1:26:08
Mastering Adversary Emulation with Caldera: A Practical Guide
1.6K views • 4 months ago
1:29:51
The Second Rule of Hacking: There Are No Rules
631 views • 4 months ago
59:33
From Pentest to Red Team: Overview of The Necessary Skills and Breakdown of Frameworks
882 views • 4 months ago
1:23:22
OT Pen-testing: How Not to Sink an Oil Rig
449 views • 4 months ago
32:42
Fortifying Resilience: An In-Depth Exploration of the Overall Product Security Assessment Poster
81 views • 4 months ago
0:51
SANS Pen Test 2024: A Sneak Peek Into All That's in Store!
390 views • 4 months ago
1:45
Learn About SEC565: Red Team Operations and Adversary Emulation
1.8K views • 5 months ago
28:29
A Compendium of Exploits and Bypasses for eBPF-based Cloud Security
497 views • 7 months ago
31:19
Proxyjacking: The Latest Cybercriminal Side Hustle
683 views • 7 months ago
34:26
A Series of Unfortunate Events: A Tail of Hacking Organizations Through Bug Bounties
552 views • 7 months ago
35:25
The Latest Exploit (BLASTPASS) in the Ongoing NSOZero-Click/Zero-Day Exploitation Campaign
671 views • 7 months ago
34:50
Just Pocket Change? Examining the Cost of “Nickel and Dime” Exploit Mitigations
342 views • 7 months ago
30:03
A Hole in the Bucket: The Risk of Public Access toCloud Native Storage
161 views • 7 months ago
35:03
Seek Out New Protocols, and Boldly Hack Undetected
243 views • 7 months ago
32:37
A Practical Approach to Smart Fuzzing:Discovering 8 Zero-Days in a Week
316 views • 7 months ago
40:43
Modern Adversarial Reconnaissance – Long Live the External
4.1K views • 7 months ago
29:41
Enhancing Red Teaming with AI and ML
736 views • 7 months ago
42:02
Keynote | Hacking the Cloud Like an APT
6.8K views • 7 months ago
27:08
Unlocking Secrets: An Exploration of PulseView &Side-Channel Timing Attacks
115 views • 7 months ago
34:19
The Invisible Threat: AI-Powered Vishing Attacks and Defense Strategies
718 views • 7 months ago
28:03
Ab)using the Microsoft Identity Platform: ExploringAzure AD Token Caching
802 views • 7 months ago
46:12
That Shouldn’t Have Worked
372 views • 7 months ago
33:03
Anti-Deception: Catching the Canaries
285 views • 7 months ago
40:42
Keynote | Security Research: Not Just for Nation States
975 views • 7 months ago
1:06
Combating Supply Chain Attacks with Product Security Testing
759 views • 1 year ago
1:18:28
VulnerabilityGPT: Cybersecurity in the Age of LLM and AI
20K views • 1 year ago
1:00:07
Cloud Scanning For Vulnerability Discovery
1.2K views • 1 year ago
56:51
Sneak Peek - SEC598: Security Automation For Offense Defense And Cloud
1K views • 1 year ago
34:44
Smart Contract Hacking
3.3K views • 1 year ago
39:38
Hacking Serverless Applications:A Treasure Map for Uncharted Waters
811 views • 1 year ago
Load More