Marcus Hutchins
Malware analysis, reverse engineering, and threat intelligence with a focus on technical education and debunking myths.
Nutrition Label
Marcus Hutchins delivers high-fidelity cybersecurity analysis that prioritizes code-level evidence over fear-mongering. Viewers can expect rigorous deconstructions of sensational news stories where he explains underlying technical realities using live demonstrations of tools like Wireshark and decompilers. While the technical depth is exceptional, the content remains accessible to motivated learners, bridging the gap between complex exploits and general security concepts.
Strengths
- +
- +
- +
Notes
- !Check video descriptions for partnership details, as some content includes tracking links or webinar contexts.
- !Technical claims are frequently validated through live code execution and packet analysis rather than slides.
Why this score
“So if we look at the code here, we can see it's importing a bunch of libraries... and then it has this massive base64 encoded string.”
The creator directly interacts with the malware sample, walking through the raw Python code and deobfuscating it on screen rather than relying on screenshots or third-party reports.
Open receiptTrust Breakdown
Mixed / General Lens: Scored with the default trust weighting.
Confidence pending. Based on 10 long-form videos.
These six Trust Core outputs drive the public creator rating. Communication affects discovery ranking separately. Methodology →
Recent Videos

Is Cybersecurity Over?

RSAC Vlog - Day 2, part 1: The ICS Village

How To Travel Efficiently By Being Insane | RSAC 2026 Vlog - Part 1

How North Korean Spies Hack Developers

China Just Automated Cyberattacks With AI

Think Like An Attacker, Defend Like a Pro | ManageEngine Webinar

Did The Secret Service Really Foil A Plot To Destroy New York's Cellphone Infrastructure?

Are LLMs Intelligent? Debating AI Researcher Daniel Miessler

Cyberwar With Iran: How Bad Could It Get? | Hacker Explains

NSA Says Fast Flux Is A National Security Threat, But What Is It?

Public Wi-Fi Is Safer Than You Think

Getting Started With Reverse Engineering | TryHackMe Advent Of Cyber - Day 21 Walkthrough

Bypassing App-Bound Encryption To Dump Browser Credentials | HuntersCON 2024 Keynote
Shareable card
A compact ReReview card and short URL for sharing this trust score.