Essential Skills for Investigating Ransomware Attacks
1:01:41
Enterprise DFIR: How to conduct a forensic investigation of a compromised employee workstation
1:14:35
The Invisible Threat: Understanding and Defending Against LOLBINs in Cyberattacks
16:35
Mythes sur les antivirus et leur fonctionnement réel
13:19
Malicious PowerShell Execution Techniques
55:23
EC-Conference2024: Thinking Differently About How and Where to Protect Sensitive Data
26:26
Les forces ukrainiennes débordées face aux soldats russes
51:19
Cybercriminalité, des attaques bien réelles | ARTE
47:45