In an era increasingly dominated by artificial intelligence (AI), the fundamentals of cybersecurity remain critically important for IT professionals. As organizations integrate AI technologies into their operations, the attack surface expands, creating new vulnerabilities that can be exploited by cyber criminals. Understanding core cybersecurity principles—such as risk management, threat detection, and incident response—enables IT teams Read More …
Category: InforSecTV
This is the main page for the video channels I will build under this
Conference Video – Observability in the Age of LLMs – Christine Yen
In a keynote, Christine Yen, co-founder and CEO of Honeycomb, discusses the challenges that large language models (LLMs) present to traditional software development practices like testing and debugging. She argues that the inherent unpredictability and non-deterministic nature of LLMs necessitate a shift towards observability, which focuses on understanding software behavior in production by observing what Read More …
Hacker TV – Tradecraft Course
Tradecraft is a course on red team operations. Learn to execute a targeted attack as an external actor with Cobalt Strike.
Conference Video – A Needle in a Haystack
A Needle in a Haystack: How to Find a Threat Hidden in Over 6 Billion Logs Per Day – Brian Davis This video features Brian Davis from Red Canary discussing their approach to detecting security threats within the massive volume of cloud environment logs. He explains their six-stage pipeline: Ingest, Standardize, Combine, Detect, Suppress, and Read More …
Hacker TV – GoFetch
This video demonstrates how GoFetch utilizes Bloodhound attack graph data to automatically pivot from an exploited host to the domain controller. The demonstration begins in Bloodhound, where the presenter identifies the attack path to the domain controller. After finding a path, the graph is exported for use by the attack script. The presenter then launches GoFetch Read More …
Conference Video – Why We are Not Building a Defendable Internet
Black Hat Keynote: Why We are Not Building a Defendable Internet
Hacker TV – The Future of Technology at Microsoft
Satya Nadella – The Future of Technology at Microsoft
Conference Video – Reusing Adversary Tradecraft
Super Bad06 RAT Reusing Adversary Tradecraft Alexander Rymdeko Harvey
Hacker TV – All Your Devices Can Be Hacked
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi’s primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines. In 2006 he published a Read More …
Conference Video – Internet-Scale File Analysis
Malicious file analysis is well beyond the days when the humble PE32 file was all researchers needed to contend with. The use of malicious PDF, Office, and other files present a far more diverse threat than our defensive tools were originally designed to handle. To make matters worse, the sheer volume of files over time Read More …