Uncovering the Secrets of A.I. Security Vulnerability Research

Tech Experts

Uncovering the Secrets of A.I. Security Vulnerability Research

2 years ago - 0:59

Alex Ionescu - DEEP 2023: The next five years of platform security vulnerability research

DEEP Conference

Alex Ionescu - DEEP 2023: The next five years of platform security vulnerability research

7 months ago - 59:51

Getting started in security research - Kevin Backhouse

GitHub Education

Getting started in security research - Kevin Backhouse

4 years ago - 22:25

API security, vulnerability research and LGBTQ+ representation | Cyber Work Podcast

Infosec

API security, vulnerability research and LGBTQ+ representation | Cyber Work Podcast

4 years ago - 58:10

2023 ERI Summit: Security in the Face of Microelectronics Supply Chain (Cyr)

DARPAtv

2023 ERI Summit: Security in the Face of Microelectronics Supply Chain (Cyr)

1 year ago - 9:32

DEEP Conference

DEEP Conference

@deepconference6925 subscribers

lateral movement | Lateral Movement with Local Administrator | Red Teaming | Privilege Escalation

Hacker Zone

lateral movement | Lateral Movement with Local Administrator | Red Teaming | Privilege Escalation

5 months ago - 9:38

Final Year Project-Presentation

Lang Kwong Sheng

Final Year Project-Presentation

3 years ago - 9:31

[New Report] State of the Attack Surface 2023

Halo Security

[New Report] State of the Attack Surface 2023

2 years ago - 0:32

How to speed R&D and deter advanced cyber threats

Leidos

How to speed R&D and deter advanced cyber threats

3 years ago - 26:18

Proposal For IT Security Expert

Jerome Hutcheson

Proposal For IT Security Expert

4 years ago - 0:50

Operation Diplomatic Specter: An Active Chinese Cyber Espionage Campaign - by Lior Rochberger

Infosec In the City

Operation Diplomatic Specter: An Active Chinese Cyber Espionage Campaign - by Lior Rochberger

7 months ago - 35:17

BlueHat 2023 Lightning Talk: No Self Driving Cars

Microsoft Security Response Center (MSRC)

BlueHat 2023 Lightning Talk: No Self Driving Cars

2 years ago - 12:29

Researching Android Device Security with the Help of a Droid Army

All Hacking Cons

Researching Android Device Security with the Help of a Droid Army

3 years ago - 58:01

How To Bypass ANY Anti-Virus With This POWERFUL Technique

Lsecqt

How To Bypass ANY Anti-Virus With This POWERFUL Technique

1 year ago - 8:11

Paul Harvey - Microarchitectural attacks

BSides Canberra

Paul Harvey - Microarchitectural attacks

7 years ago - 27:44

USENIX Security '22 - Networks of Care: Tech Abuse Advocates' Digital Security Practices

USENIX

USENIX Security '22 - Networks of Care: Tech Abuse Advocates' Digital Security Practices

2 years ago - 11:54

A Conversation with Pete Allor - Vulnerabilities, Community Efforts, Communication, and More...

Good Faith Cybersesecurity Researchers Coalition

A Conversation with Pete Allor - Vulnerabilities, Community Efforts, Communication, and More...

2 years ago - 55:36

Defending Your Digital Frontier: Chris Wysopal on Reducing Attack Surface in the Age of AI

OODA

Defending Your Digital Frontier: Chris Wysopal on Reducing Attack Surface in the Age of AI

4 months ago - 51:27

Setup Havoc C2 Redirectors In Just 7 Minutes

Lsecqt

Setup Havoc C2 Redirectors In Just 7 Minutes

1 year ago - 7:03

Defending against cloud cross-tenant vulnerabilities - Tzah Pahima & Yanir Tsarimi

fwd:cloudsec

Defending against cloud cross-tenant vulnerabilities - Tzah Pahima & Yanir Tsarimi

2 years ago - 25:16

1Power CyberSec Research & Analysis.

EasyTech4all

1Power CyberSec Research & Analysis.

4 years ago - 2:37

The Rise of Climate-Driven Security Threats in South Asia: A Case Study of Bangladesh

BIPSS

The Rise of Climate-Driven Security Threats in South Asia: A Case Study of Bangladesh

5 months ago - 2:54

Session 11: The Power of Sneaky Power!

IEEE Int'l Symposium on HOST

Session 11: The Power of Sneaky Power!

