Videos worth watching

More videos

Black Hat USA 2025 | No Hoodies Here: Organized Crime in AdTech
  

Black Hat USA 2025 | No Hoodies Here: Organized Crime in AdTech

For nearly a decade, traffic distribution systems (TDSs) have enabled cybercriminals to hide the true nature of their operations. A

Black Hat USA 2025 | Weaponization of Cellular Based IoT Technology
  

Black Hat USA 2025 | Weaponization of Cellular Based IoT Technology

As IoT devices continue to integrate cellular technologies for communication, the potential risk for adversaries to weaponize the hardware’s trust

new phone who dis?
  

new phone who dis?

( big thanks livestream partner https://jh.live/specterops )John HammondRead More

Black Hat USA 2025 | China’s 5+ Year Campaign to Penetrate Perimeter Network Defenses
  

Black Hat USA 2025 | China’s 5+ Year Campaign to Penetrate Perimeter Network Defenses

For more than five years, firewall vendors have been under a persistent, cyclical struggle against a well-resourced and relentless China-based

NahamSec Teaches Me Bug Bounty Basics
  

NahamSec Teaches Me Bug Bounty Basics

Big thanks to @NahamSec for showing me the ropes for bug bounty 😎 You can try his “BlueWings” demo challenge

How Right Wing Influencers Infiltrated The Government | WIRED
  

How Right Wing Influencers Infiltrated The Government | WIRED

The ascent of right wing political influencers in American society, and their primacy in conservative pop culture, has underpinned much

Black Hat USA 2025 | Clue-Driven Reverse Engineering by LLM in Real-World Malware Analysis
  

Black Hat USA 2025 | Clue-Driven Reverse Engineering by LLM in Real-World Malware Analysis

IDA Pro feat. MCP (Model Context Protocol) is truly amazing! Through interactive chat windows, LLM can automatically complete reverse engineering

Chrome Is Thinking Quantum – Threat Wire
  

Chrome Is Thinking Quantum – Threat Wire

⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️ @endingwithali → Twitch: https://twitch.tv/endingwithali Twitter: https://twitter.com/endingwithali YouTube: https://youtube.com/@endingwithali Everywhere else:

Black Hat USA 2025 | Hack to the Future: Owning AI-Powered Tools with Old School Vulns
  

Black Hat USA 2025 | Hack to the Future: Owning AI-Powered Tools with Old School Vulns

Harder, Better, Faster, Stronger isn’t just the title of a Daft Punk song; it’s also what developers hope to get

Black Hat USA 2025 | How to Secure Unique Ecosystem Shipping 1 Billion+ Cores?
  

Black Hat USA 2025 | How to Secure Unique Ecosystem Shipping 1 Billion+ Cores?

Security research has historically been focused on securing well-known, widely replicated ecosystems—where problems and solutions are shared across the industry.