Uncovering the Secrets of A.I. Security Vulnerability Research

Tech Experts

Uncovering the Secrets of A.I. Security Vulnerability Research

2 years ago - 0:59

Alex Ionescu - DEEP 2023: The next five years of platform security vulnerability research

DEEP Conference

Alex Ionescu - DEEP 2023: The next five years of platform security vulnerability research

7 months ago - 59:51

Getting started in security research - Kevin Backhouse

GitHub Education

Getting started in security research - Kevin Backhouse

4 years ago - 22:25

API security, vulnerability research and LGBTQ+ representation | Cyber Work Podcast

Infosec

API security, vulnerability research and LGBTQ+ representation | Cyber Work Podcast

4 years ago - 58:10

lateral movement | Lateral Movement with Local Administrator | Red Teaming | Privilege Escalation

Hacker Zone

lateral movement | Lateral Movement with Local Administrator | Red Teaming | Privilege Escalation

4 months ago - 9:38

DEEP Conference

DEEP Conference

@deepconference6925 subscribers

2023 ERI Summit: Security in the Face of Microelectronics Supply Chain (Cyr)

DARPAtv

2023 ERI Summit: Security in the Face of Microelectronics Supply Chain (Cyr)

1 year ago - 9:32

How to speed R&D and deter advanced cyber threats

Leidos

How to speed R&D and deter advanced cyber threats

3 years ago - 26:18

[New Report] State of the Attack Surface 2023

Halo Security

[New Report] State of the Attack Surface 2023

2 years ago - 0:32

Final Year Project-Presentation

Lang Kwong Sheng

Final Year Project-Presentation

3 years ago - 9:31

Proposal For IT Security Expert

Jerome Hutcheson

Proposal For IT Security Expert

4 years ago - 0:50

Paul Harvey - Microarchitectural attacks

BSides Canberra

Paul Harvey - Microarchitectural attacks

7 years ago - 27:44

DEF CON 20 - Martin Gallo - Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol

DEFCONConference

DEF CON 20 - Martin Gallo - Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol

11 years ago - 40:08

USENIX Security '22 - Networks of Care: Tech Abuse Advocates' Digital Security Practices

USENIX

USENIX Security '22 - Networks of Care: Tech Abuse Advocates' Digital Security Practices

2 years ago - 11:54

Setup Havoc C2 Redirectors In Just 7 Minutes

Lsecqt

Setup Havoc C2 Redirectors In Just 7 Minutes

1 year ago - 7:03

Researching Android Device Security with the Help of a Droid Army

All Hacking Cons

Researching Android Device Security with the Help of a Droid Army

3 years ago - 58:01

BlueHat 2023 Lightning Talk: No Self Driving Cars

Microsoft Security Response Center (MSRC)

BlueHat 2023 Lightning Talk: No Self Driving Cars

2 years ago - 12:29

Operation Diplomatic Specter: An Active Chinese Cyber Espionage Campaign - by Lior Rochberger

Infosec In the City

Operation Diplomatic Specter: An Active Chinese Cyber Espionage Campaign - by Lior Rochberger

7 months ago - 35:17

How To Bypass ANY Anti-Virus With This POWERFUL Technique

Lsecqt

How To Bypass ANY Anti-Virus With This POWERFUL Technique

1 year ago - 8:11

Assessing e-Government DNS Resilience

FIRST

Assessing e-Government DNS Resilience

1 year ago - 19:58

1Power CyberSec Research & Analysis.

EasyTech4all

1Power CyberSec Research & Analysis.

4 years ago - 2:37

Defending Your Digital Frontier: Chris Wysopal on Reducing Attack Surface in the Age of AI

OODA

Defending Your Digital Frontier: Chris Wysopal on Reducing Attack Surface in the Age of AI

3 months ago - 51:27

UnsafLok

Ro Drop

UnsafLok

1 year ago - 10:04

Kingpin with Joe Grand

BarCode

Kingpin with Joe Grand

3 years ago - 52:57

Impact Startups in AI Safety - Esben Kran

Apart - Safe AI

Impact Startups in AI Safety - Esben Kran

Streamed 10 months ago - 50:10

microsoft uncovered vulnerability in macos

CSI digital

microsoft uncovered vulnerability in macos

2 years ago - 6:25

Defending against cloud cross-tenant vulnerabilities - Tzah Pahima & Yanir Tsarimi

fwd:cloudsec

Defending against cloud cross-tenant vulnerabilities - Tzah Pahima & Yanir Tsarimi

2 years ago - 25:16

Breaking barriers, one byte at a time. [Research Saturday]

N2K Networks

Breaking barriers, one byte at a time. [Research Saturday]

3 months ago - 19:29

Turning the Tables: Honeypots Flawed Logic and Counter-Intelligence By Sheila A. Berta (2023)

Swiss Cyber Storm

Turning the Tables: Honeypots Flawed Logic and Counter-Intelligence By Sheila A. Berta (2023)

1 year ago - 28:48

BSides PDX 2023 - Keynote (Joe Grand)

BSides Portland

BSides PDX 2023 - Keynote (Joe Grand)

1 year ago - 46:03

MSF-ADV talk @ IEEE S&P'21

ASGuard UC-Irvine

MSF-ADV talk @ IEEE S&P'21

4 years ago - 14:47

The Rise of Artificial Intelligence

Risk Group LLC

The Rise of Artificial Intelligence

9 years ago - 1:25:27

Steganography Project Proposal

Falcon Punch

Steganography Project Proposal

4 years ago - 3:50

CERIAS Symposium 2017 - Day 2 Keynote - David Meltzer - Tripwire

Purdue CERIAS

CERIAS Symposium 2017 - Day 2 Keynote - David Meltzer - Tripwire

8 years ago - 1:06:02

Cyber Attacks are on the increase

CIPS - Canada’s Association of I.T. Professionals

Cyber Attacks are on the increase

8 years ago - 1:30:36

Haim Ateya on the Shared Mentality at Aqua

Aqua Security

Haim Ateya on the Shared Mentality at Aqua

2 years ago - 0:53

Recon 2017 Brx - Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware

Recon Conference

Recon 2017 Brx - Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware

2 years ago - 40:56

Session 11: The Power of Sneaky Power!

IEEE Int'l Symposium on HOST

Session 11: The Power of Sneaky Power!

2 years ago - 58:15

Tools for Food Security Monitoring and Analysis in Asia and the Pacific

ADB Food Security Forum

Tools for Food Security Monitoring and Analysis in Asia and the Pacific

1 year ago - 1:10:17

How well do you know SSL?

Help Net Security

How well do you know SSL?

13 years ago - 4:38