Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,350 results
In this video I discuss the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero ...
410,770 views
5 months ago
Insights from Zephyr Security Audit and Vulnerability Experiences - Flavio Ceolin, Intel & David Brown, Linaro, LTD This talk ...
12 views
1 month ago
Toolchains for the Future - Victor Rodriguez, Intel As it has been seen in the last decade the performance and security of an ...
378 views
View the full free MOOC at https://ost2.fyi/Vulns1002. This class is for C/C++ developers learning secure development, and ...
202 views
3 months ago
Developing a Secure, Open Future - Christopher (CRob) Robinson, Intel The OpenSSF was formed to help improve the security of ...
26 views
Understanding the changes happening in your environment is critical to proactively reducing risk. In this session, we will cover a ...
529 views
8 months ago
In this video I discuss how advanced persistent threat actors managed to backdoor xz-utils and almost gained system RCE on ...
230,259 views
2 months ago
In this video I discuss how Microsoft's CoPilot+ PC's will bring new levels of spyware to the computing space with "features" like ...
179,918 views
4 weeks ago
View the full free MOOC at https://ost2.fyi/Arch4001. This course will be an advanced Intel architecture and firmware security class ...
197 views
Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon Europe in Paris from March 19-22, 2024.
396 views
6 months ago
Estimating Security Risk Through Repository Mining - Tamas K. Lengyel, Intel Can we calculate the security risk of a software ...
103 views
... the Linux kernel deals with security vulnerabilities. This talk will go into how the Linux kernel security team works, how changes ...
2,976 views
219 views
Securing the Unseen: Vulnerability Research in Confidential Computing- Josh Eads.
32 views
There is a lot of misunderstanding about how the Linux kernel deals with security vulnerabilities. This talk will go into how the ...
922 views
⏱️ Time Stamps ⏱️ 00:00 Defending Developers 01:25 Defining Threat Actors 02:17 Ransomeware as a service 05:17 Initial ...
5,386 views
11 months ago
Nobody has actually addressed this on Youtube yet; but what happens to our Steam and GOG games on Windows for ARM ...
7,739 views
4 months ago
During this video series, we investigate firmware as found on real devices. In this first part, we discuss the LogoFAIL vulnerability ...
785 views
125 views
Keynote: Linux Kernel Security Demystified - Greg Kroah-Hartman, Linux Kernel Developer & Fellow, The Linux Foundation.
1,273 views