Threat Models Courses
Black Hat via YouTube Wireless Overview - Protocols & Threat Models
Black Hat via YouTube Diving into the Tenacious Threats of Cloud Data Lakes
RSA Conference via YouTube Addressing Evolving Threat Models in Cloud Security with Open-Source Software
CNCF [Cloud Native Computing Foundation] via YouTube Do I Have a Signature to Detect That Malware
YouTube Classic Misdirection - Social Engineering to Counter Surveillance
YouTube Common Darknet Weaknesses
YouTube Squint Hard Enough - Attacking Perceptual Hashing with Adversarial Machine Learning
USENIX via YouTube Machine Unlearning and Privacy Implications - Differential Privacy for ML
Google TechTalks via YouTube How to Read a PL-Security Paper
ACM SIGPLAN via YouTube