Home
AI Cybersecurity Risks from Microsoft Copilot
3 days ago
5:31
Common Cybersecurity Threats from AI: What You Need to Know
9 days ago
8:48
2024 Hacking Trends & Updates from Black Hat & DEFCON
3 weeks ago
57:31
Pentest Pro Tips with Tom: F5 Big-IP Post Exploitation Techniques
1 month ago
20:42
The Difference Between Penetration Testing and Vulnerability Scanning
1 month ago
4:45
How the Dark Web Works 2024
1 month ago
1:01:21
How to Run an Effective Vulnerability Management Program
2 months ago
6:04
Why You Need Continuous External Vulnerability Scanning
2 months ago
5:22
How You and Attackers Can Use Shodan to Understand Your Network's Attack Surface
2 months ago
3:20
Quick Tips for Better Attack Surface Management
2 months ago
4:29
Navigating the Storm: Effective Incident Response in the Modern Cyber Landscape
3 months ago
47:16
The Human Firewall: Cybersecurity Staffing and Training
3 months ago
1:00:42
Black Hat 2024 360° Ransomware Response Bootcamp Training Class Teaser - Taught by LMG Security
4 months ago
1:33
2024 Change Healthcare Breach Case Study
4 months ago
3:25
2024 Ransomware Attack Trends
4 months ago
8:05
Ransomware Reshaped: Evolving Your Defenses
4 months ago
55:56
What is WormGPT? The Evil AI for Cybercriminals.
5 months ago
12:39
Demystifying Cryptography and Cryptocurrency
6 months ago
56:56
Securing Your Attack Surface
6 months ago
58:08
Business Email Compromise Case Study
6 months ago
15:44
Demo of the ConnectWise ScreenConnect Vulnerability
6 months ago
1:44
Top Cybersecurity Threats of 2024
7 months ago
1:03:15
How Voice Cloning is Used in Social Engineering and MFA Bypass Attacks
8 months ago
10:22
How Criminals Bypass Multi-Factor Authentication (MFA)
8 months ago
4:18
How Passwordless Authentication Solutions Work
8 months ago
6:44
Case Study: 23andMe Users Hacked
8 months ago
5:52
Tom's Pentest Hack of the Week #10: Watch the Flipper Zero in a Physical Penetration Test
8 months ago
0:53
Tom's Pentest Hack of the Week #8: Using Default Credentials for UPS Battery Backup
9 months ago
3:34
Forget Your Password: Voice Cloning, MFA Attacks, and Our Passwordless Future
9 months ago
58:02
Tom's Pentest Hack of the Week #9: Unrestricted Custom Active Directory Templates
9 months ago
2:32