Uncovering the Secrets of A.I. Security Vulnerability Research

Tech Experts

Uncovering the Secrets of A.I. Security Vulnerability Research

2 years ago - 0:59

Alex Ionescu - DEEP 2023: The next five years of platform security vulnerability research

DEEP Conference

Alex Ionescu - DEEP 2023: The next five years of platform security vulnerability research

7 months ago - 59:51

🔴 Jul 16's Top Cyber News NOW! - Ep 920

Simply Cyber - Gerald Auger, PhD

🔴 Jul 16's Top Cyber News NOW! - Ep 920

-

API security, vulnerability research and LGBTQ+ representation | Cyber Work Podcast

Infosec

API security, vulnerability research and LGBTQ+ representation | Cyber Work Podcast

4 years ago - 58:10

Getting started in security research - Kevin Backhouse

GitHub Education

Getting started in security research - Kevin Backhouse

4 years ago - 22:25

lateral movement | Lateral Movement with Local Administrator | Red Teaming | Privilege Escalation

Hacker Zone

lateral movement | Lateral Movement with Local Administrator | Red Teaming | Privilege Escalation

4 months ago - 9:38

2023 ERI Summit: Security in the Face of Microelectronics Supply Chain (Cyr)

DARPAtv

2023 ERI Summit: Security in the Face of Microelectronics Supply Chain (Cyr)

1 year ago - 9:32

DEEP Conference

DEEP Conference

@deepconference6925 subscribers

How to speed R&D and deter advanced cyber threats

Leidos

How to speed R&D and deter advanced cyber threats

3 years ago - 26:18

Final Year Project-Presentation

Lang Kwong Sheng

Final Year Project-Presentation

3 years ago - 9:31

[New Report] State of the Attack Surface 2023

Halo Security

[New Report] State of the Attack Surface 2023

2 years ago - 0:32

CQURE HACKS #65 NTLM reflection SMB flaw - CVE-2025-33073: From zero to Domain Admin

CQURE Academy

CQURE HACKS #65 NTLM reflection SMB flaw - CVE-2025-33073: From zero to Domain Admin

2 hours ago - 4:31

Can the Security+ Land You an IT Job? Why the Sec+ Is Important in GovTech (DoD 8570/8140)

Symoné B. GovTech

Can the Security+ Land You an IT Job? Why the Sec+ Is Important in GovTech (DoD 8570/8140)

21 hours ago - 24:18

He Created Wireshark - And It Changed Cybersecurity Forever

David Bombal

He Created Wireshark - And It Changed Cybersecurity Forever

2 days ago - 44:59

Paul Harvey - Microarchitectural attacks

BSides Canberra

Paul Harvey - Microarchitectural attacks

7 years ago - 27:44

Proposal For IT Security Expert

Jerome Hutcheson

Proposal For IT Security Expert

4 years ago - 0:50

Operation Diplomatic Specter: An Active Chinese Cyber Espionage Campaign - by Lior Rochberger

Infosec In the City

Operation Diplomatic Specter: An Active Chinese Cyber Espionage Campaign - by Lior Rochberger

7 months ago - 35:17

Researching Android Device Security with the Help of a Droid Army

All Hacking Cons

Researching Android Device Security with the Help of a Droid Army

3 years ago - 58:01

BlueHat 2023 Lightning Talk: No Self Driving Cars

Microsoft Security Response Center (MSRC)

BlueHat 2023 Lightning Talk: No Self Driving Cars

2 years ago - 12:29

USENIX Security '22 - Networks of Care: Tech Abuse Advocates' Digital Security Practices

USENIX

USENIX Security '22 - Networks of Care: Tech Abuse Advocates' Digital Security Practices

2 years ago - 11:54

Setup Havoc C2 Redirectors In Just 7 Minutes

Lsecqt

Setup Havoc C2 Redirectors In Just 7 Minutes

1 year ago - 7:03

The Rise of Climate-Driven Security Threats in South Asia: A Case Study of Bangladesh

BIPSS

The Rise of Climate-Driven Security Threats in South Asia: A Case Study of Bangladesh

5 months ago - 2:54

How To Bypass ANY Anti-Virus With This POWERFUL Technique

Lsecqt

How To Bypass ANY Anti-Virus With This POWERFUL Technique

1 year ago - 8:11

1Power CyberSec Research & Analysis.

