ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

68 results

Adam Goss
Stop Wasting Time on MITRE ATT&CK Lookups: Use the ATT&CK Powered Suite!

How many times did you open the MITRE ATT&CK website yesterday? If you're like most threat intelligence analysts, that number ...

13:32
Stop Wasting Time on MITRE ATT&CK Lookups: Use the ATT&CK Powered Suite!

231 views

2 weeks ago

Infin1teXploit
How to Think Like a Hacker: MITRE ATT&CK & Kill Chain Explained in LESS  than 5 Minutes! ⏱️

In this video, we dive deep into two of the most powerful frameworks in cybersecurity: MITRE ATT&CK and the Cyber Kill Chain!

4:42
How to Think Like a Hacker: MITRE ATT&CK & Kill Chain Explained in LESS than 5 Minutes! ⏱️

63 views

11 months ago

AME ATT&CK Community
Jaime Williams - Updates From The MITRE ATT&CK Team

Jamie Williams is an engineer for The MITRE Corporation where he works on various efforts involving security operations and ...

42:00
Jaime Williams - Updates From The MITRE ATT&CK Team

145 views

4 years ago

Andalucía Conectada
Ciberseguridad | MITRE ATT&CK

Webinar sobre ciberseguridad, centrado en una introducción sobre el framework MITRE ATT&CK, cómo utiliza y almacena la ...

1:26:47
Ciberseguridad | MITRE ATT&CK

3,925 views

3 years ago

Cooper
EventList, Matching Windows Event Log IDs With MITRE ATT&CK - Miriam Wiesner

So welcome to my presentation what the lock so many events so little time in the mitre attack edition my name is Miriam is now ...

30:10
EventList, Matching Windows Event Log IDs With MITRE ATT&CK - Miriam Wiesner

1,107 views

6 years ago

Cooper
Visualising MISP And Att&ck Data In Maltego - Christophe Vandeplas

In mitre attack there's kind of a technique which is called binary padding so we can actually we can just type a substring or we can ...

16:44
Visualising MISP And Att&ck Data In Maltego - Christophe Vandeplas

2,398 views

6 years ago

BSidesKC
Emulating the Adversary While Training the Defenders: Purple Teaming with MITRE ATT&CK

With the evolution of the Purple Team, it is very easy to blur the lines and forget where the Red & Blue Teams start and end, how ...

47:19
Emulating the Adversary While Training the Defenders: Purple Teaming with MITRE ATT&CK

97 views

4 years ago

Cooper
DeTT&CT: Mapping Your Blue Team To MITRE ATT&CK - Ruben Bouman and Marcus Bakker

And one of the ways you can do this is by loading in all the attack data from the framework itself or mitre attack because they ...

20:04
DeTT&CT: Mapping Your Blue Team To MITRE ATT&CK - Ruben Bouman and Marcus Bakker

10,935 views

6 years ago

Shailendra Srivastava
🚀 MITRE ATT&CK Framework in Hindi| Cyber Security Explained | Ethical Hacking🔥@shailendra-srivastava

MITRE ATT&CK Framework Explained in Hindi क्या आप जानते हैं कि hackers cyber attacks कैसे plan ...

7:22
🚀 MITRE ATT&CK Framework in Hindi| Cyber Security Explained | Ethical Hacking🔥@shailendra-srivastava

725 views

10 months ago

solomongo | FORMACIÓN
13 ✅ #CVE - COMMON VULNERABILITIES AND EXPOSURES #mitre #NIST #cursosonline #aprendeciberseguridad

Sábes utilizar ✓ CVE - MITRE? https://cve.mitre.org #NIST #cve #mitre #vulnerabilidades Introducción: CVE (Common ...

1:45
13 ✅ #CVE - COMMON VULNERABILITIES AND EXPOSURES #mitre #NIST #cursosonline #aprendeciberseguridad

27 views

8 months ago

BSidesATL
BSidesATL 2020 - Connect: How to build your own SIEM with open source tools and methodologies

Ever asked a vendor for alert rules or techniques to catch the bad guys only to be told: “every organization is unique”? While there ...

