Uncovering the Secrets of A.I. Security Vulnerability Research

Tech Experts

Uncovering the Secrets of A.I. Security Vulnerability Research

2 years ago - 0:59

Alex Ionescu - DEEP 2023: The next five years of platform security vulnerability research

DEEP Conference

Alex Ionescu - DEEP 2023: The next five years of platform security vulnerability research

7 months ago - 59:51

Getting started in security research - Kevin Backhouse

GitHub Education

Getting started in security research - Kevin Backhouse

4 years ago - 22:25

API security, vulnerability research and LGBTQ+ representation | Cyber Work Podcast

Infosec

API security, vulnerability research and LGBTQ+ representation | Cyber Work Podcast

4 years ago - 58:10

DEEP Conference

DEEP Conference

@deepconference6925 subscribers

lateral movement | Lateral Movement with Local Administrator | Red Teaming | Privilege Escalation

Hacker Zone

lateral movement | Lateral Movement with Local Administrator | Red Teaming | Privilege Escalation

4 months ago - 9:38

2023 ERI Summit: Security in the Face of Microelectronics Supply Chain (Cyr)

DARPAtv

2023 ERI Summit: Security in the Face of Microelectronics Supply Chain (Cyr)

1 year ago - 9:32

How to speed R&D and deter advanced cyber threats

Leidos

How to speed R&D and deter advanced cyber threats

3 years ago - 26:18

Final Year Project-Presentation

Lang Kwong Sheng

Final Year Project-Presentation

3 years ago - 9:31

[New Report] State of the Attack Surface 2023

Halo Security

[New Report] State of the Attack Surface 2023

2 years ago - 0:32

Proposal For IT Security Expert

Jerome Hutcheson

Proposal For IT Security Expert

4 years ago - 0:50

Paul Harvey - Microarchitectural attacks

BSides Canberra

Paul Harvey - Microarchitectural attacks

7 years ago - 27:44

Researching Android Device Security with the Help of a Droid Army

All Hacking Cons

Researching Android Device Security with the Help of a Droid Army

3 years ago - 58:01

Defending Your Digital Frontier: Chris Wysopal on Reducing Attack Surface in the Age of AI

OODA

Defending Your Digital Frontier: Chris Wysopal on Reducing Attack Surface in the Age of AI

3 months ago - 51:27

Impact Startups in AI Safety - Esben Kran

Apart - Safe AI

Impact Startups in AI Safety - Esben Kran

Streamed 10 months ago - 50:10

BlueHat 2023 Lightning Talk: No Self Driving Cars

Microsoft Security Response Center (MSRC)

BlueHat 2023 Lightning Talk: No Self Driving Cars

2 years ago - 12:29

USENIX Security '22 - Networks of Care: Tech Abuse Advocates' Digital Security Practices

USENIX

USENIX Security '22 - Networks of Care: Tech Abuse Advocates' Digital Security Practices

2 years ago - 11:54

1Power CyberSec Research & Analysis.

EasyTech4all

1Power CyberSec Research & Analysis.

4 years ago - 2:37

Operation Diplomatic Specter: An Active Chinese Cyber Espionage Campaign - by Lior Rochberger

Infosec In the City

Operation Diplomatic Specter: An Active Chinese Cyber Espionage Campaign - by Lior Rochberger

7 months ago - 35:17

A Conversation with Pete Allor - Vulnerabilities, Community Efforts, Communication, and More...

Good Faith Cybersesecurity Researchers Coalition

A Conversation with Pete Allor - Vulnerabilities, Community Efforts, Communication, and More...

2 years ago - 55:36

Setup Havoc C2 Redirectors In Just 7 Minutes

Lsecqt

Setup Havoc C2 Redirectors In Just 7 Minutes

1 year ago - 7:03

The Rise of Climate-Driven Security Threats in South Asia: A Case Study of Bangladesh

BIPSS

The Rise of Climate-Driven Security Threats in South Asia: A Case Study of Bangladesh

5 months ago - 2:54

How To Bypass ANY Anti-Virus With This POWERFUL Technique

Lsecqt

How To Bypass ANY Anti-Virus With This POWERFUL Technique

1 year ago - 8:11

UnsafLok

Ro Drop

UnsafLok

1 year ago - 10:04

Kingpin with Joe Grand

BarCode

Kingpin with Joe Grand

3 years ago - 52:57

Assessing e-Government DNS Resilience

FIRST

Assessing e-Government DNS Resilience

1 year ago - 19:58

microsoft uncovered vulnerability in macos

CSI digital

microsoft uncovered vulnerability in macos

2 years ago - 6:25

Defending against cloud cross-tenant vulnerabilities - Tzah Pahima & Yanir Tsarimi

fwd:cloudsec

Defending against cloud cross-tenant vulnerabilities - Tzah Pahima & Yanir Tsarimi

2 years ago - 25:16

Session 11: The Power of Sneaky Power!

IEEE Int'l Symposium on HOST

Session 11: The Power of Sneaky Power!

