XSS Attacks Explained | How Hackers Exploit | How to Defend
![](https://i.ytimg.com/vi/4EmstuO0Em8/mqdefault.jpg)
49:50
DEF CON 32 - Disenshittify or die! How hackers can seize the means of computation - Cory Doctorow
![](https://i.ytimg.com/vi/MmpkfM8I33Q/mqdefault.jpg)
24:58
DEF CON 32 - Hacking Millions of Modems and Investigating Who Hacked My Modem - Sam Curry
![](https://i.ytimg.com/vi/0IHXaGZqB64/mqdefault.jpg)
24:27
Linux Basics for Hackers: A Beginner's Guide to Ethical Hacking
![](https://i.ytimg.com/vi/6D4rsqxqSIc/mqdefault.jpg)
14:46
China's slaughterbots show WW3 would kill us all.
![](https://i.ytimg.com/vi/fKVKD3AbmQs/mqdefault.jpg)
12:28
How to Sell Cybersecurity Services and the NEW Normal | 2023 SMB TechFest Q1
![](https://i.ytimg.com/vi/TLPHmHPaCiQ/mqdefault.jpg)
34:40
Where People Go When They Want to Hack You
![](https://i.ytimg.com/vi/Vj1uh89v-Sc/mqdefault.jpg)
31:07
Hacking Windows TrustedInstaller (GOD MODE)
![](https://i.ytimg.com/vi/dgjjM3saWoY/mqdefault.jpg)
21:26