30:34
BSidesATL 2020 - Connect: How to build your own SIEM with open source tools and methodologies

390 views

5 years ago

Jeroen Niesen
Getting started with Threat Hunting in Microsoft Sentinel

In this video, we explore the concept of threat hunting and how to get started with it in Microsoft Sentinel. We'll also dive into the ...

13:22
Getting started with Threat Hunting in Microsoft Sentinel

6,554 views

2 years ago

Cyber@UC
Meeting 74: MITRE Framework, pt. 1

This week, Chris talked about MITRE's ATT&CK Framework, a globally accessible knowledge base of cyber adversary tactics and ...

1:13:41
Meeting 74: MITRE Framework, pt. 1

81 views

Streamed 7 years ago

CNCF [Cloud Native Computing Foundation]
Uncovering a Sophisticated Kubernetes Attack in Real-Time - Jed Salazar & Natália Réka Ivánkó

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon North America 2021 in Los Angeles, CA from October ...

20:15
Uncovering a Sophisticated Kubernetes Attack in Real-Time - Jed Salazar & Natália Réka Ivánkó

1,954 views

4 years ago

BSides Boston
Finding Haystacks in Your Needles: Threat Hunting Problems in Real World Data - Miller

Resources such as SANS's "Know Normal, Find Evil" and MITRE's ATT&CK framework are a great starting point when looking for ...

29:35
Finding Haystacks in Your Needles: Threat Hunting Problems in Real World Data - Miller

796 views

8 years ago

solomongo | FORMACIÓN
🔵 10 #SECOPS | ELIMINAR #PROTOCOLOS DE #RED INNECESARIOS #ciberseguridad #blueteam #protocolo #short

10 SECOPS | ELIMINAR PROTOCOLOS DE RED NO NECESARIOS #ciberseguridad #secops #blueteam #protocolo #red #hack ...

0:45
🔵 10 #SECOPS | ELIMINAR #PROTOCOLOS DE #RED INNECESARIOS #ciberseguridad #blueteam #protocolo #short

64 views

8 months ago

DEFCONConference
DEF CON 26 BLUE TEAM VILLAGE -  Andy Applebaum - Stop Drop and Assess your SOC

Traditionally SOCs look outward from their network perimeters, missing the adversaries already operating in their networks.

40:36
DEF CON 26 BLUE TEAM VILLAGE - Andy Applebaum - Stop Drop and Assess your SOC

2,317 views

7 years ago

solomongo | FORMACIÓN
IDS ✅ GEEKS #ids #ciberseguridad #intrusión #detector #sistema #snort #suricata #linux #ordenadores

Especialización en Ciberseguridad en Entornos de Tecnologías de la Información - 5022: Configuración de los sistemas ...

1:40
IDS ✅ GEEKS #ids #ciberseguridad #intrusión #detector #sistema #snort #suricata #linux #ordenadores

14 views

8 months ago

solomongo | FORMACIÓN
🔵 06 #SECOPS | #CONFIGURACIÓN DE #ACTUALIZACIONES Y #PARCHES #AUTOMÁTICOS #elearning #actualizacion

06 SECOPS | CONFIGURACIÓN DE ACTUALIZACIONES Y PARCHES AUTOMÁTICOS #ciberseguridad #secops #blueteam ...

0:46
🔵 06 #SECOPS | #CONFIGURACIÓN DE #ACTUALIZACIONES Y #PARCHES #AUTOMÁTICOS #elearning #actualizacion

73 views

8 months ago

NorthSec
Paul Rascagneres - Modern Reconnaissance Phase by APT – Protection Layer

The Talos researchers are no stranger to APT attacks. During recent research, we observed how APT actors are evolving and how ...

34:11
Paul Rascagneres - Modern Reconnaissance Phase by APT – Protection Layer

393 views

8 years ago