INTENT Security Research Summit
INTENT Security Research Summit
  • 40
  • 6 854

วีดีโอ

1 Living off Microsoft Copilot Michael Bargury, Co founder & CTO, Zenity
มุมมอง 2414 วันที่ผ่านมา
1 Living off Microsoft Copilot Michael Bargury, Co founder & CTO, Zenity
2 Hacking HiSilicon Cameras for Necessity and hacking several million other devices while at it Ro
มุมมอง 1714 วันที่ผ่านมา
2 Hacking HiSilicon Cameras for Necessity and hacking several million other devices while at it Ro
3 Breaking Your Beloved Kube's etcd for Fun & Profit Barak Sternberg, Former CEO & Advisor & Nevo Po
มุมมอง 6114 วันที่ผ่านมา
3 Breaking Your Beloved Kube's etcd for Fun & Profit Barak Sternberg, Former CEO & Advisor & Nevo Po
4 The GCP Jenga Tower Hacking Millions of Google Servers with a Single Package and more Liv Matan,
มุมมอง 14014 วันที่ผ่านมา
4 The GCP Jenga Tower Hacking Millions of Google Servers with a Single Package and more Liv Matan,
5 Once and Forever Exploring WhatsApp’s View Once Media for Fun and Giggles Tal Be'ery, Co Founder
มุมมอง 1814 วันที่ผ่านมา
5 Once and Forever Exploring WhatsApp’s View Once Media for Fun and Giggles Tal Be'ery, Co Founder
6 Redis or Not Argo CD & GitOps Critical Vulnerability from an Attacker's Perspective Oreen Livni, S
มุมมอง 13214 วันที่ผ่านมา
6 Redis or Not Argo CD & GitOps Critical Vulnerability from an Attacker's Perspective Oreen Livni, S
8 Breaching AWS Accounts Through Shadow Resources Ofek Itach, Senior Security Researcher & Yakir Kad
มุมมอง 9314 วันที่ผ่านมา
8 Breaching AWS Accounts Through Shadow Resources Ofek Itach, Senior Security Researcher & Yakir Kad
INTENT 2024 - The Security Summit for Researchers / By Researchers
มุมมอง 86หลายเดือนก่อน
A very quick recap of our 2024 conference.
Five easy ways to spoof Contributor / Package reputation with Tzachi Zorenshtain Guy Nachshon
มุมมอง 1162 ปีที่แล้ว
Contributor/Package reputation is the main criterion used by developers when choosing what open-source package to ingrate into their application. The widespread use of open source sparked a new wave of attackers on ways to spoof the Contributor/Package reputation. In this talk, we will share some of the TTP we have seen and researched that can easily be used to fool developers into choosing mal...
DangerousSavanna: Spear Phishing the French-Speaking African Financial Sector Since 2020
มุมมอง 742 ปีที่แล้ว
Over the last two years, the DangerousSavanna campaign has been targeting financial institutions in French-speaking countries in Africa, including Ivory Coast, Morocco, Senegal, and others. The threat actor spear phished specific employees at targeted companies based on OSINT data from sources, such as LinkedIn, and masqueraded themselves as an employee at other known financial institutions in ...
Embedded Security Research - Expert Panel Discussion
มุมมอง 1852 ปีที่แล้ว
Embedded devices are all around us. From our home appliances to the computers running our critical infrastructure, we rely on embedded devices for our daily routines. For several years, these embedded devices are becoming more connected, which brings new security challenges to organizations and consumers. Security now impacts privacy, safety and availability in almost any digital product we use...
Breaking open-source CI/CD pipelines using code-search and injection by Alex Ilgayev
มุมมอง 1412 ปีที่แล้ว
GitHub Actions, the recent (from 2018) CI/CD addition to the popular source control system, is becoming an increasingly popular DevOps tool mainly due to its rich marketplace and simple integration. As part of our research of the GitHub Actions security landscape, we discovered several pitfalls awaiting developers writing build pipelines, which could cause an entire build compromise due to insu...
Ori Goldberg (VP CyberArk Labs) kicks off the INTENT 2022 Security Research Summit
มุมมอง 1312 ปีที่แล้ว
Ori Goldberg kicks off the INTENT 2022 Security Research Summit by inviting us to "Sharpen our Axes" and share experiences as a community.
Project TEMPA - Demystifying Tesla's Bluetooth Passive Entry System by Martin Herfurt
มุมมอง 1872 ปีที่แล้ว
Have you ever wondered how Tesla keeps its cars safe and secure? In this case study, we take a deep dive into the inner workings of Tesla's Passive Entry System and core VCSEC protocol to uncover potential attack vectors. Don't miss out on the discussion - check it out now!
Colorful Vulnerabilities by Tal Lossos
มุมมอง 1832 ปีที่แล้ว
Colorful Vulnerabilities by Tal Lossos
In line with the Syscalls by Itamar Medyoni
มุมมอง 2712 ปีที่แล้ว
In line with the Syscalls by Itamar Medyoni
CyberArk INTENT 2022 SUMMIT Highlights
มุมมอง 5682 ปีที่แล้ว
CyberArk INTENT 2022 SUMMIT Highlights
INTENT Security Research Summit - 2022 Recap
มุมมอง 2412 ปีที่แล้ว
INTENT Security Research Summit - 2022 Recap
Workshop: Dissecting and Comparing Different Binaries to Malware Analysis
มุมมอง 903 ปีที่แล้ว
Workshop: Dissecting and Comparing Different Binaries to Malware Analysis
Automated 0-Day Discovery in 2021 - Squashing the Low-Hanging Fruit
มุมมอง 1183 ปีที่แล้ว
Automated 0-Day Discovery in 2021 - Squashing the Low-Hanging Fruit
Workshop: HTTP Request Smuggling
มุมมอง 1723 ปีที่แล้ว
Workshop: HTTP Request Smuggling
Workshop: Dissecting and Comparing Different Binaries to Malware Analysis
มุมมอง 323 ปีที่แล้ว
Workshop: Dissecting and Comparing Different Binaries to Malware Analysis
Eclectic Research, Esoteric Results
มุมมอง 353 ปีที่แล้ว
Eclectic Research, Esoteric Results
Cross-Document Messaging Technology - How to Hack it, and How to Use it Safely.
มุมมอง 683 ปีที่แล้ว
Cross-Document Messaging Technology - How to Hack it, and How to Use it Safely.
1-Click to Infiltrate your Organization via Vulnerable VS Code Extensions
มุมมอง 283 ปีที่แล้ว
1-Click to Infiltrate your Organization via Vulnerable VS Code Extensions
Shades of Red: RedXOR Linux Backdoor and its Chinese Origins
มุมมอง 623 ปีที่แล้ว
Shades of Red: RedXOR Linux Backdoor and its Chinese Origins
How to Systematically Find 0-days in Open-Source Packages
มุมมอง 533 ปีที่แล้ว
How to Systematically Find 0-days in Open-Source Packages
Award Ceremony & Summit Closure
มุมมอง 383 ปีที่แล้ว
Award Ceremony & Summit Closure
Workshop: Code Obfuscation through Mixed Boolean-Arithmetic Expressions
มุมมอง 1.3K3 ปีที่แล้ว
Workshop: Code Obfuscation through Mixed Boolean-Arithmetic Expressions