2 years ago - 58:15

Impact Startups in AI Safety - Esben Kran

Apart - Safe AI

Impact Startups in AI Safety - Esben Kran

Streamed 10 months ago - 50:10

Breaking barriers, one byte at a time. [Research Saturday]

N2K Networks

Breaking barriers, one byte at a time. [Research Saturday]

3 months ago - 19:29

#HITB2018AMS KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio

Hack In The Box Security Conference

#HITB2018AMS KEYNOTE 2 - A Risk Assessment of Logo Disclosures - Jennifer Leggio

7 years ago - 45:06

microsoft uncovered vulnerability in macos

CSI digital

microsoft uncovered vulnerability in macos

3 years ago - 6:25

Kingpin with Joe Grand

BarCode

Kingpin with Joe Grand

3 years ago - 52:57

Assessing e-Government DNS Resilience

FIRST

Assessing e-Government DNS Resilience

1 year ago - 19:58

Turning the Tables: Honeypots Flawed Logic and Counter-Intelligence By Sheila A. Berta (2023)

Swiss Cyber Storm

Turning the Tables: Honeypots Flawed Logic and Counter-Intelligence By Sheila A. Berta (2023)

1 year ago - 28:48

Tools for Food Security Monitoring and Analysis in Asia and the Pacific

ADB Food Security Forum

Tools for Food Security Monitoring and Analysis in Asia and the Pacific

1 year ago - 1:10:17

MSF-ADV talk @ IEEE S&P'21

ASGuard UC-Irvine

MSF-ADV talk @ IEEE S&P'21

4 years ago - 14:47

Ransomware Attack Awareness Protecting College Students

Dedy Syamsuar

Ransomware Attack Awareness Protecting College Students

4 months ago - 14:20

The Rise of Artificial Intelligence

Risk Group LLC

The Rise of Artificial Intelligence

9 years ago - 1:25:27

BSides PDX 2023 - Keynote (Joe Grand)

BSides Portland

BSides PDX 2023 - Keynote (Joe Grand)

1 year ago - 46:03

UnsafLok

Ro Drop

UnsafLok

1 year ago - 10:04

Bob Rudis | Before and Beyond the Breach New Research in the 2015 DBIR

Big Brain Security

Bob Rudis | Before and Beyond the Breach New Research in the 2015 DBIR

7 years ago - 49:38

The Threats of Generative AI & Harnessing AI for a Secure Future | AhnLab ISF 2024

AhnLab Global

The Threats of Generative AI & Harnessing AI for a Secure Future | AhnLab ISF 2024

8 months ago - 19:35

[DEFCON 20] Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol

TalksDump

[DEFCON 20] Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol

11 years ago - 40:08

Security Implications of Oracle Product Desupport

Integrigy

Security Implications of Oracle Product Desupport

10 years ago - 54:09

How well do you know SSL?

Help Net Security

How well do you know SSL?

13 years ago - 4:38

Recon 2017 Brx - Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware

Recon Conference

Recon 2017 Brx - Hackable Security Modules Reversing and exploiting a FIPS 140-2 lvl 3 HSM firmware

2 years ago - 40:56

Haim Ateya on the Shared Mentality at Aqua

Aqua Security

Haim Ateya on the Shared Mentality at Aqua

2 years ago - 0:53

AGI-16 James Babcock - The AGI Containment Problem

AGI Society

AGI-16 James Babcock - The AGI Containment Problem

9 years ago - 14:56

ON-DEMAND: ScaleUP Security 2021 Conference

Logz.io

ON-DEMAND: ScaleUP Security 2021 Conference

4 years ago - 1:24:57

Security Implications of Oracle E Business Suite 12 1 3 End of Support

Integrigy

Security Implications of Oracle E Business Suite 12 1 3 End of Support

4 years ago - 1:00:10

Japtron

Japtron

Empresario, Hacker (de los buenos). España - Andorra Private Investigator Computer Security, vulnerability research, ...