EasyTech4all

1Power CyberSec Research & Analysis.

4 years ago - 2:37

Session 11: The Power of Sneaky Power!

IEEE Int'l Symposium on HOST

Session 11: The Power of Sneaky Power!

2 years ago - 58:15

Defending Your Digital Frontier: Chris Wysopal on Reducing Attack Surface in the Age of AI

OODA

Defending Your Digital Frontier: Chris Wysopal on Reducing Attack Surface in the Age of AI

3 months ago - 51:27

microsoft uncovered vulnerability in macos

CSI digital

microsoft uncovered vulnerability in macos

2 years ago - 6:25

UnsafLok

Ro Drop

UnsafLok

1 year ago - 10:04

Assessing e-Government DNS Resilience

FIRST

Assessing e-Government DNS Resilience

1 year ago - 19:58

Kingpin with Joe Grand

BarCode

Kingpin with Joe Grand

3 years ago - 52:57

Impact Startups in AI Safety - Esben Kran

Apart - Safe AI

Impact Startups in AI Safety - Esben Kran

Streamed 10 months ago - 50:10

Breaking barriers, one byte at a time. [Research Saturday]

N2K Networks

Breaking barriers, one byte at a time. [Research Saturday]

3 months ago - 19:29

Defending against cloud cross-tenant vulnerabilities - Tzah Pahima & Yanir Tsarimi

fwd:cloudsec

Defending against cloud cross-tenant vulnerabilities - Tzah Pahima & Yanir Tsarimi

2 years ago - 25:16

Turning the Tables: Honeypots Flawed Logic and Counter-Intelligence By Sheila A. Berta (2023)

Swiss Cyber Storm

Turning the Tables: Honeypots Flawed Logic and Counter-Intelligence By Sheila A. Berta (2023)

1 year ago - 28:48

Tools for Food Security Monitoring and Analysis in Asia and the Pacific

ADB Food Security Forum

Tools for Food Security Monitoring and Analysis in Asia and the Pacific

1 year ago - 1:10:17

MSF-ADV talk @ IEEE S&P'21

ASGuard UC-Irvine

MSF-ADV talk @ IEEE S&P'21

4 years ago - 14:47

The Rise of Artificial Intelligence

Risk Group LLC

The Rise of Artificial Intelligence

9 years ago - 1:25:27

BSides PDX 2023 - Keynote (Joe Grand)

BSides Portland

BSides PDX 2023 - Keynote (Joe Grand)

1 year ago - 46:03

Steganography Project Proposal

Falcon Punch

Steganography Project Proposal

4 years ago - 3:50

Technical Track: Automatic Part-of-Speech Tagging for Security Vulnerability Descriptions

msrconf

Technical Track: Automatic Part-of-Speech Tagging for Security Vulnerability Descriptions

4 years ago - 3:49

CERIAS Symposium 2017 - Day 2 Keynote - David Meltzer - Tripwire

Purdue CERIAS

CERIAS Symposium 2017 - Day 2 Keynote - David Meltzer - Tripwire

8 years ago - 1:06:02

David Meltzer - Trends in CyberSecurity

SMPTE - Sacramento Section

David Meltzer - Trends in CyberSecurity

8 years ago - 1:24:13

Cyber Attacks are on the increase

CIPS - Canada’s Association of I.T. Professionals

Cyber Attacks are on the increase

8 years ago - 1:30:36

Bob Rudis | Before and Beyond the Breach New Research in the 2015 DBIR

Big Brain Security

Bob Rudis | Before and Beyond the Breach New Research in the 2015 DBIR

7 years ago - 49:38

Haim Ateya on the Shared Mentality at Aqua

Aqua Security

Haim Ateya on the Shared Mentality at Aqua

2 years ago - 0:53

Ransomware Attack Awareness Protecting College Students

Dedy Syamsuar

Ransomware Attack Awareness Protecting College Students

3 months ago - 14:20

Recon 2017 Brx - Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware

Recon Conference

Recon 2017 Brx - Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware

2 years ago - 40:56

The Threats of Generative AI & Harnessing AI for a Secure Future | AhnLab ISF 2024

AhnLab Global

The Threats of Generative AI & Harnessing AI for a Secure Future | AhnLab ISF 2024

8 months ago - 19:35

[DEFCON 20] Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol

TalksDump

[DEFCON 20] Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol

11 years ago - 40:08

How well do you know SSL?