2 years ago - 58:15

Breaking barriers, one byte at a time. [Research Saturday]

N2K Networks

Breaking barriers, one byte at a time. [Research Saturday]

3 months ago - 19:29

BSides PDX 2023 - Keynote (Joe Grand)

BSides Portland

BSides PDX 2023 - Keynote (Joe Grand)

1 year ago - 46:03

Turning the Tables: Honeypots Flawed Logic and Counter-Intelligence By Sheila A. Berta (2023)

Swiss Cyber Storm

Turning the Tables: Honeypots Flawed Logic and Counter-Intelligence By Sheila A. Berta (2023)

1 year ago - 28:48

Tools for Food Security Monitoring and Analysis in Asia and the Pacific

ADB Food Security Forum

Tools for Food Security Monitoring and Analysis in Asia and the Pacific

1 year ago - 1:10:17

Haim Ateya on the Shared Mentality at Aqua

Aqua Security

Haim Ateya on the Shared Mentality at Aqua

2 years ago - 0:53

MSF-ADV talk @ IEEE S&P'21

ASGuard UC-Irvine

MSF-ADV talk @ IEEE S&P'21

4 years ago - 14:47

Steganography Project Proposal

Falcon Punch

Steganography Project Proposal

4 years ago - 3:50

The Rise of Artificial Intelligence

Risk Group LLC

The Rise of Artificial Intelligence

9 years ago - 1:25:27

Security Implications of Oracle E Business Suite 12 1 3 End of Support

Integrigy

Security Implications of Oracle E Business Suite 12 1 3 End of Support

4 years ago - 1:00:10

Recon 2017 Brx - Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware

Recon Conference

Recon 2017 Brx - Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware

2 years ago - 40:56

Installing This Twilio Malware NPM Package Opens a Backdoor on Your Developer Machine

Hussein Nasser

Installing This Twilio Malware NPM Package Opens a Backdoor on Your Developer Machine

4 years ago - 19:12

ON-DEMAND: ScaleUP Security 2021 Conference

Logz.io

ON-DEMAND: ScaleUP Security 2021 Conference

4 years ago - 1:24:57

How well do you know SSL?

Help Net Security

How well do you know SSL?

13 years ago - 4:38

The Threats of Generative AI & Harnessing AI for a Secure Future | AhnLab ISF 2024

AhnLab Global

The Threats of Generative AI & Harnessing AI for a Secure Future | AhnLab ISF 2024

8 months ago - 19:35

Uncloaking IP Addresses on FreeNode IRC Demo From Derbycon

decalresponds

Uncloaking IP Addresses on FreeNode IRC Demo From Derbycon

8 years ago - 1:59

Ransomware Attack Awareness Protecting College Students

Dedy Syamsuar

Ransomware Attack Awareness Protecting College Students

3 months ago - 14:20

#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger

Hack In The Box Security Conference

#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger

7 years ago - 44:08

Security Implications of Oracle Product Desupport

Integrigy

Security Implications of Oracle Product Desupport

10 years ago - 54:09

Japtron

Japtron

Empresario, Hacker (de los buenos). España - Andorra Private Investigator Computer Security, vulnerability research, ...

@Japtron subscribers

Joe 'Kingpin' Grand on  "Hacking a Hardware Wallet and Recovering $2 Million"

UCYBR - UMBC Center for Cybersecurity

Joe 'Kingpin' Grand on "Hacking a Hardware Wallet and Recovering $2 Million"

1 year ago - 1:27:03

#HITB2018AMS KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio

Hack In The Box Security Conference

#HITB2018AMS KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio

7 years ago - 45:06

IronBox Webinar - Top Signs You're Prime for a Data Breach in 2014

IronBox

IronBox Webinar - Top Signs You're Prime for a Data Breach in 2014

11 years ago - 34:59

DomesticPreparedness.com: Advancing Technology in Biological Surveillance & Detection

Martin Masiuk

DomesticPreparedness.com: Advancing Technology in Biological Surveillance & Detection

12 years ago - 13:10

Bio-Cyber Challenge: Panel 3

Research at Colorado State University

Bio-Cyber Challenge: Panel 3

Nina Ali ...

3 years ago - 1:00:30

Aseem Jakhar

Aseem Jakhar

Welcome to the world of Aseem Jakhar — Cybersecurity Entrepreneur, Technologist, and Builder. With over 20 years in security ...

@aseemjakhar subscribers

LISA18 - Engineering an IP Portfolio

USENIX

LISA18 - Engineering an IP Portfolio

6 years ago - 45:44

"Cracking the Code: Unveiling Authentication Bypass & Username Enumeration via Bruteforce Attack"

pentestguru

"Cracking the Code: Unveiling Authentication Bypass & Username Enumeration via Bruteforce Attack"

1 year ago - 24:56

Apple Device Enrollment Program vulnerabilities explored — Research Saturday

N2K Networks

Apple Device Enrollment Program vulnerabilities explored — Research Saturday

6 years ago - 17:25

David Meltzer - Trends in CyberSecurity

SMPTE - Sacramento Section

David Meltzer - Trends in CyberSecurity

8 years ago - 1:24:13