Uncovering the Secrets of A.I. Security Vulnerability Research

Tech Experts

Uncovering the Secrets of A.I. Security Vulnerability Research

2 years ago - 0:59

Alex Ionescu - DEEP 2023: The next five years of platform security vulnerability research

DEEP Conference

Alex Ionescu - DEEP 2023: The next five years of platform security vulnerability research

7 months ago - 59:51

API security, vulnerability research and LGBTQ+ representation | Cyber Work Podcast

Infosec

API security, vulnerability research and LGBTQ+ representation | Cyber Work Podcast

4 years ago - 58:10

2023 ERI Summit: Security in the Face of Microelectronics Supply Chain (Cyr)

DARPAtv

2023 ERI Summit: Security in the Face of Microelectronics Supply Chain (Cyr)

1 year ago - 9:32

DEEP Conference

DEEP Conference

@deepconference6925 subscribers

[New Report] State of the Attack Surface 2023

Halo Security

[New Report] State of the Attack Surface 2023

2 years ago - 0:32

lateral movement | Lateral Movement with Local Administrator | Red Teaming | Privilege Escalation

Hacker Zone

lateral movement | Lateral Movement with Local Administrator | Red Teaming | Privilege Escalation

5 months ago - 9:38

Final Year Project-Presentation

Lang Kwong Sheng

Final Year Project-Presentation

3 years ago - 9:31

How to speed R&D and deter advanced cyber threats

Leidos

How to speed R&D and deter advanced cyber threats

3 years ago - 26:18

Operation Diplomatic Specter: An Active Chinese Cyber Espionage Campaign - by Lior Rochberger

Infosec In the City

Operation Diplomatic Specter: An Active Chinese Cyber Espionage Campaign - by Lior Rochberger

8 months ago - 35:17

USENIX Security '22 - Networks of Care: Tech Abuse Advocates' Digital Security Practices

USENIX

USENIX Security '22 - Networks of Care: Tech Abuse Advocates' Digital Security Practices

2 years ago - 11:54

Proposal For IT Security Expert

Jerome Hutcheson

Proposal For IT Security Expert

4 years ago - 0:50

Researching Android Device Security with the Help of a Droid Army

All Hacking Cons

Researching Android Device Security with the Help of a Droid Army

3 years ago - 58:01

How To Bypass ANY Anti-Virus With This POWERFUL Technique

Lsecqt

How To Bypass ANY Anti-Virus With This POWERFUL Technique

1 year ago - 8:11

Paul Harvey - Microarchitectural attacks

BSides Canberra

Paul Harvey - Microarchitectural attacks

7 years ago - 27:44

BlueHat 2023 Lightning Talk: No Self Driving Cars

Microsoft Security Response Center (MSRC)

BlueHat 2023 Lightning Talk: No Self Driving Cars

2 years ago - 12:29

Defending Your Digital Frontier: Chris Wysopal on Reducing Attack Surface in the Age of AI

OODA

Defending Your Digital Frontier: Chris Wysopal on Reducing Attack Surface in the Age of AI

4 months ago - 51:27

A Conversation with Pete Allor - Vulnerabilities, Community Efforts, Communication, and More...

Good Faith Cybersesecurity Researchers Coalition

A Conversation with Pete Allor - Vulnerabilities, Community Efforts, Communication, and More...

2 years ago - 55:36

Defending against cloud cross-tenant vulnerabilities - Tzah Pahima & Yanir Tsarimi

fwd:cloudsec

Defending against cloud cross-tenant vulnerabilities - Tzah Pahima & Yanir Tsarimi

2 years ago - 25:16

1Power CyberSec Research & Analysis.

EasyTech4all

1Power CyberSec Research & Analysis.

4 years ago - 2:37

Setup Havoc C2 Redirectors In Just 7 Minutes

Lsecqt

Setup Havoc C2 Redirectors In Just 7 Minutes

1 year ago - 7:03

Kingpin with Joe Grand

BarCode

Kingpin with Joe Grand

3 years ago - 52:57

The Rise of Climate-Driven Security Threats in South Asia: A Case Study of Bangladesh

BIPSS

The Rise of Climate-Driven Security Threats in South Asia: A Case Study of Bangladesh

6 months ago - 2:54

Turning the Tables: Honeypots Flawed Logic and Counter-Intelligence By Sheila A. Berta (2023)

Swiss Cyber Storm

Turning the Tables: Honeypots Flawed Logic and Counter-Intelligence By Sheila A. Berta (2023)

1 year ago - 28:48

Breaking barriers, one byte at a time. [Research Saturday]

