Videos worth watching

More videos

XUnprotect: Reverse Engineering macOS XProtect Remediator
  

XUnprotect: Reverse Engineering macOS XProtect Remediator

The macOS threat landscape has changed considerably in recent years with the ever-increasing prevalence of macOS malware. In response, Apple

Weaponizing Apple AI for Offensive Operations
  

Weaponizing Apple AI for Offensive Operations

Apple’s on device AI frameworks CoreML, Vision, AVFoundation enable powerful automation and advanced media processing. However, these same capabilities introduce

JHT Course Launch! Constructing Defense 2026 – AI Assisted
  

JHT Course Launch! Constructing Defense 2026 – AI Assisted

Just Hacking Training Livestream, Live Demo and AMA with Anton Ovrutsky for Constructing Defense 2026: now with a teaching assistant!

Kiberbiztonság ma: Újragondolják a brit kiberszabályozás, a magyar pedig csak simán változik
  

Kiberbiztonság ma: Újragondolják a brit kiberszabályozás, a magyar pedig csak simán változik

A brit kormány radikális fordulatot jelentett be a kiberbiztonság terén, elismerve, hogy az eddigi évek stratégiái nem hozták meg a

No VPN Needed? Cryptographic Attacks Against the OPC UA Protocol
  

No VPN Needed? Cryptographic Attacks Against the OPC UA Protocol

OPC UA is a standardized communication protocol that is widely used in the areas of industrial automation and IoT. It

Lost in Translation: Exploiting Unicode Normalization
  

Lost in Translation: Exploiting Unicode Normalization

As web applications evolve, so do their data processing pipelines—handling Unicode normalization, encoding, and translation before storing or executing user

From Spoofing to Tunneling: New Red Team’s Networking Techniques for Initial Access and Evasion
  

From Spoofing to Tunneling: New Red Team’s Networking Techniques for Initial Access and Evasion

Gaining initial access to an intranet is one of the most challenging parts of red teaming. If an attack chain

Doctor Answers Longevity Questions | Tech Support | WIRED
  

Doctor Answers Longevity Questions | Tech Support | WIRED

Dr. Dan Belsky joins WIRED to answer the internet’s burning questions about longevity and epidemiology. Why do we grow old