Inside BlackHat and Defcon. Vegas Vlog
Security Break
Inside BlackHat and Defcon. Vegas Vlog
6:55
Stay Ahead in the Cybersecurity Industry #shorts
Security Break
Stay Ahead in the Cybersecurity Industry #shorts
0:06
Hunting Adversarial Prompts #shorts
Security Break
Hunting Adversarial Prompts #shorts
0:23
Want to Succeed in Cybersecurity? Here is My Advice #shorts
Security Break
Want to Succeed in Cybersecurity? Here is My Advice #shorts
0:59
AI Isn’t Always the Answer #shorts
Security Break
AI Isn’t Always the Answer #shorts
0:37
NOVA for AI Security #shorts
Security Break
NOVA for AI Security #shorts
0:55
How I Built Proximity: The MCP Security Scanner
Security Break
How I Built Proximity: The MCP Security Scanner
9:42
AI Prompt Hunting with NOVA and the YARA Tool Kit - Guest Thomas Roccia
Security Break
AI Prompt Hunting with NOVA and the YARA Tool Kit - Guest Thomas Roccia
57:01
Diffusion en direct de Security Break
Security Break
Diffusion en direct de Security Break
Build a Custom MCP for YARA Rule Creation
Security Break
Build a Custom MCP for YARA Rule Creation
12:47
Making Sense of Threat Actor Naming
Security Break
Making Sense of Threat Actor Naming
5:22
Generative AI Security - Framework Introduction
Security Break
Generative AI Security - Framework Introduction
8:04
NOVA: The Prompt Pattern Matching
Security Break
NOVA: The Prompt Pattern Matching
2:32
FabricUI: A web interface for managing your prompt (pattern) collection.
Security Break
FabricUI: A web interface for managing your prompt (pattern) collection.
0:56
Malware Analysis #short
Security Break
Malware Analysis #short
0:31
What is Cyber Threat Intelligence?
Security Break
What is Cyber Threat Intelligence?
0:44
Log4Shell Meme #Short
Security Break
Log4Shell Meme #Short
1:00
Selection of scariest ransomware for Halloween 🎃 #short #halloween #ransomware #cybersecurity
Security Break
Selection of scariest ransomware for Halloween 🎃 #short #halloween #ransomware #cybersecurity
0:16
TECHNIQUES D'ÉVASION UTILISÉES PAR LES MALWARES
Security Break
TECHNIQUES D'ÉVASION UTILISÉES PAR LES MALWARES
5:05
MALWARE : Techniques d'Attribution (Extrait Conférence Ecole 42)
Security Break
MALWARE : Techniques d'Attribution (Extrait Conférence Ecole 42)
5:09
MALWARE - Vecteur d'INFECTION
Security Break
MALWARE - Vecteur d'INFECTION
3:41
Techniques de PERSISTANCE utilisées par les MALWARES
Security Break
Techniques de PERSISTANCE utilisées par les MALWARES
4:50
Cybercrime As A Service : MALWARE, DDOS, EXPLOIT...
Security Break
Cybercrime As A Service : MALWARE, DDOS, EXPLOIT...
4:49
MELTDOWN & SPECTRE - Explanation of these hardware vulnerabilities
Security Break
MELTDOWN & SPECTRE - Explanation of these hardware vulnerabilities
6:15
Les CRYPTO MINER MALWARE
Security Break
Les CRYPTO MINER MALWARE
3:40
Les ROOTKITS
Security Break
Les ROOTKITS
3:46
LES RANSOMWARES
Security Break
LES RANSOMWARES
4:54
Qu'est ce qu'un MALWARE ?
Security Break
Qu'est ce qu'un MALWARE ?
4:05
What is Return Oriented Programming?
Security Break
What is Return Oriented Programming?
2:41
What is a Heap Spray?
Security Break
What is a Heap Spray?
2:47