N2K Networks

Breaking barriers, one byte at a time. [Research Saturday]

4 months ago - 19:29

Assessing e-Government DNS Resilience

FIRST

Assessing e-Government DNS Resilience

1 year ago - 19:58

microsoft uncovered vulnerability in macos

CSI digital

microsoft uncovered vulnerability in macos

3 years ago - 6:25

BSides PDX 2023 - Keynote (Joe Grand)

BSides Portland

BSides PDX 2023 - Keynote (Joe Grand)

1 year ago - 46:03

Tools for Food Security Monitoring and Analysis in Asia and the Pacific

ADB Food Security Forum

Tools for Food Security Monitoring and Analysis in Asia and the Pacific

1 year ago - 1:10:17

The Rise of Artificial Intelligence

Risk Group LLC

The Rise of Artificial Intelligence

9 years ago - 1:25:27

MSF-ADV talk @ IEEE S&P'21

ASGuard UC-Irvine

MSF-ADV talk @ IEEE S&P'21

4 years ago - 14:47

#HITB2018AMS KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio

Hack In The Box Security Conference

#HITB2018AMS KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio

7 years ago - 45:06

UnsafLok

Ro Drop

UnsafLok

1 year ago - 10:04

Steganography Project Proposal

Falcon Punch

Steganography Project Proposal

4 years ago - 3:50

Cyber Attacks are on the increase

CIPS - Canada’s Association of I.T. Professionals

Cyber Attacks are on the increase

8 years ago - 1:30:36

Haim Ateya on the Shared Mentality at Aqua

Aqua Security

Haim Ateya on the Shared Mentality at Aqua

2 years ago - 0:53

The Threats of Generative AI & Harnessing AI for a Secure Future | AhnLab ISF 2024

AhnLab Global

The Threats of Generative AI & Harnessing AI for a Secure Future | AhnLab ISF 2024

8 months ago - 19:35

Recon 2017 Brx - Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware

Recon Conference

Recon 2017 Brx - Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware

2 years ago - 40:56

Security Implications of Oracle Product Desupport

Integrigy

Security Implications of Oracle Product Desupport

10 years ago - 54:09

#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger

Hack In The Box Security Conference

#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger

7 years ago - 44:08

Ransomware Attack Awareness Protecting College Students

Dedy Syamsuar

Ransomware Attack Awareness Protecting College Students

4 months ago - 14:20

Uncloaking IP Addresses on FreeNode IRC Demo From Derbycon

decalresponds

Uncloaking IP Addresses on FreeNode IRC Demo From Derbycon

8 years ago - 1:59

[LMSW2025] Advancing Risk Assessment, Safety Alignment, and Guardrail Systems for AI Agents, Bo Li

AIDXTECH

[LMSW2025] Advancing Risk Assessment, Safety Alignment, and Guardrail Systems for AI Agents, Bo Li

3 months ago - 44:43

DomesticPreparedness.com: Advancing Technology in Biological Surveillance & Detection

Martin Masiuk

DomesticPreparedness.com: Advancing Technology in Biological Surveillance & Detection

12 years ago - 13:10

LISA18 - Engineering an IP Portfolio

USENIX

LISA18 - Engineering an IP Portfolio

6 years ago - 45:44

How I Almost Got Phished (as a Security Professional)

The Cyber Mentor

How I Almost Got Phished (as a Security Professional)

2 days ago - 2:57

"Cracking the Code: Unveiling Authentication Bypass & Username Enumeration via Bruteforce Attack"

pentestguru

"Cracking the Code: Unveiling Authentication Bypass & Username Enumeration via Bruteforce Attack"

1 year ago - 24:56

Japtron

Japtron

Empresario, Hacker (de los buenos). España - Andorra Private Investigator Computer Security, vulnerability research, ...

@Japtron subscribers

Nullcon Goa 2023 | Hacking Mitsubishi PLC Without Access To Firmware by Anton Dorfman

nullcon

Nullcon Goa 2023 | Hacking Mitsubishi PLC Without Access To Firmware by Anton Dorfman

1 year ago - 39:31

IronBox Webinar - Top Signs You're Prime for a Data Breach in 2014

IronBox

IronBox Webinar - Top Signs You're Prime for a Data Breach in 2014

11 years ago - 34:59

How well do you know SSL?

Help Net Security

How well do you know SSL?