Help Net Security

How well do you know SSL?

13 years ago - 4:38

ON-DEMAND: ScaleUP Security 2021 Conference

Logz.io

ON-DEMAND: ScaleUP Security 2021 Conference

4 years ago - 1:24:57

#HITB2018AMS KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio

Hack In The Box Security Conference

#HITB2018AMS KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio

7 years ago - 45:06

AGI-16 James Babcock - The AGI Containment Problem

AGI Society

AGI-16 James Babcock - The AGI Containment Problem

8 years ago - 14:56

Security Implications of Oracle E Business Suite 12 1 3 End of Support

Integrigy

Security Implications of Oracle E Business Suite 12 1 3 End of Support

4 years ago - 1:00:10

Hacking with Friends Live: Weekly Security News and Hacking Tools

SecurityFWD

Hacking with Friends Live: Weekly Security News and Hacking Tools

Streamed 3 years ago - 46:30

Security Implications of Oracle Product Desupport

Integrigy

Security Implications of Oracle Product Desupport

10 years ago - 54:09

CERIAS Security:Measuring the Attack Surfaces of Enterprise Software Systems 1/6

Christiaan008

CERIAS Security:Measuring the Attack Surfaces of Enterprise Software Systems 1/6

15 years ago - 9:59

Japtron

Japtron

Empresario, Hacker (de los buenos). España - Andorra Private Investigator Computer Security, vulnerability research, ...

@Japtron subscribers

Uncloaking IP Addresses on FreeNode IRC Demo From Derbycon

decalresponds

Uncloaking IP Addresses on FreeNode IRC Demo From Derbycon

8 years ago - 1:59

LISA18 - Engineering an IP Portfolio

USENIX

LISA18 - Engineering an IP Portfolio

6 years ago - 45:44

Bio-Cyber Challenge: Panel 3

Research at Colorado State University

Bio-Cyber Challenge: Panel 3

Nina Ali ...

3 years ago - 1:00:30

Aseem Jakhar

Aseem Jakhar

Welcome to the world of Aseem Jakhar — Cybersecurity Entrepreneur, Technologist, and Builder. With over 20 years in security ...

@aseemjakhar subscribers

IronBox Webinar - Top Signs You're Prime for a Data Breach in 2014

IronBox

IronBox Webinar - Top Signs You're Prime for a Data Breach in 2014

11 years ago - 34:59

DomesticPreparedness.com: Advancing Technology in Biological Surveillance & Detection

Martin Masiuk

DomesticPreparedness.com: Advancing Technology in Biological Surveillance & Detection

12 years ago - 13:10

Apple Device Enrollment Program vulnerabilities explored — Research Saturday

N2K Networks

Apple Device Enrollment Program vulnerabilities explored — Research Saturday

6 years ago - 17:25

Cybersecurity Isn’t Just About Protection Anymore

Rubrik

Cybersecurity Isn’t Just About Protection Anymore

16 hours ago - 0:31

Practical Hardware Attacks on Deep Learning | Sanghyun Hong | Hardwear.io Webinar 2021

hardwear.io

Practical Hardware Attacks on Deep Learning | Sanghyun Hong | Hardwear.io Webinar 2021

4 years ago - 35:25

github roger1337 jdbg java runtime reverse engineering

CodeBeam

github roger1337 jdbg java runtime reverse engineering

4 months ago - 20:01

Joe Grand: Building a Creaturepod Walkie Talkie @ r00tz'16 DEF CON 24

r00tz

Joe Grand: Building a Creaturepod Walkie Talkie @ r00tz'16 DEF CON 24

8 years ago - 13:51

Are you running what you think you're running?

N2K Networks

Are you running what you think you're running?

