Threat Hunting AWS CloudTrail Logs with Microsoft Sentinel: Real-Time Attack Demo | Arijit Paul

38:00
OAuth Hacking Marathon - Exploiting Common Security Pitfalls and Mitigating Them | Kaif Ahsan

28:20
Using AI to Secure AI | Jayesh Ahire

33:30
Your Cyber Defense Game-Changer: MITRE D3FEND and How to Master It | Saba Bagheri

26:52
Andrew Ng Explores The Rise Of AI Agents And Agentic Reasoning | BUILD 2024 Keynote

38:09
Sneaky Extensions: The MV3 Escape Artists | Jeswin Mathai and Albin Antony

8:54
Germany’s Far-Right Comeback | NYT Opinion

29:29
Popping the AU gov & military through ((*DNS*)(N?SEC)) a *walk*through

22:37