BiBi Wiper and similar Wiper class malware have used clever tactics to look like they are signed by an antivirus (ESET). In this … source
Windows Defender vs Top 100 Infostealers
Windows Defender Test vs Top 100 Infostealer malware: Are you safe against infostealers? Is Microsoft Defender good enough … source
Andrew Tate Hacked: The Fallout
Andrew Tate, the most googled person, has got his main platform, university.com, hustler’s university or the real world hacked, … source
How not to Pirate: Malware in Torrents
How not to Pirate: Malware in Torrents, Steelfox an infostealer that uses vulnerable drivers to hack your computer and steal credit … source
Debloat Windows 11: The Ultimate Guide
How to debloat Windows 11 using a variety of approaches, this video is a guide to custom distros, powershell scripts and tools like … source
Best Antivirus vs Unknown Ransomware II
Best Antivirus vs Unknown Ransomware Part II: In this video we test Kaspersky vs Bitdefender vs ESET vs Malwarebytes. source
Can you spot if you have malware being installed?
People often ask: Do I have malware? Could you spot it getting installed? In this video we will be looking at a fake Nvidia Driver … source
ThreatLocker: Zero Trust vs Malware & Exploits
Testing Threatlocker vs Malware to see if zero trust is an effective strategy for the future to prevent hacking attempts. The test … source
How Hackers make Undetectable Malware
How Hackers make Undetectable Malware using packers, malware builders and packing techniques: This demo shows UPX and … source
Edge Update Malware
Microsoft Edge Update Malware: A webpage masquerading as a Microsoft Edge Upgrade (microsoftedgeupgrade.com) is serving … source
UltraAV: Kaspersky's replacement after US Ban
UltraAV vs Kaspersky: Kaspersky deleted itself in the US and replaced itself with its partner UltraAV after being banned by the US … source
Learning Malware Analysis with NoEscape Ransomware
NoEscape is one of the most infamous ransomware families of the year, in this video we will explore executable file properties and … source
Windows Defender CFA bypassed by Ransomware
Windows Defender Controlled Folder Access is its main ransomware protection feature which can be completely bypassed by … source
How you get hacked: Undetected Malware
How you get hacked: You will be shocked to know most malware is actually undetected on VirusTotal when released. This video … source
Why Linus keeps getting Hacked
Linus Tech Tips Twitter was hacked recently, through a targeted phishing campaign. As a cybersecurity YouTuber I receive similar … source
Fake Google Authenticator Malware
Fake Google Authenticator Ads lead to infostealer malware, straight from Google search ads, the listing even says it’s verified by … source