Curated Video
Update, Upgrade, and Alias Commands
This video will show you how to keep your pentest box up-to-date
Curated Video
How to Prepare and Present Your Report final mp4 new
This video will teach you how to professionally present your findings to a client
Curated Video
How to Analyze a Cyber Attack
Traditional information security attack analysis focuses on malware and computer intrusions, in which an attacker utilizes technical prowess to exploit a vulnerability to gain access to or harm a system (or network).
Curated Video
Run a Simple Ransomware
In this tutorial, you will learn how to create a very simple Ransomware to encrypt files, and how to use a Decrypter to gain access to these files again. THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. I AM NOT RESPONSIBLE FOR YOUR ACTIONS....
Curated Video
Android Platform
This video explains Android platform in general. It is a pre-requisite before going ahead with the other videos.
Curated Video
Injection
SQL injection is one of the new OWASP top 10 vulnerabilities. We will explain this vulnerability in details in this video
Curated Video
Broken Access Control
This video will explain the broken access attack vector on web applications and how can attackers leverage this vulnerability to gain unauthorized access
Curated Video
Advanced Persistent Threats (APTs)
A stealthy threat actor, usually a nation state or state-sponsored organization, that gains unauthorized access to a computer network and goes unnoticed for a long time constitutes an advanced persistent threat.
Curated Video
Android Security Architecture
A very important video that details the security architecture of an APK app and how it interacts with the Android platform
Curated Video
Ethical Hacking with Kali Linux Introduction
This video is an introduction on ethical hacking
Curated Video
What is Cyber Warfare
The employment of cyberattacks against an adversary state to disrupt critical computer systems and/or inflict damage on the same scale as physical conflict is known as cyberwarfare. Espionage, sabotage, propaganda, manipulation, and...
Curated Video
Blended Attacks
A complex cyberattack described as a "blended attack" makes use of a variety of malicious malware, computer viruses, worms, or Trojan horses in addition to several vulnerabilities in hardware or software that the attacker is aware of.
Curated Video
Email Security
This video will guide you on how to setup your email for optimal security in addition to tips on how to prevent malicious emails
Curated Video
Types of Malware
Software that has malicious intentions is referred to as malware. There are many different kinds of malware, and each one has a different means of getting onto your computer. These methods can involve stealing your personal information,...
Curated Video
What is a Phishing Attack
Phishing is a form of social engineering in which an attacker delivers a false message intended to dupe a person into giving up personal information to the attacker or to install harmful software, such as ransomware, on the victim's...
Curated Video
I WONDER - Why Should You Be Careful When Clicking On Online Links?
This video is answering the question of why should you be careful when clicking on online links.
Curated Video
Describe the different types of malware that could affect a computer system or network : Rootkits
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
AllTime 10s
10 Most Dangerous Places On The Internet
The Internet is a dark place, with scams, predators and viruses lurking everywhere. So which sites are the most dangerous? Alltime 10s investigates'
Curated Video
Describe the different types of malware that could affect a computer system or network : Understand the types of malware
From the section: What are the threats?. This section includes threats, types of malware and lot more. This video gives an overview of malware and threats. It shows how to recognize malware, types of malware and how devices get them.
The Wall Street Journal
Securing The Perimeter
Headed into an election year, are private and government systems ready to withstand sophisticated hacks and attempts to spread misinformation? Greylock's Sarah Guo and Crowdstrike's George Kurtz discuss at WSJ Tech Live in Laguna Beach.
Curated Video
Describe the different types of malware that could affect a computer system or network : Downloaders
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Next Animation Studio
North Korean hackers stole sensitive information from Microsoft users
Microsoft has filed a lawsuit against two anonymous North Korean hackers for stealing user information in a hacking operation called Thallium.
Curated Video
Describe the different types of malware that could affect a computer system or network : Keyloggers and Information Stealers
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
IDG TECHtalk
What is a deepfake? How to prepare for and respond to this cyber attack
As cyber criminals deploy more complex methods of hacking, using deepfakes to spread misinformation and “hack reality” have become more popular. This video, audio and/or text-based content is AI-generated and may be hard to discern from...