Channel Avatar

BSidesLV @UCpNGmljppAJbTIA5Msms1Pw@youtube.com

4.6K subscribers - no pronouns :c

Recordings of Security BSides Las Vegas sessions, selected s


23:10
GF - WHOIS the boss? Building Your Own WHOIS Dataset for Reconnaissance
49:21
PW - Detecting Credential Abuse
54:36
IATC - Hungry, Hungry Hackers
55:54
GT - Devising and detecting spear phishing
59:16
IATC - Health Care is in Intensive Care
55:40
HG - Behavioral Interviewee-ing: Inverting the Corporate Interview to Get You Hired
20:02
BG - LOLS: LO Level Shells
54:46
IATC - Blood in the Water: Preparing For the Feeding Frenzy
49:07
HG - You Need a Jay-z and a Beyoncé
23:09
PG - And what if it was hacked? Tactics and Impacts of Adversarial Machine Learning
34:14
CG - 101 Things Your Application is Doing Without Your Knowledge
43:40
GF - Detection Engineering Demystified: Building Custom Detections for GitHub Enterprise
25:29
PG - You can be neurodivergent and succeed in InfoSec
22:10
GT - What Do We Learn When We Scan the Internet every hour?
26:19
PG - Unleashing the Future of Development: The Secret World of Nix & Flakes
15:44
BG - Chrome Cookie Theft on macOS, and How To Prevent It
35:29
PW - Picking a fight with the banks
44:36
GT - Navigating the Changing Cyber Landscape: Trends, Costs, and Risk Mitigation Strategies
39:15
GF - Pipeline Pandemonium: How to Hijack the Cloud and Make it Rain Insecurity
28:51
BG - JIT Happens: How Instacart Uses AI to Keep Doors Open and Risks Closed
41:25
GT - Seek out new protocols, and boldly go where no one has gone before
24:46
PG - An adversarial approach to Airline Revenue Management
59:59
HG - What Goes Bump in the Night? Recruiter Panel About Job Search and Other Scary Things
35:09
GT - Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs
22:49
PG - Taking D-Bus to Explore the Bluetooth Landscape
18:35
BG - Fuzzing Frontiers: Exploring Unknown Unknown Vulnerabilities
37:08
HG - Tracking and hacking your career
53:47
GT - ZERO-RULES Alert Contextualizer & Correlator
01:01:30
HG - Brute Force Your Job Application
42:03
CG - How We Accidentally Became Hardware Hackers
01:30:49
IATC - Difficult Conversations
24:11
PG - A New Host Touches the Beacon
51:35
GF - Nothing Went to Plan..... Because You Didn't Have a Plan
41:34
CG - Security for AI Basics - Not by ChatGPT
42:18
BG - Operation So-seki: You Are a Threat Actor. As Yet You Have No Name.
41:30
GT - DoH Deception: Evading ML-Based Tunnel Detection with Black-Box Attack Techniques
44:34
CG - Beyond Whack-a-Mole: Scaling Vulnerability Management by Embracing Automation
56:19
IATC - Living With the Enemy – How to protect yourself (and Energy Systems)
39:03
PW - Breaking Historical Ciphertexts with Modern Means
01:44:19
IATC - Wars and Rumors of Wars - What are the implications for Domestic Critical Infrastructure?
16:42
CG - One Port to Serve Them All - Google GCP Cloud Shell Abuse
23:34
PG - GEN-Z Critique on SOC 2
18:39
CG - Quantum Computing: When will it break Public Key cryptography?
43:06
IATC - Security Trek: The Next Generation
20:00
BG - Hell-0_World | Making Weather Cry
51:42
GT - PhishDefend: A Reinforcement Learning Framework
15:52
GF - The road to developers' hearts
19:05
CG - Free Your Mind: Battling Our Biases
40:55
PW - Passwords 101
24:23
PG - A Quick Story Of Security Pitfalls With Exec Commands In Software Integrations
44:43
CG - Introduction to Software Defined Radio – For Offensive and Defensive Operations
19:10
Keynotes - Closing Ceremony
23:49
PW - Standardizing Password Surveys
37:29
BG - BOLABuster: Harnessing LLMs for Automating BOLA Detection
20:53
GT -Defensive Counting: How to quantify ICS exposure on the Internet when the data is out to get you
42:09
GF - Tactics of a Trash Panda
35:16
IATC - Cybersec and AI Risk Management Challenges for the Next Generation of Public Safety Systems
22:29
GT - Reassessing 50k Vulnerabilities: Insights from SSVC Evaluations in Japan's Largest Telco
23:35
GF - EHLO World: Spear-Phishing at Scale using Generative AI
27:19
PW - That's not my name