Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,385 results
In this video I discuss the TriangleDB attack chain that allowed hackers to completely compromise iPhones starting with a zero ...
411,285 views
5 months ago
Insights from Zephyr Security Audit and Vulnerability Experiences - Flavio Ceolin, Intel & David Brown, Linaro, LTD This talk ...
13 views
2 months ago
In this video I discuss how advanced persistent threat actors managed to backdoor xz-utils and almost gained system RCE on ...
230,993 views
Developing a Secure, Open Future - Christopher (CRob) Robinson, Intel The OpenSSF was formed to help improve the security of ...
26 views
View the full free MOOC at https://ost2.fyi/Vulns1002. This class is for C/C++ developers learning secure development, and ...
204 views
4 months ago
Toolchains for the Future - Victor Rodriguez, Intel As it has been seen in the last decade the performance and security of an ...
399 views
In this video I discuss how Microsoft's CoPilot+ PC's will bring new levels of spyware to the computing space with "features" like ...
185,053 views
1 month ago
— — — — — — — — — ❤️ SUBSCRIBE TO MY YOUTUBE CHANNEL Click here to subscribe: ...
79,720 views
Estimating Security Risk Through Repository Mining - Tamas K. Lengyel, Intel Can we calculate the security risk of a software ...
104 views
8 months ago
Panel Discussion: 6 Months In: (Building and) Using the OpenSSF Security Toolbelt - Sarah Evans, Dell Technologies; CRob, ...
16 views
Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon Europe in Paris from March 19-22, 2024.
396 views
7 months ago
Understanding the changes happening in your environment is critical to proactively reducing risk. In this session, we will cover a ...
537 views
The focus will be on the idea of a security vulnerability: what happens when a vulnerability is reported, how it gets fixed, tracked, ...
273 views
11 months ago
In this video I discuss how a recent flaw found in the AMD chips within Tesla's allows hackers to unlocked upgrades (like heated ...
525,588 views
10 months ago
View the full free MOOC at https://ost2.fyi/Arch4001. This course will be an advanced Intel architecture and firmware security class ...
128 views
... the Linux kernel deals with security vulnerabilities. This talk will go into how the Linux kernel security team works, how changes ...
2,989 views
Keynote: Linux Kernel Security Demystified - Greg Kroah-Hartman, Linux Kernel Developer & Fellow, The Linux Foundation.
1,301 views
6 months ago
Nobody has actually addressed this on Youtube yet; but what happens to our Steam and GOG games on Windows for ARM ...
8,028 views
In a previous life, Miguel worked tirelessly to get Unity and other game engines to adopt .NET as a runtime to execute their game ...
16,305 views
... opposite effect and chill anyone from wanting to report security vulnerabilities that affect everyone. Lack of clear reporting paths, ...
52,687 views
9 months ago