The Practical Application Of Indirect Prompt Injection Attacks - David Willis-Owen
![](https://i.ytimg.com/vi/vXJY5qcaGAw/mqdefault.jpg)
31:50
Elevate Your SSRF Game: Weaponize Internal DNS Records To Expose Hidden Endpoints - Guy Arazi
![](https://i.ytimg.com/vi/LexDzVG_Xu0/mqdefault.jpg)
33:51
BYOTB: Bring Your Own Trusted Binary - David Kennedy
![](https://i.ytimg.com/vi/Ycn5qVvgfyE/mqdefault.jpg)
44:15
An Introduction To Fault- Injection For Exploiting Bug-Free Code In Embedded Systems - @barsteward
![](https://i.ytimg.com/vi/hyoOhAoaX1g/mqdefault.jpg)
39:22
Inside The Ransomware Toolbox: How To Beat Cybercriminals At Their Own Game - Will Thomas
![](https://i.ytimg.com/vi/BxA1zk9DkoE/mqdefault.jpg)
22:08
SoDa Symposium for Privacy Week: Prof. Ivan Habernal - January 28, 2025| UMD INFO College
![](https://i.ytimg.com/vi/P_fHJIYENdI/mqdefault.jpg)
24:52
The Most Useful Thing AI Has Done
![](https://i.ytimg.com/vi/OeAL43YVx18/mqdefault.jpg)
43:26
Malware Campaign Tracking Using Big Data Analytics And Machine Learning Clustering - Daniel Johnston
![](https://i.ytimg.com/vi/fB2qOF6Qf1s/mqdefault.jpg)
4:33