@Japtron subscribers

Hacking with Friends Live: Weekly Security News and Hacking Tools

SecurityFWD

Hacking with Friends Live: Weekly Security News and Hacking Tools

Streamed 3 years ago - 46:30

CERIAS Security:Measuring the Attack Surfaces of Enterprise Software Systems 1/6

Christiaan008

CERIAS Security:Measuring the Attack Surfaces of Enterprise Software Systems 1/6

15 years ago - 9:59

The Rules of Cybersecurity Have Changed Forever

Cloud Security Podcast

The Rules of Cybersecurity Have Changed Forever

1 day ago - 0:21

DomesticPreparedness.com: Advancing Technology in Biological Surveillance & Detection

Martin Masiuk

DomesticPreparedness.com: Advancing Technology in Biological Surveillance & Detection

12 years ago - 13:10

IronBox Webinar - Top Signs You're Prime for a Data Breach in 2014

IronBox

IronBox Webinar - Top Signs You're Prime for a Data Breach in 2014

11 years ago - 34:59

LISA18 - Engineering an IP Portfolio

USENIX

LISA18 - Engineering an IP Portfolio

6 years ago - 45:44

Uncloaking IP Addresses on FreeNode IRC Demo From Derbycon

decalresponds

Uncloaking IP Addresses on FreeNode IRC Demo From Derbycon

8 years ago - 1:59

Bio-Cyber Challenge: Panel 3

Research at Colorado State University

Bio-Cyber Challenge: Panel 3

Nina Ali ...

3 years ago - 1:00:30

Nullcon Goa 2023 | Hacking Mitsubishi PLC Without Access To Firmware by Anton Dorfman

nullcon

Nullcon Goa 2023 | Hacking Mitsubishi PLC Without Access To Firmware by Anton Dorfman

1 year ago - 39:31

Aseem Jakhar

Aseem Jakhar

Welcome to the world of Aseem Jakhar — Cybersecurity Entrepreneur, Technologist, and Builder. With over 20 years in security ...

@aseemjakhar subscribers

Joe Grand: Building a Creaturepod Walkie Talkie @ r00tz'16 DEF CON 24

r00tz

Joe Grand: Building a Creaturepod Walkie Talkie @ r00tz'16 DEF CON 24

8 years ago - 13:51

Technical Track: Automatic Part-of-Speech Tagging for Security Vulnerability Descriptions

msrconf

Technical Track: Automatic Part-of-Speech Tagging for Security Vulnerability Descriptions

4 years ago - 3:49

github roger1337 jdbg java runtime reverse engineering

CodeBeam

github roger1337 jdbg java runtime reverse engineering

4 months ago - 20:01

Apple Device Enrollment Program vulnerabilities explored — Research Saturday

N2K Networks

Apple Device Enrollment Program vulnerabilities explored — Research Saturday

6 years ago - 17:25

David Meltzer - Trends in CyberSecurity

SMPTE - Sacramento Section

David Meltzer - Trends in CyberSecurity

8 years ago - 1:24:13

Are you running what you think you're running?

N2K Networks

Are you running what you think you're running?

5 years ago - 13:40

Apple lost years long lawsuit to Corellium trying to ban iOS virtual machines - News #32305

News Source Crawler

Apple lost years long lawsuit to Corellium trying to ban iOS virtual machines - News #32305

2 years ago - 0:07

Installing This Twilio Malware NPM Package Opens a Backdoor on Your Developer Machine

Hussein Nasser

Installing This Twilio Malware NPM Package Opens a Backdoor on Your Developer Machine

4 years ago - 19:12

CERIAS Symposium 2017 - Day 2 Keynote - David Meltzer - Tripwire

Purdue CERIAS

CERIAS Symposium 2017 - Day 2 Keynote - David Meltzer - Tripwire

8 years ago - 1:06:02

Practical Hardware Attacks on Deep Learning | Sanghyun Hong | Hardwear.io Webinar 2021

hardwear.io

Practical Hardware Attacks on Deep Learning | Sanghyun Hong | Hardwear.io Webinar 2021

4 years ago - 35:25

"Cracking the Code: Unveiling Authentication Bypass & Username Enumeration via Bruteforce Attack"

pentestguru

"Cracking the Code: Unveiling Authentication Bypass & Username Enumeration via Bruteforce Attack"

1 year ago - 24:56

Joe 'Kingpin' Grand on  "Hacking a Hardware Wallet and Recovering $2 Million"

UCYBR - UMBC Center for Cybersecurity

Joe 'Kingpin' Grand on "Hacking a Hardware Wallet and Recovering $2 Million"

1 year ago - 1:27:03

s08 Lessons from the front lines Top focus areas for information security leaders Shogo Cottrell

Adrian Crenshaw

s08 Lessons from the front lines Top focus areas for information security leaders Shogo Cottrell

