¿Hacer Pentest es un dolor de cabeza? Te entendemos.
CyScope
¿Hacer Pentest es un dolor de cabeza? Te entendemos.
0:52
¿Tu empresa esta lista para evitar ciberataques más destructivos?
CyScope
¿Tu empresa esta lista para evitar ciberataques más destructivos?
0:16
Secure code review - Open redirect vulnerability
CyScope
Secure code review - Open redirect vulnerability
1:55
Preguntas Frecuentes con CyScope
CyScope
Preguntas Frecuentes con CyScope
1:57
🔐 JWT Authentication Attack 🔐
CyScope
🔐 JWT Authentication Attack 🔐
1:37
2025 ¿Listos?
CyScope
2025 ¿Listos?
1:16
Exploiting LLM APIs with excessive agency
CyScope
Exploiting LLM APIs with excessive agency
1:46
¡Somos CyScope y esta es nuestra historia!
CyScope
¡Somos CyScope y esta es nuestra historia!
2:09
¡Cómo ViewIT 3D Mejoró su Seguridad y Conexión con sus Usuarios!
CyScope
¡Cómo ViewIT 3D Mejoró su Seguridad y Conexión con sus Usuarios!
2:24
3 universities suffered cyberattacks on their security systems
CyScope
3 universities suffered cyberattacks on their security systems
0:56
OSINT tip #6
CyScope
OSINT tip #6
2:10
OSINT Tips #5 Email enumeration
CyScope
OSINT Tips #5 Email enumeration
1:42
¿Por qué la ciberseguridad es clave en la minería?
CyScope
¿Por qué la ciberseguridad es clave en la minería?
0:50
3 Tips to Make the Most of the NIST CSF Framework in Your Organization
CyScope
3 Tips to Make the Most of the NIST CSF Framework in Your Organization
0:51
3 cualidades claves del Pentesting Continuo en las Fintech
CyScope
3 cualidades claves del Pentesting Continuo en las Fintech
0:50
Dos vulnerabilidades objetivo de los Programas de Bug Bounty en el sector de Telecomunicaciones
CyScope
Dos vulnerabilidades objetivo de los Programas de Bug Bounty en el sector de Telecomunicaciones
0:45
How to exfiltrate metadata from a picture
CyScope
How to exfiltrate metadata from a picture
1:57
reverse image search
CyScope
reverse image search
1:24
What is Google Hacking Database or Google Dorking?
CyScope
What is Google Hacking Database or Google Dorking?
2:18
How AI relates to digital asset protection
CyScope
How AI relates to digital asset protection
0:48
3 strengths of PTaaS in the education sector!
CyScope
3 strengths of PTaaS in the education sector!
0:55
3 key e-commerce elements improved by bug bounty!
CyScope
3 key e-commerce elements improved by bug bounty!
0:51
Enhancing E-commerce with PTaaS Implementation!
CyScope
Enhancing E-commerce with PTaaS Implementation!
0:52
Business Logic Vulnerabilities (OWASP Top 10 series)
CyScope
Business Logic Vulnerabilities (OWASP Top 10 series)
2:49
🔍 Integrate Security with CyScope 🔐
CyScope
🔍 Integrate Security with CyScope 🔐
0:57
How Can Pentest as a Service (PTaaS) Shape the Future of Cyber Penetration Testing?
CyScope
How Can Pentest as a Service (PTaaS) Shape the Future of Cyber Penetration Testing?
9:58
OWASP Top 10: What is Cross-Site Scripting (XSS)? 🛡️
CyScope
OWASP Top 10: What is Cross-Site Scripting (XSS)? 🛡️
3:23
Avoid making these mistakes when implementing PTaaS! 🔒
CyScope
Avoid making these mistakes when implementing PTaaS! 🔒
0:58
🔒OWASP Top 10:  Information Disclosure
CyScope
🔒OWASP Top 10: Information Disclosure
1:51
OWASP Top 10: What is OS Command Injection?
CyScope
OWASP Top 10: What is OS Command Injection?
2:36
The Advantage of Incorporating Pentesting into Your Company's SDLC!