5 years ago - 13:40

Workshop: National Cyber Crisis Management

FIRST

Workshop: National Cyber Crisis Management

3 years ago - 2:56:15

#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger

Hack In The Box Security Conference

#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger

7 years ago - 44:08

Apple lost years long lawsuit to Corellium trying to ban iOS virtual machines - News #32305

News Source Crawler

Apple lost years long lawsuit to Corellium trying to ban iOS virtual machines - News #32305

2 years ago - 0:07

"Cracking the Code: Unveiling Authentication Bypass & Username Enumeration via Bruteforce Attack"

pentestguru

"Cracking the Code: Unveiling Authentication Bypass & Username Enumeration via Bruteforce Attack"

1 year ago - 24:56

[LMSW2025] Advancing Risk Assessment, Safety Alignment, and Guardrail Systems for AI Agents, Bo Li

AIDXTECH

[LMSW2025] Advancing Risk Assessment, Safety Alignment, and Guardrail Systems for AI Agents, Bo Li

2 months ago - 44:43

The Van Maren Show: How U.S. elites normalized same-sex 'marriage'

The Van Maren Show

The Van Maren Show: How U.S. elites normalized same-sex 'marriage'

6 years ago - 54:36

00. Introduction to Software Reverse Engineering

Eugene Kirian

00. Introduction to Software Reverse Engineering

1 month ago - 15:16

HOW TO MAKE MONEY TESTING GAMES Microsoft Xbox Bounty Program

Side Hustles - Making Money Online

HOW TO MAKE MONEY TESTING GAMES Microsoft Xbox Bounty Program

5 years ago - 2:15

Your Phone Knows More Than You Think: Privacy Risks

Security Researcher

Your Phone Knows More Than You Think: Privacy Risks

16 hours ago - 1:00

Joe 'Kingpin' Grand on  "Hacking a Hardware Wallet and Recovering $2 Million"

UCYBR - UMBC Center for Cybersecurity

Joe 'Kingpin' Grand on "Hacking a Hardware Wallet and Recovering $2 Million"

1 year ago - 1:27:03

Installing This Twilio Malware NPM Package Opens a Backdoor on Your Developer Machine

Hussein Nasser

Installing This Twilio Malware NPM Package Opens a Backdoor on Your Developer Machine

4 years ago - 19:12

Yale and Brazil | Postgraduate Fellow Lissandra Amorim Santos

Yale and the World

Yale and Brazil | Postgraduate Fellow Lissandra Amorim Santos

3 years ago - 4:07

CERIAS Symposium 2017 - Day 2 Keynote - David Meltzer - Tripwire

Purdue CERIAS

CERIAS Symposium 2017 - Day 2 Keynote - David Meltzer - Tripwire

8 years ago - 1:06:02

D2T2   Bypassing Memory Mitigations Using Data Only Exploitation Techniques   Bing Sun

Info Con

D2T2 Bypassing Memory Mitigations Using Data Only Exploitation Techniques Bing Sun

7 years ago - 56:40

WatchGuard’s Q1 2025 Internet Security Report. - The 443 Podcast - Episode 335

WatchGuard Technologies

WatchGuard’s Q1 2025 Internet Security Report. - The 443 Podcast - Episode 335

2 days ago - 1:04:58

Inside a New OT/IoT Cyberweapon: IOCONTROL

SANS ICS Security

Inside a New OT/IoT Cyberweapon: IOCONTROL

1 day ago - 28:02

BlueHat India 2024: Phishing Landscape Evolution: Unveiling Layers of Email Malware Delivery

Microsoft Security Response Center (MSRC)

BlueHat India 2024: Phishing Landscape Evolution: Unveiling Layers of Email Malware Delivery

10 months ago - 32:32

International Webinar- Patents, Protection & Progress: The Role of IPR in Science

Bioingene

International Webinar- Patents, Protection & Progress: The Role of IPR in Science

Streamed 1 hour ago - 1:38:29

AI for Cyber or Cyber for AI? Rethinking Threat Detection in a Borderless Digital World

VARINDIA

AI for Cyber or Cyber for AI? Rethinking Threat Detection in a Borderless Digital World

1 day ago - 7:42

Velvet Ant's silent invasion. [Research Saturday]

N2K Networks

Velvet Ant's silent invasion. [Research Saturday]

8 months ago - 19:35

Mitigación de riesgos en software de terceros en Google (Fermín J. Serna, Google)

CCN

Mitigación de riesgos en software de terceros en Google (Fermín J. Serna, Google)

7 years ago - 32:01

Suspicious Behaviour Detection | Suspicious Activity Detection Using AI - Build By #Quytech

Quytech

Suspicious Behaviour Detection | Suspicious Activity Detection Using AI - Build By #Quytech

9 days ago - 0:14