10 years ago - 1:05:26

Jailbreaking Apple Watch Black Hat - Europe - 2017

All Hacking Cons

Jailbreaking Apple Watch Black Hat - Europe - 2017

3 years ago - 29:35

#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger

Hack In The Box Security Conference

#HITBGSEC 2017 CommSec D1 - Execute Code On A Forensic Workstation - F. Lukavsky & W. Ettlinger

7 years ago - 44:08

[LMSW2025] Advancing Risk Assessment, Safety Alignment, and Guardrail Systems for AI Agents, Bo Li

AIDXTECH

[LMSW2025] Advancing Risk Assessment, Safety Alignment, and Guardrail Systems for AI Agents, Bo Li

2 months ago - 44:43

The Van Maren Show: How U.S. elites normalized same-sex 'marriage'

The Van Maren Show

The Van Maren Show: How U.S. elites normalized same-sex 'marriage'

6 years ago - 54:36

HOW TO MAKE MONEY TESTING GAMES Microsoft Xbox Bounty Program

Side Hustles - Making Money Online

HOW TO MAKE MONEY TESTING GAMES Microsoft Xbox Bounty Program

5 years ago - 2:15

Google Threat Intelligence Use Case: Exploring Vulnerabilities

Mandiant & Google Cloud Security

Google Threat Intelligence Use Case: Exploring Vulnerabilities

1 day ago - 1:26

CyberSentry partnership expires, halting threat analysis at national lab

CyberScoop

CyberSentry partnership expires, halting threat analysis at national lab

2 hours ago - 1:16

Cybercriminal Investigations: Hacked Surveillance Used to Target Informants | TSG Ep. 887 | C Block

Techstrong TV

Cybercriminal Investigations: Hacked Surveillance Used to Target Informants | TSG Ep. 887 | C Block

1 day ago - 8:36

00. Introduction to Software Reverse Engineering

Eugene Kirian

00. Introduction to Software Reverse Engineering

2 months ago - 15:16

Google Threat Intelligence Use Case: Scan Your Externally Exposed Infrastructure for Vulnerabilities

Mandiant & Google Cloud Security

Google Threat Intelligence Use Case: Scan Your Externally Exposed Infrastructure for Vulnerabilities

1 day ago - 1:30

Security Architecture and Engineering - Part 3 [Security Models and Architectures]

Audit Control Governance Risk and Compliance

Security Architecture and Engineering - Part 3 [Security Models and Architectures]

3 days ago - 17:04

Yale and Brazil | Postgraduate Fellow Lissandra Amorim Santos

Yale and the World

Yale and Brazil | Postgraduate Fellow Lissandra Amorim Santos

3 years ago - 4:07

D2T2   Bypassing Memory Mitigations Using Data Only Exploitation Techniques   Bing Sun

Info Con

D2T2 Bypassing Memory Mitigations Using Data Only Exploitation Techniques Bing Sun

7 years ago - 56:40

Google Threat Intelligence Use Case: Comprehensive Brand and Domain Impersonation Monitoring

Mandiant & Google Cloud Security

Google Threat Intelligence Use Case: Comprehensive Brand and Domain Impersonation Monitoring

1 day ago - 3:14

Report Reveals Top Cybersecurity Weaknesses in Healthcare

Tech Field Day Plus

Report Reveals Top Cybersecurity Weaknesses in Healthcare

1 day ago - 3:53

Security Architecture and Engineering - Part 8 [Secure System Engineering and Development]

Audit Control Governance Risk and Compliance

Security Architecture and Engineering - Part 8 [Secure System Engineering and Development]

3 days ago - 19:22

Cybersecurity 2025: Advanced Tools, Projects & Threat Scenarios

Visualpath Pro

Cybersecurity 2025: Advanced Tools, Projects & Threat Scenarios

7 hours ago - 15:15

Security Architecture and Engineering - Part 10 [Zero Trust and Modern Security Paradigms]

Audit Control Governance Risk and Compliance

Security Architecture and Engineering - Part 10 [Zero Trust and Modern Security Paradigms]

3 days ago - 17:53

Security Architecture and Engineering - Part 12 [AI and Machine Learning in Security Architecture]

Audit Control Governance Risk and Compliance

Security Architecture and Engineering - Part 12 [AI and Machine Learning in Security Architecture]

3 days ago - 20:15

Google Threat Intelligence Use Case: Find How a Specific Vulnerability is Being Exploited

Mandiant & Google Cloud Security

Google Threat Intelligence Use Case: Find How a Specific Vulnerability is Being Exploited

1 day ago - 1:51

AI & Risk Mitigation in Cybersecurity – Lessons from GRC Training

Information Security Awareness

AI & Risk Mitigation in Cybersecurity – Lessons from GRC Training

10 hours ago - 1:16

Security Architecture and Engineering - Part 1

Audit Control Governance Risk and Compliance

Security Architecture and Engineering - Part 1

3 days ago - 32:02

Network security: everything you need to know (2025 Edition).