CyScope
The Advantage of Incorporating Pentesting into Your Company's SDLC!
1:06
3 advantages of integrating ethical hacking in your company
CyScope
3 advantages of integrating ethical hacking in your company
1:09
Consider leveraging Bug Bounty if you operate within these fields!
CyScope
Consider leveraging Bug Bounty if you operate within these fields!
0:58
These are some of the key Benefits of PTaaS implementation!
CyScope
These are some of the key Benefits of PTaaS implementation!
1:07
Here are a few examples of sectors that need PTaaS
CyScope
Here are a few examples of sectors that need PTaaS
1:18
Discover effective strategies to safeguard your company's digital assets!
CyScope
Discover effective strategies to safeguard your company's digital assets!
1:32
For these reasons, security testing is essential to prevent cyber attacks.
CyScope
For these reasons, security testing is essential to prevent cyber attacks.
0:40
These are the stages of an optimal CTEM!
CyScope
These are the stages of an optimal CTEM!
1:29
Improve your software security by incorporating pentesting as a service into your SDLC!
CyScope
Improve your software security by incorporating pentesting as a service into your SDLC!
1:06
OWASP Top 10: Server side request forgery (SSRF)
CyScope
OWASP Top 10: Server side request forgery (SSRF)
3:06
Benefits of PTaaS
CyScope
Benefits of PTaaS
1:04
OWASP Top 10 - Insecure direct object references (IDOR)
CyScope
OWASP Top 10 - Insecure direct object references (IDOR)
2:13
Bug Bounty Tips Part 3
CyScope
Bug Bounty Tips Part 3
1:57
Bug Bounty Tips Part 2
CyScope
Bug Bounty Tips Part 2
2:13
Bug Bounty Tips Part 1
CyScope
Bug Bounty Tips Part 1
2:01
Interview with Ali Al Jabry, CEO at Kwema - CyScope
CyScope
Interview with Ali Al Jabry, CEO at Kwema - CyScope
1:34
Bug Bounty part 1
CyScope
Bug Bounty part 1
2:01
Abusing Lolbin binaries to exfiltrate data - CyScope
CyScope
Abusing Lolbin binaries to exfiltrate data - CyScope
2:00
Abusing Lolbin binaries to exfiltrate data
CyScope
Abusing Lolbin binaries to exfiltrate data
2:00
Android penetration, What to look for? - Part 2
CyScope
Android penetration, What to look for? - Part 2
2:27
Android penetration, What to look for? - Part 1
CyScope
Android penetration, What to look for? - Part 1
2:07
CyScope in the classroom
CyScope
CyScope in the classroom
0:35
CyScope experience with ViewIT 3D
CyScope
CyScope experience with ViewIT 3D
2:24
CyScope Cápsula 5 V2 INGLES
CyScope
CyScope Cápsula 5 V2 INGLES
2:06
CyScope Introduction
CyScope
CyScope Introduction
0:33
Testimonio de Clientes: Mejorando los niveles de seguridad de una compañía de seguros (Cap. 5)
CyScope
Testimonio de Clientes: Mejorando los niveles de seguridad de una compañía de seguros (Cap. 5)
2:06
Testimonio de Clientes: ¿qué criterios son importantes para asegurar resultados valiosos?
CyScope
Testimonio de Clientes: ¿qué criterios son importantes para asegurar resultados valiosos?
4:11
Testimonio de Clientes: ¿De qué manera el bug bounty se está utilizando hoy en BICE VIDA?
CyScope
Testimonio de Clientes: ¿De qué manera el bug bounty se está utilizando hoy en BICE VIDA?
1:59
Testimonio de Clientes: Mejorando los niveles de seguridad de BICE Vida (Cap. 2)
CyScope
Testimonio de Clientes: Mejorando los niveles de seguridad de BICE Vida (Cap. 2)
1:11
Testimonio de Clientes: Mejorando los niveles de seguridad de BICE Vida (Cap. 1)
CyScope
Testimonio de Clientes: Mejorando los niveles de seguridad de BICE Vida (Cap. 1)
1:53