13 years ago - 4:38

David Meltzer - Trends in CyberSecurity

SMPTE - Sacramento Section

David Meltzer - Trends in CyberSecurity

8 years ago - 1:24:13

Apple lost years long lawsuit to Corellium trying to ban iOS virtual machines - News #32305

News Source Crawler

Apple lost years long lawsuit to Corellium trying to ban iOS virtual machines - News #32305

2 years ago - 0:07

Aseem Jakhar

Aseem Jakhar

Welcome to the world of Aseem Jakhar — Cybersecurity Entrepreneur, Technologist, and Builder. With over 20 years in security ...

@aseemjakhar subscribers

Apple Device Enrollment Program vulnerabilities explored — Research Saturday

N2K Networks

Apple Device Enrollment Program vulnerabilities explored — Research Saturday

6 years ago - 17:25

Bio-Cyber Challenge: Panel 3

Research at Colorado State University

Bio-Cyber Challenge: Panel 3

Nina Ali ...

3 years ago - 1:00:30

Hacking with Friends Live: Weekly Security News and Hacking Tools

SecurityFWD

Hacking with Friends Live: Weekly Security News and Hacking Tools

Streamed 3 years ago - 46:30

Are you running what you think you're running?

N2K Networks

Are you running what you think you're running?

5 years ago - 13:40

Joe Grand: Building a Creaturepod Walkie Talkie @ r00tz'16 DEF CON 24

r00tz

Joe Grand: Building a Creaturepod Walkie Talkie @ r00tz'16 DEF CON 24

8 years ago - 13:51

Technical Track: Automatic Part-of-Speech Tagging for Security Vulnerability Descriptions

msrconf

Technical Track: Automatic Part-of-Speech Tagging for Security Vulnerability Descriptions

4 years ago - 3:49

github roger1337 jdbg java runtime reverse engineering

CodeBeam

github roger1337 jdbg java runtime reverse engineering

5 months ago - 20:01

AWS Security Mistakes That Cost Companies Million #cloudsecurity#aws #cloudsecuritymistakes

Cybersecurity Tutorials

AWS Security Mistakes That Cost Companies Million #cloudsecurity#aws #cloudsecuritymistakes

1 day ago - 2:20

Security Implications of Oracle E Business Suite 12 1 3 End of Support

Integrigy

Security Implications of Oracle E Business Suite 12 1 3 End of Support

4 years ago - 1:00:10

AGI-16 James Babcock - The AGI Containment Problem

AGI Society

AGI-16 James Babcock - The AGI Containment Problem

9 years ago - 14:56

Joe 'Kingpin' Grand on  "Hacking a Hardware Wallet and Recovering $2 Million"

UCYBR - UMBC Center for Cybersecurity

Joe 'Kingpin' Grand on "Hacking a Hardware Wallet and Recovering $2 Million"

1 year ago - 1:27:03

Practical Hardware Attacks on Deep Learning | Sanghyun Hong | Hardwear.io Webinar 2021

hardwear.io

Practical Hardware Attacks on Deep Learning | Sanghyun Hong | Hardwear.io Webinar 2021

4 years ago - 35:25

Workshop: National Cyber Crisis Management

FIRST

Workshop: National Cyber Crisis Management

3 years ago - 2:56:15

Bob Rudis | Before and Beyond the Breach New Research in the 2015 DBIR

Big Brain Security

Bob Rudis | Before and Beyond the Breach New Research in the 2015 DBIR

7 years ago - 49:38

Cyber Attacks are on the increase

CIPS - Canada’s Association of I.T. Professionals

Cyber Attacks are on the increase

8 years ago - 1:30:36

The Van Maren Show: How U.S. elites normalized same-sex 'marriage'

The Van Maren Show

The Van Maren Show: How U.S. elites normalized same-sex 'marriage'

6 years ago - 54:36

ON-DEMAND: ScaleUP Security 2021 Conference

Logz.io

ON-DEMAND: ScaleUP Security 2021 Conference

4 years ago - 1:24:57

Jailbreaking Apple Watch Black Hat - Europe - 2017

All Hacking Cons

Jailbreaking Apple Watch Black Hat - Europe - 2017

3 years ago - 29:35

BlueHat India 2024: Phishing Landscape Evolution: Unveiling Layers of Email Malware Delivery

Microsoft Security Response Center (MSRC)

BlueHat India 2024: Phishing Landscape Evolution: Unveiling Layers of Email Malware Delivery

11 months ago - 32:32

Yale and Brazil | Postgraduate Fellow Lissandra Amorim Santos

Yale and the World

Yale and Brazil | Postgraduate Fellow Lissandra Amorim Santos

3 years ago - 4:07

CERIAS Symposium 2017 - Day 2 Keynote - David Meltzer - Tripwire

Purdue CERIAS

CERIAS Symposium 2017 - Day 2 Keynote - David Meltzer - Tripwire

8 years ago - 1:06:02

How Is AI Transforming Modern Security? | NetCom Learning

NetCom Learning

How Is AI Transforming Modern Security? | NetCom Learning

1 day ago - 1:08

#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger

Hack In The Box Security Conference

#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger

7 years ago - 44:08

Quantum Computing: Your Security's About to CRUMBLE!

