Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
79 results
In this video, we dive deep into two of the most powerful frameworks in cybersecurity: MITRE ATT&CK and the Cyber Kill Chain!
63 views
11 months ago
Jamie Williams is an engineer for The MITRE Corporation where he works on various efforts involving security operations and ...
145 views
4 years ago
With the evolution of the Purple Team, it is very easy to blur the lines and forget where the Red & Blue Teams start and end, how ...
97 views
How many times did you open the MITRE ATT&CK website yesterday? If you're like most threat intelligence analysts, that number ...
246 views
3 weeks ago
So welcome to my presentation what the lock so many events so little time in the mitre attack edition my name is Miriam is now ...
1,107 views
6 years ago
And one of the ways you can do this is by loading in all the attack data from the framework itself or mitre attack because they ...
10,943 views
In mitre attack there's kind of a technique which is called binary padding so we can actually we can just type a substring or we can ...
2,399 views
Security teams have long relied on the MITRE ATT&CK framework to define known adversarial tactics and techniques, and ...
889 views
5 years ago
The Hidden Dangers of Connected Supply Chains: A 2026 Cybersecurity Deep Dive As global trade networks become ...
8 views
3 days ago
This week, Chris talked about MITRE's ATT&CK Framework, a globally accessible knowledge base of cyber adversary tactics and ...
81 views
Streamed 7 years ago
In this video, we explore the concept of threat hunting and how to get started with it in Microsoft Sentinel. We'll also dive into the ...
6,566 views
2 years ago
Safeguarding the Digital Supply Chain As global logistics and vendor ecosystems become increasingly digitized, the risk of ...
0 views
In today's digital landscape, the survival and long‑term success of any organization depend on two critical pillars: a resilient ...
29 views
6 days ago
Resources such as SANS's "Know Normal, Find Evil" and MITRE's ATT&CK framework are a great starting point when looking for ...
796 views
8 years ago
MITRE ATT&CK Framework Explained in Hindi क्या आप जानते हैं कि hackers cyber attacks कैसे plan ...
745 views
10 months ago
featuring tiredg0th academia_gothica © 2022 by academia_gothica is licensed under CC BY-SA 4.0 for the rest of the parts, ...
18 views
Ever asked a vendor for alert rules or techniques to catch the bad guys only to be told: “every organization is unique”? While there ...
390 views
Cybersecurity is no longer just a technical battlefield — it's a human one. This video explores how mindset, emotional intelligence, ...
46 views
10 days ago
Building Effective Attack Detection in the Cloud - Alfie Champion & Nick Jones, F-Security Consulting The cloud has significantly ...
260 views
Disrupting the Kill Chain is a defender's approach to minimizing cyber-adversary access and success in a Windows environment.
403 views
7 years ago
Traditionally SOCs look outward from their network perimeters, missing the adversaries already operating in their networks.
2,317 views
У цьому відео ми розбираємо Man-in-the-Middle (MITM) атаки не як окремі трюки (ARP, DNS, Wi-Fi), а як повноцінний Kill ...
Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon North America 2021 in Los Angeles, CA from October ...
1,954 views
Conóces tu ciber- protección a fondo? Vulnerabilidades: Las puertas abiertas al ciberataque ⚠️ Una vulnerabilidad es una ...
112 views
8 months ago
The Talos researchers are no stranger to APT attacks. During recent research, we observed how APT actors are evolving and how ...
393 views