and API ...

39:10
Secure Blink on Fixing What’s Broken in Application & API Security

4 views

3 days ago

Akanksha Kumari
Exposing IDOR: How One Reference ID Leaks User Data

bugbounty #idor #cybersecurity If you enjoyed the video, don't forget to Like , Subscribe, and turn on the Notification Bell so ...

5:46
Exposing IDOR: How One Reference ID Leaks User Data

244 views

4 days ago

劇好追
After my mother died, I was pampered like a princess by my 7 CEO fathers.

"The drama is great👉 https://www.youtube.com/channel/UC3EWyNiOL9Y0p0m_VSvDwwA Click to subscribe and recommend popular short ...

2:22:22
After my mother died, I was pampered like a princess by my 7 CEO fathers.

86,522 views

1 day ago

bhavin katira
Cracking the Code  TLS

Cracking the Code: TLS (Transport Layer Security)** — in this video, I break TLS down into a **clean mental model** that actually ...

6:42
Cracking the Code TLS

1 view

4 days ago

Web3 Newswire
DAY 1 | The End of Passwords | How Soulbound Tokens Redefine Digital Identity

Passwords were built for a centralized internet and they're failing. In this episode, we break down why passwords are insecure, ...

5:36
DAY 1 | The End of Passwords | How Soulbound Tokens Redefine Digital Identity

0 views

3 days ago

Skill Reboot
IDOR Explained | Secure SQL but Broken Authorization #idor #php #securecoding

Prepared statements stop SQL Injection — not IDOR. This video shows how broken authorization causes IDOR, even when your ...

1:00
IDOR Explained | Secure SQL but Broken Authorization #idor #php #securecoding

186 views

7 days ago

Bitten Tech
Cyber Project : Zero trust Password Less login 🚀🚀

Passwords are broken. Identity isn't. Leaks. Reuse. Phishing. Passwords fail every day. The future is passwordless security ...

0:53
Cyber Project : Zero trust Password Less login 🚀🚀

7,163 views

4 days ago

QuickFix Digital
How to Add Gmail to Outlook (2026) | Sync Gmail With Outlook

Running Gmail and Outlook separately is a waste of time. Sync them once. Be done. This video shows how to add your Gmail ...

1:32
How to Add Gmail to Outlook (2026) | Sync Gmail With Outlook

20 views

7 days ago

Bankai Developer
The "Yonko Level" Security: Why Hackers Hate Hardware Keys (Ep. 9)

Welcome to Episode 9 of "The Digital Shield" - The Gates of Justice. Congratulations. You created a strong password. But guess ...

7:50
The "Yonko Level" Security: Why Hackers Hate Hardware Keys (Ep. 9)

0 views

1 day ago