YoVDO

Threat Detection Courses

Undocumented MS Word Features Abused by Attackers
Kaspersky via YouTube
Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts
IEEE via YouTube
A Stealthier Partitioning Attack Against Bitcoin Peer-to-Peer Network
IEEE via YouTube
Grapl - A Graph Platform for Detection and Response
BSidesLV via YouTube
Red Team Revenge - Attacking Microsoft ATA
44CON Information Security Conference via YouTube
Detection Engineering Methodologies
LASCON via YouTube
Once Upon a Time in the West - A Story on DNS Attacks
OWASP Foundation via YouTube
The Importance of the Cloud and the Developers Communities in Fighting Cyber Crime
OWASP Foundation via YouTube
Defeating APT10 Compiler-level Obfuscations
Cooper via YouTube
DeTT&CT - Mapping Your Blue Team to MITRE ATT&CK
Cooper via YouTube
< Prev Page 11 Next >