ความคิดเห็น

  • @rezaulbari3404
    @rezaulbari3404 6 วันที่ผ่านมา

    Hey there, your channel, "INTENT Security Research Summit," offers valuable insights on topics like LLMs and jailbreak vulnerabilities. However, your analytics suggest lower impressions, impacting your views and subscriber growth. I can optimize your channel by enhancing video titles, descriptions, tags, and hashtags, along with managing off-page SEO and promoting your videos on social media to increase visibility. Let’s start with one video as a test to showcase improvements in reach and engagement. Looking forward to helping your channel grow!

  • @sTL45oUw
    @sTL45oUw 11 วันที่ผ่านมา

    You have 15 minutes to explain something simple that only takes 30 seconds to explain. so explain to a crowd of pros like they kindergarten kids.

  • @ligos69
    @ligos69 13 วันที่ผ่านมา

    That was a very interesting take on how M-I-M/supply-chain attacks can actually create a domino effect that could in potential do bilions of dollars of damage :)

  • @honorefragonard631
    @honorefragonard631 ปีที่แล้ว

    Can you do a similar explanation for a townhouse apartment of phone line and/or Ethernet tap, or air conditioning tap with spy bug that clicks randomly even when air con hasn’t been plugged in for months

  • @meravmedyoni6164
    @meravmedyoni6164 2 ปีที่แล้ว

    איזה תותח 👏👏👏

  • @louski331
    @louski331 2 ปีที่แล้ว

    Great information to know I am being harassed via my electric mart meter found out by checking the ip address found out it was from 35 F st. Wellsboro PA.16901 anyway need to know what software could that Peron be using to send malicious code to my appliances so they I'll not work until I unplug then plug back in after 5 minutes how are my electric sockets being networked?