HalfGēk

Network security: everything you need to know (2025 Edition).

This vid helps get started w/ Network security. Grab NordLayer deal@ https://go.nordlayer.net/aff_c?offer_id=638&aff_id=261.

- 5:24

BlueHat India 2024: Phishing Landscape Evolution: Unveiling Layers of Email Malware Delivery

Microsoft Security Response Center (MSRC)

BlueHat India 2024: Phishing Landscape Evolution: Unveiling Layers of Email Malware Delivery

10 months ago - 32:32

Security Architecture and Engineering - Part 2 [Trusted Computing Concepts]

Audit Control Governance Risk and Compliance

Security Architecture and Engineering - Part 2 [Trusted Computing Concepts]

3 days ago - 19:40

Protecting Critical Infrastructure with iCrypto

ITWeb

Protecting Critical Infrastructure with iCrypto

2 days ago - 2:28

TryHackMe - Pre Security | Introduction to Cyber Security: Offensive Security Intro

codeManS practice videos

TryHackMe - Pre Security | Introduction to Cyber Security: Offensive Security Intro

2 days ago - 14:58

TryHackMe - Pre Security | Introduction to Cyber Security: Defensive Security Intro - Part 2

codeManS practice videos

TryHackMe - Pre Security | Introduction to Cyber Security: Defensive Security Intro - Part 2

2 days ago - 20:19

TryHackMe - Pre Security | Introduction to Cyber Security: Defensive Security Intro - Part 3

codeManS practice videos

TryHackMe - Pre Security | Introduction to Cyber Security: Defensive Security Intro - Part 3

2 days ago - 11:34

TryHackMe - Pre Security | Introduction to Cyber Security: Defensive Security Intro - Part 1

codeManS practice videos

TryHackMe - Pre Security | Introduction to Cyber Security: Defensive Security Intro - Part 1

2 days ago - 4:33

Automate Web Security with the Advanced XSS Detection Tool | XSS0R

Pythagorex

Automate Web Security with the Advanced XSS Detection Tool | XSS0R

2 days ago - 29:16

Cybersec Quiz 7.0 - Test your Cybersecurity knowledge

CQURE Academy

Cybersec Quiz 7.0 - Test your Cybersecurity knowledge

5 days ago - 1:10

Navigating Security Flaws in Agentic Code

Snyk

Navigating Security Flaws in Agentic Code

6 days ago - 1:00

Velvet Ant's silent invasion. [Research Saturday]

N2K Networks

Velvet Ant's silent invasion. [Research Saturday]

8 months ago - 19:35

Mitigación de riesgos en software de terceros en Google (Fermín J. Serna, Google)

CCN

Mitigación de riesgos en software de terceros en Google (Fermín J. Serna, Google)

7 years ago - 32:01

This Security Package Looks Useful… But Should You Trust It?

Snyk

This Security Package Looks Useful… But Should You Trust It?

8 days ago - 1:18

CISSP Question: Which Principle Protects Who Sees the Data? #cissp

Study Notes and Theory

CISSP Question: Which Principle Protects Who Sees the Data? #cissp

7 days ago - 0:19

The AI Security Imperative: Governance, Compliance, and Risk Management

Vignesh Ganesan

The AI Security Imperative: Governance, Compliance, and Risk Management

7 days ago - 41:26

Simplifying Cybersecurity with Microsoft Security Copilot

Vignesh Ganesan

Simplifying Cybersecurity with Microsoft Security Copilot

7 days ago - 43:12

Most Aren’t Ready for Real Cloud Security (CCSP) #ccsp

Study Notes and Theory

Most Aren’t Ready for Real Cloud Security (CCSP) #ccsp

7 days ago - 0:16

Beyond Stuxnet What We Learned from the Cyber Disruption #spy

Curious Chronicles

Beyond Stuxnet What We Learned from the Cyber Disruption #spy

5 days ago - 0:32

Using Snyk to Check Security on Code Agent

Snyk

Using Snyk to Check Security on Code Agent

7 days ago - 1:10