Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,378 results
In this video I discuss the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero ...
411,402 views
6 months ago
Insights from Zephyr Security Audit and Vulnerability Experiences - Flavio Ceolin, Intel & David Brown, Linaro, LTD This talk ...
13 views
2 months ago
Developing a Secure, Open Future - Christopher (CRob) Robinson, Intel The OpenSSF was formed to help improve the security of ...
26 views
In this video I discuss how advanced persistent threat actors managed to backdoor xz-utils and almost gained system RCE on ...
231,154 views
Toolchains for the Future - Victor Rodriguez, Intel As it has been seen in the last decade the performance and security of an ...
401 views
View the full free MOOC at https://ost2.fyi/Vulns1002. This class is for C/C++ developers learning secure development, and ...
204 views
4 months ago
In this video I discuss how Microsoft's CoPilot+ PC's will bring new levels of spyware to the computing space with "features" like ...
185,751 views
1 month ago
⏱️ Time Stamps ⏱️ 00:00 Defending Developers 01:25 Defining Threat Actors 02:17 Ransomeware as a service 05:17 Initial ...
5,386 views
11 months ago
During this video series, we investigate firmware as found on real devices. In this first part, we discuss the LogoFAIL vulnerability ...
797 views
Estimating Security Risk Through Repository Mining - Tamas K. Lengyel, Intel Can we calculate the security risk of a software ...
104 views
8 months ago
Nobody has actually addressed this on Youtube yet; but what happens to our Steam and GOG games on Windows for ARM ...
8,080 views
Understanding the changes happening in your environment is critical to proactively reducing risk. In this session, we will cover a ...
537 views
Keynote: Linux Kernel Security Demystified - Greg Kroah-Hartman, Linux Kernel Developer & Fellow, The Linux Foundation.
1,311 views
Securing the Unseen: Vulnerability Research in Confidential Computing- Josh Eads.
32 views
Breaking Ground, 18:00 Tuesday In today's software development landscape, vulnerability scanners and SCA tools play a vital ...
81 views
OpenFL: Building Better AI Models with Private Data - Niroop Ammbashankar, Intel Federated learning is a paradigm that enables ...
58 views
Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon Europe in Paris from March 19-22, 2024.
396 views
7 months ago
The focus will be on the idea of a security vulnerability: what happens when a vulnerability is reported, how it gets fixed, tracked, ...
273 views
Panel Discussion: 6 Months In: (Building and) Using the OpenSSF Security Toolbelt - Sarah Evans, Dell Technologies; CRob, ...
16 views
There is a lot of misunderstanding about how the Linux kernel deals with security vulnerabilities. This talk will go into how the ...
933 views