Videos worth watching

More videos

Utilizing AI Models to Conceal and Extract Commands in C2 Images
  

Utilizing AI Models to Conceal and Extract Commands in C2 Images

AI-Powered Image-Based Command and Control (C2) Framework: Utilizing AI Models to Conceal and Extract Commands in C2 Images Generative AI

The Problems of Embedded Python in Excel, or How to Excel in Pwning Pandas
  

The Problems of Embedded Python in Excel, or How to Excel in Pwning Pandas

In Windows build 2407, Microsoft released Python support inside Excel as embedded =PY() functions. According to the Microsoft website: “Python

Immigration Lawyer Answers Immigration Questions | Tech Support | WIRED
  

Immigration Lawyer Answers Immigration Questions | Tech Support | WIRED

Professor and immigration lawyer Charles Kuck joins WIRED to answer the internet’s burning questions about immigration. Can ICE arrest people

What do you think they did with these bad TLS Certs? #technews #cybersecurity @endingwithali
  

What do you think they did with these bad TLS Certs? #technews #cybersecurity @endingwithali

Hak5 — Cyber Security Education, Inspiration, News & Community since 2005: —–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆ Our Site → https://www.hak5.org Shop → http://hakshop.myshopify.com/ Community

  

OpenAI’s Study on How We Use AI, a Potential TikTok Sale, Spotify Will Finally Deliver Lossless Audio | Tech Today

The creator of ChatGPT published a paper on how people use the chatbot. TikTok may avoid a national ban with

Keynote: The New Frontline: Cyber on the Precipice
  

Keynote: The New Frontline: Cyber on the Precipice

We are standing on the edge of the unprecedented. The attack surface is no longer just code or infrastructure—it’s people,

Keynote: Three Decades in Cybersecurity: Lessons Learned and What Comes Next
  

Keynote: Three Decades in Cybersecurity: Lessons Learned and What Comes Next

Cybersecurity isn’t just about protecting computers – it’s about securing society. For over thirty years, Mikko Hypponen has been at

KernelSnitch: Leaking Kernel Heap Pointers by Exploiting Software-Induced Side-Channel Leakage
  

KernelSnitch: Leaking Kernel Heap Pointers by Exploiting Software-Induced Side-Channel Leakage

KernelSnitch: Leaking Kernel Heap Pointers by Exploiting Software-Induced Side-Channel Leakage of Kernel Hash Tables In this talk, we present a

CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks
  

CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks

Content Delivery Networks (CDNs) are widely adopted to enhance web performance and offer protection against DDoS attacks. However, our research

Hackers turns 30! 💾 Austin Screening Details
  

Hackers turns 30! 💾 Austin Screening Details

https://hak5.org/hackers Join Darren Kitchen and co for a special Hak5 meetup celebrating the 30 year anniversary of Hackers with a