ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

449 results

DEFCONConference
DEF CON 29 Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation

Defending enterprise networks against attackers continues to present a difficult challenge for blue teams. Prevention has fallen ...

38:22
DEF CON 29 Adversary Village - Mauricio Velazco - PurpleSharp Automated Adversary Simulation

800 views

4 years ago

DEFCONConference
DEF CON 29 Adversary Village - Samuel Kimmons -  Intro to Adversary Emulation

Adversary Emulation is quickly becoming a hot topic in information security, and there is a good reason for it. Security analysts ...

30:39
DEF CON 29 Adversary Village - Samuel Kimmons - Intro to Adversary Emulation

801 views

4 years ago

DEFCONConference
DEF CON 32 - Kubernetes Attack Simulation The Definitive Guide - Leo Tsaousis

So your organization decided to follow the trend and switched to Kubernetes for hosting their applications. And this means that the ...

26:46
DEF CON 32 - Kubernetes Attack Simulation The Definitive Guide - Leo Tsaousis

1,236 views

1 year ago

DEFCON Switzerland
Automating Malware Development: A Red Teamer's Journey - Gian Demarmels

Gian Demarmels (Redguard) Adversary simulation and red team operations play a crucial role in fortifying defences against ...

45:11
Automating Malware Development: A Red Teamer's Journey - Gian Demarmels

1,324 views

1 year ago

DEFCONConference
DEF CON 29 Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations

Threat actors build their tradecraft for each campaign, they need to select the right tactics, techniques. Most of the time they use ...

1:45:45
DEF CON 29 Adversary Village - Fatih Ozavci - Tradecraft Development in Adversary Simulations

762 views

4 years ago

Tknika - LH, FP, VET
Tailer Teknikoa: C&C Infraestructure in Adversary Simulation (Hector Ruiz, Josu Barrientos /Ayesa)

CyberLehia 2025. Tailer Teknikoa: Command & Control Infraestructure in Adversary Simulation (Hector Ruiz, Josu Barrientos ...

53:47
Tailer Teknikoa: C&C Infraestructure in Adversary Simulation (Hector Ruiz, Josu Barrientos /Ayesa)

74 views

10 months ago

BruCON Security Conference
08 -  BruCON 0x0B -  Automated adversary emulation using Caldera -  Erik Van Buggenhout

MITRE ATT&CK is quickly gaining traction and is becoming an important standard to use to assess the overall cyber security ...

1:00:50
08 - BruCON 0x0B - Automated adversary emulation using Caldera - Erik Van Buggenhout

8,148 views

6 years ago

CNCF [Cloud Native Computing Foundation]
Cloud Native Application Threat Modeling and Adversary Emulation : Techniques and... - Rafik Harabi

Don't miss out! Join us at our next Flagship Conference: KubeCon + CloudNativeCon Europe in Paris from March 19-22, 2024.

38:46
Cloud Native Application Threat Modeling and Adversary Emulation : Techniques and... - Rafik Harabi

647 views

2 years ago

DEFCONConference
DEF CON 26 AI VILLAGE - Brian Genz - Generating Labeled Data From Adversary Sims with MITRE ATT&CK

This technical talk will highlight key lessons learned from an internal adversary simulation at a Fortune 100 company that evolved ...

38:26
DEF CON 26 AI VILLAGE - Brian Genz - Generating Labeled Data From Adversary Sims with MITRE ATT&CK

809 views

7 years ago

BSidesLV
PG - Intel-Driven Adversary Simulation for A Holistic Approach to Cybersecurity

Proving Ground, Wed, Aug 7, 17:30 - Wed, Aug 7, 17:55 CDT Our presentation delves into the utilization of an intelligence-driven ...

22:32
PG - Intel-Driven Adversary Simulation for A Holistic Approach to Cybersecurity

181 views

1 year ago

DEFCONConference
DEF CON Safe Mode Red Team Village - Adam Pennington - Emulating  Adversary w Imperfect Intelligence

Adversary emulation has become an increasingly common type of engagement where red teams look to known threat groups to ...

57:25
DEF CON Safe Mode Red Team Village - Adam Pennington - Emulating Adversary w Imperfect Intelligence

582 views

5 years ago

DEFCONConference
DEF CON 32 - Exploiting Voice Cloning in Adversarial Simulation - Mark Foudy

We live in an era where voice verification is increasingly adopted in security protocols. The potential for abuse through voice ...

25:36
DEF CON 32 - Exploiting Voice Cloning in Adversarial Simulation - Mark Foudy

495 views

1 year ago

CNCF [Cloud Native Computing Foundation]
Purple Teaming Like Sky’s the Limit – Adversary Emulation in the Cloud... Christophe Tafani-Dereeper

Purple Teaming Like Sky's the Limit – Adversary Emulation in the Cloud with Stratus Red Team - Christophe Tafani-Dereeper, ...

23:38
Purple Teaming Like Sky’s the Limit – Adversary Emulation in the Cloud... Christophe Tafani-Dereeper

453 views

3 years ago

Alex Chaveriat
Adversary Wars CTF Contest | DEF CON 31

Checking out the DEF CON 31 Adversary Wars CTF Contest DISCORD Invite - https://discord.gg/jCNdNPKygP Subscribe to ...

4:56
Adversary Wars CTF Contest | DEF CON 31

343 views

2 years ago

DEFCONConference
DEF CON Safe Mode Red Team Village - Shay Nehmad -  Making Breach and Attack Simulation Accessible

Oftentimes one of the greatest challenges for security professionals today is finding a way to effectively communicate the state of a ...

51:19
DEF CON Safe Mode Red Team Village - Shay Nehmad - Making Breach and Attack Simulation Accessible

1,218 views

5 years ago

DEFCONConference
DEF CON Safe Mode Red Team Village - Jorge Orchilles - Deep Dive into Adversary Emulation Ransomware

A day hardly goes by without hearing about another ransomware attack. This talk will focus on how to emulate a ransomware ...

46:12
DEF CON Safe Mode Red Team Village - Jorge Orchilles - Deep Dive into Adversary Emulation Ransomware

598 views

5 years ago

BruCON Security Conference
BruCON 0x08 - Building A Successful Internal Adversarial Simulation Team - C. Gates & C. Nickerson
56:47
BruCON 0x08 - Building A Successful Internal Adversarial Simulation Team - C. Gates & C. Nickerson

7,285 views

9 years ago

DC864 Group
RedPill - MITRE model as a simulation

September 2020 DC864 meeting topic: RedPill - MITRE model as a simulation Project Home: ...

49:22
RedPill - MITRE model as a simulation

83 views

5 years ago

DEFCONConference
DEF CON 29 Adversary Village - Phillip Wylie - The Way of The Adversary

The adversary philosophy and mindset are important when trying to emulate a threat actor during a red team operation or ...

30:38
DEF CON 29 Adversary Village - Phillip Wylie - The Way of The Adversary

641 views

4 years ago

DEFCONConference
DEF CON Safe ModeBlue Team Village - Olaf Hartong, Mauricio Velazco - Purple On My Mind

Automated adversary simulation is often perceived as a hard, dangerous and complicated program to implement and run. Fear no ...

1:05:10
DEF CON Safe ModeBlue Team Village - Olaf Hartong, Mauricio Velazco - Purple On My Mind

616 views

5 years ago