GunWebsites

Quantum Computing: Your Security's About to CRUMBLE!

2 days ago - 0:32

Mastering GRC: Best Cloud Security Practices & Structures

INFOSEC TRAIN

Mastering GRC: Best Cloud Security Practices & Structures

1 day ago - 44:42

How AI Is Revolutionizing Cyber Threats and Phishing

Cybersecurity Tutorials

How AI Is Revolutionizing Cyber Threats and Phishing

22 hours ago - 2:10

D2T2   Bypassing Memory Mitigations Using Data Only Exploitation Techniques   Bing Sun

Info Con

D2T2 Bypassing Memory Mitigations Using Data Only Exploitation Techniques Bing Sun

7 years ago - 56:40

How Can AI Provide Useful Guidance from Fragmented Security Data?

CISO Series

How Can AI Provide Useful Guidance from Fragmented Security Data?

2 days ago - 29:42

K Security Scanner: AI-Powered Website Vulnerability Detection Made Simple #builtwithcaffeine

Caffeine

K Security Scanner: AI-Powered Website Vulnerability Detection Made Simple #builtwithcaffeine

2 days ago - 2:21

795 Investigating the U.S. Legal Perspectives on Liability for IoT Product Security

IEEE Symposium on Security and Privacy

795 Investigating the U.S. Legal Perspectives on Liability for IoT Product Security

1 day ago - 6:56

How does AI Help Prevent Distributed Denial of Service Attacks? | #ExpertAdvice from @radware

Solutions Review

How does AI Help Prevent Distributed Denial of Service Attacks? | #ExpertAdvice from @radware

2 days ago - 1:42

where does ai fit into security architecture#convocourses #cybersecurity

ConvoCourses

where does ai fit into security architecture#convocourses #cybersecurity

3 days ago - 2:27

Why should you choose Cyber Security as a career?

Creative IT Institute

Why should you choose Cyber Security as a career?

20 hours ago - 0:36

Velvet Ant's silent invasion. [Research Saturday]

N2K Networks

Velvet Ant's silent invasion. [Research Saturday]

9 months ago - 19:35

This One Program Can Track Everything You Type! | Cyber Security

DedSec

This One Program Can Track Everything You Type! | Cyber Security

2 days ago - 8:08

Mitigación de riesgos en software de terceros en Google (Fermín J. Serna, Google)

CCN

Mitigación de riesgos en software de terceros en Google (Fermín J. Serna, Google)

7 years ago - 32:01

🔒 Secure Your Network  The Crucial Role of Updates in Cyber Defense!

BioTech Whisperer

🔒 Secure Your Network The Crucial Role of Updates in Cyber Defense!

5 days ago - 0:58

If You Still Think in "Perimeters," You're Already Breached

Cloud Security Podcast

If You Still Think in "Perimeters," You're Already Breached

7 days ago - 0:33

Breakthroughs in Quantum Computing Will Redefine Cybersecurity

conquryourfear & do it urself

Breakthroughs in Quantum Computing Will Redefine Cybersecurity

10 days ago - 8:25

Google Threat Intelligence Use Case: Exploring Vulnerabilities

Mandiant & Google Cloud Security

Google Threat Intelligence Use Case: Exploring Vulnerabilities

8 days ago - 1:26

Agentic AI Summit - Mainstage, Afternoon Sessions

Berkeley RDI Center on Decentralization & AI

Agentic AI Summit - Mainstage, Afternoon Sessions

Streamed 15 minutes ago - 4:54:41

AI-Powered Safety Gear Detection System | Deep Learning Helmet, Mask & Vest Detection 2025

TPS Projects

AI-Powered Safety Gear Detection System | Deep Learning Helmet, Mask & Vest Detection 2025

7 days ago - 2:26

Generative AI & Data Security: Is Your Business at Risk?

CanadianSME Small Business Magazine

Generative AI & Data Security: Is Your Business at Risk?

8 days ago - 30:46

From Innovation to Infiltration: The Role of AI in Modern Cybersecurity | #SolutionSpotlight with

Solutions Review

From Innovation to Infiltration: The Role of AI in Modern Cybersecurity | #SolutionSpotlight with

9 days ago - 36:32