Channel Avatar

PurpleSec @UCJ_dsa5WPjwNGK8PLnB18Bw@youtube.com

5.9K subscribers - no pronouns :c

Welcome to the PurpleSec YouTube channel where you’ll find a


35:38
Is AI The Future Of Penetration Testing?
30:34
10 Cybersecurity Tips For Small Businesses
22:52
Web Application Penetration Testing: Steps, Methods, & Tools | PurpleSec
36:34
Why You Should Learn AI In Cybersecurity
28:00
How LLMs Are Being Exploited
43:31
The Value Of A vCISO For Small Business
46:02
Vulnerability Management Metrics: Top 10 KPIs To Measure Success
39:05
Vulnerability Management SOP: Expert Reveals Top Tips
01:00:52
Top 10 Vulnerability Management Trends For 2024
42:29
Techniques To Improve Vulnerability Visibility & Detection
28:42
Risk-Based Vulnerability Management
14:27
How To Build A Vulnerability Management Program | #PurpleSec
19:29
How To Automate Your Vulnerability Remediation Process | PurpleSec
04:34
Twitter Zero-Day Exposes Data Of 5.4 MILLION Accounts | Security Insights By #PurpleSec
16:39
What Is Vulnerability Management? (Explained By Experts)
04:54
Hertzbleed Attack Impacting Intel & AMD CPUs | Security Insights By PurpleSec
05:19
PACMAN M1 Chip Attack Explained | Security Insights By PurpleSec
04:13
Cleartrip Suffers Massive Data Breach | Security Insights By PurpleSec
06:11
Maui Ransomware Attacking Healthcare | Security Insights By PurpleSec
05:07
Conti Costa Rica Ransomware Attack Explained | Security Insights By PurpleSec
39:50
Why Is Social Engineering Effective? (Expert Explains)
16:41
Saudi Aramco $50 Million Data Breach Explained | Breach Report
29:38
Kaseya Ransomware Attack Explained: What You Need To Know | Breach Report
14:04
Are Cyber Criminals Coming After Your Video Games? | PurpleSec
39:12
JBS, The World’s Largest Beef Producer Pays $11 Million Ransom Following An Attack | PurpleSec
31:30
Is Your Employer Spying On You To Protect Themselves? | PurpleSec
24:21
Reddit, Twitch, Amazon, & Others Go Dark As Cloud Provider Fastly Experiences An Outage | PurpleSec
24:03
Pulse Secure VPN Breach: What Happened & What Are The Implications? | PurpleSec
59:56
Phishing, Ransomware, & Supply Chain Attacks Dominate The 2021 Threat Landscape | Breach Report
01:03:12
Accellion Breach Continues Compromising Top University Security | Breach Report
51:52
Forex Trader FBS Breaches Itself Exposing 20 TB Of Confidential Data | Breach Report
57:16
Cryptocurrency & NFTs Are Not As Secure As You Think | Breach Report
47:50
Beer Giant Molson Coors Production Stopped By Cyber Attack | Breach Report
29:36
What Is A Security Operations Center? (SOC Expert Explains) | PurpleSec
42:53
New Malware Discovered Linked To SolarWinds Attack (Nobelium) | Breach Report
34:51
Silver Sparrow Malware Infects Macs & CD Projekt Red's Source Code Leaked | Breach Report
20:19
The 3 Types Of Security Controls (Expert Explains) | PurpleSec
54:44
Accellion Data Breach: What We Know So Far | Breach Report
28:44
3 More Vulnerabilities Found In SolarWinds Attack | Breach Report
22:19
10 Cyber Security Trends You Can't Ignore In 2021 | PurpleSec
01:06:31
North Korean APT ZINC Attacks Threat Researchers | Breach Report
41:16
SolarWinds Hackers Breach Malwarebytes In Latest Attack | Breach Report
30:06
What Are The Cyber Security Implications Of The Capitol Attack? | Breach Report
45:32
Preventing The SolarWinds Supply Chain Attack Using Zero Trust? | Weekly Ingest
20:08
Drovorub Malware Exposed, Egregor Ransomware Variant, & A WordPress Zero-Day | Weekly Ingest
21:58
Spotify, Foxconn, Panasonic, DCA, & GBMC Cyber Incidents | Breach Report
27:54
cPanel Vulnerability Bypasses 2FA & Google Pixel’s Titan Security Module | Weekly Ingest
56:48
Advanced Persistent Threat (APT) Groups | Weekly Ingest
41:41
Bypassing MFA & Web App Security Threats In Retail | Weekly Ingest
18:04
7 Data Loss Prevention Best Practices (Expert Explains) | PurpleSec
17:14
What Are The Types Of Penetration Testing? | PurpleSec
21:24
Common Types Of Network Security Vulnerabilities | PurpleSec
12:16
Red Team VS Blue Team: What’s The Difference? | PurpleSec
15:46
Firewall Penetration Testing: Steps, Methods, & Tools | PurpleSec
02:06
Our Cyber Security Experts | Purplesec
05:19
How Often Should You Perform A Network Vulnerability Scan? | PurpleSec