The Practical Application Of Indirect Prompt Injection Attacks - David Willis-Owen
![](https://i.ytimg.com/vi/Fz4un08Ehe8/mqdefault.jpg)
14:56
Prompt Injections - An Introduction
![](https://i.ytimg.com/vi/W5Ui18KlCsE/mqdefault.jpg)
29:55
Cloaked In Pixels: Concealing Payloads With Steganography - Ben Folland
![](https://i.ytimg.com/vi/vXJY5qcaGAw/mqdefault.jpg)
31:50
Elevate Your SSRF Game: Weaponize Internal DNS Records To Expose Hidden Endpoints - Guy Arazi
![](https://i.ytimg.com/vi/S5MKPtRpVpY/mqdefault.jpg)
50:40
Prompt Injection: When Hackers Befriend Your AI - Vetle Hjelle - NDC Security 2024
![](https://i.ytimg.com/vi/Rhpqiunpu0c/mqdefault.jpg)
37:01
Practical LLM Security: Takeaways From a Year in the Trenches
![](https://i.ytimg.com/vi/Ycn5qVvgfyE/mqdefault.jpg)
44:15
An Introduction To Fault- Injection For Exploiting Bug-Free Code In Embedded Systems - @barsteward
![](https://i.ytimg.com/vi/vNM9969i7F8/mqdefault.jpg)
29:11
Malware Code Similarity Through Vectorsearch - Remco Sprooten
![](https://i.ytimg.com/vi/2vfedn94wWw/mqdefault.jpg)
11:18