ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

75 results

Infin1teXploit
How to Think Like a Hacker: MITRE ATT&CK & Kill Chain Explained in LESS  than 5 Minutes! ⏱️

In this video, we dive deep into two of the most powerful frameworks in cybersecurity: MITRE ATT&CK and the Cyber Kill Chain!

4:42
How to Think Like a Hacker: MITRE ATT&CK & Kill Chain Explained in LESS than 5 Minutes! ⏱️

63 views

11 months ago

AME ATT&CK Community
Jaime Williams - Updates From The MITRE ATT&CK Team

Jamie Williams is an engineer for The MITRE Corporation where he works on various efforts involving security operations and ...

42:00
Jaime Williams - Updates From The MITRE ATT&CK Team

145 views

4 years ago

Adam Goss
Stop Wasting Time on MITRE ATT&CK Lookups: Use the ATT&CK Powered Suite!

How many times did you open the MITRE ATT&CK website yesterday? If you're like most threat intelligence analysts, that number ...

13:32
Stop Wasting Time on MITRE ATT&CK Lookups: Use the ATT&CK Powered Suite!

247 views

3 weeks ago

Cooper
EventList, Matching Windows Event Log IDs With MITRE ATT&CK - Miriam Wiesner

So welcome to my presentation what the lock so many events so little time in the mitre attack edition my name is Miriam is now ...

30:10
EventList, Matching Windows Event Log IDs With MITRE ATT&CK - Miriam Wiesner

1,107 views

6 years ago

Cooper
Visualising MISP And Att&ck Data In Maltego - Christophe Vandeplas

In mitre attack there's kind of a technique which is called binary padding so we can actually we can just type a substring or we can ...

16:44
Visualising MISP And Att&ck Data In Maltego - Christophe Vandeplas

2,399 views

6 years ago

BSidesKC
Emulating the Adversary While Training the Defenders: Purple Teaming with MITRE ATT&CK

With the evolution of the Purple Team, it is very easy to blur the lines and forget where the Red & Blue Teams start and end, how ...

47:19
Emulating the Adversary While Training the Defenders: Purple Teaming with MITRE ATT&CK

97 views

4 years ago

Falcon Eye 360
Supply Chain Cyber Risks360

Safeguarding the Digital Supply Chain As global logistics and vendor ecosystems become increasingly digitized, the risk of ...

5:39
Supply Chain Cyber Risks360

0 views

2 days ago

Falcon Eye 360
Deep Dive: The 2026 Connected Supply Chain Cyber Threat

The Hidden Dangers of Connected Supply Chains: A 2026 Cybersecurity Deep Dive As global trade networks become ...

6:52
Deep Dive: The 2026 Connected Supply Chain Cyber Threat

8 views

2 days ago

CNCF [Cloud Native Computing Foundation]
Webinar: Mitigating Kubernetes attacks

Security teams have long relied on the MITRE ATT&CK framework to define known adversarial tactics and techniques, and ...

56:26
Webinar: Mitigating Kubernetes attacks

889 views

5 years ago

Falcon Eye 360
Defending Organizational Architecture and Digital Privacy

In today's digital landscape, the survival and long‑term success of any organization depend on two critical pillars: a resilient ...

3:43
Defending Organizational Architecture and Digital Privacy

29 views

5 days ago

Jeroen Niesen
Getting started with Threat Hunting in Microsoft Sentinel

In this video, we explore the concept of threat hunting and how to get started with it in Microsoft Sentinel. We'll also dive into the ...

13:22
Getting started with Threat Hunting in Microsoft Sentinel

6,562 views

2 years ago

BruCON Security Conference
15 - BruCON 0x0A - Disrupting the Kill Chain - Vineet Bhatia

Disrupting the Kill Chain is a defender's approach to minimizing cyber-adversary access and success in a Windows environment.

59:13
15 - BruCON 0x0A - Disrupting the Kill Chain - Vineet Bhatia

403 views

7 years ago

Falcon Eye 360
The Human Factor in Cybersecurity: Mindset, Skills, and Productivity Management

Cybersecurity is no longer just a technical battlefield — it's a human one. This video explores how mindset, emotional intelligence, ...

6:55
The Human Factor in Cybersecurity: Mindset, Skills, and Productivity Management

45 views

9 days ago

BSidesATL
BSidesATL 2020 - Connect: How to build your own SIEM with open source tools and methodologies

Ever asked a vendor for alert rules or techniques to catch the bad guys only to be told: “every organization is unique”? While there ...

30:34
BSidesATL 2020 - Connect: How to build your own SIEM with open source tools and methodologies

390 views

5 years ago

CNCF [Cloud Native Computing Foundation]
Uncovering a Sophisticated Kubernetes Attack in Real-Time - Jed Salazar & Natália Réka Ivánkó

Don't miss out! Join us at our upcoming event: KubeCon + CloudNativeCon North America 2021 in Los Angeles, CA from October ...

20:15
Uncovering a Sophisticated Kubernetes Attack in Real-Time - Jed Salazar & Natália Réka Ivánkó

1,954 views

4 years ago

solomongo | FORMACIÓN
018 VULNERABILIDADES💡#CVE #MITREATTACK #Pentesting #Auditoría  #BackEnd #IFCT119PO #vulnerabilidad

Conóces tu ciber- protección a fondo? Vulnerabilidades: Las puertas abiertas al ciberataque ⚠️ Una vulnerabilidad es una ...

0:42
018 VULNERABILIDADES💡#CVE #MITREATTACK #Pentesting #Auditoría #BackEnd #IFCT119PO #vulnerabilidad

112 views

8 months ago

Cooper
DeTT&CT: Mapping Your Blue Team To MITRE ATT&CK - Ruben Bouman and Marcus Bakker

And one of the ways you can do this is by loading in all the attack data from the framework itself or mitre attack because they ...

20:04
DeTT&CT: Mapping Your Blue Team To MITRE ATT&CK - Ruben Bouman and Marcus Bakker

10,941 views

6 years ago

Sly Fox
MITM Kill Chain — Mapping до MITRE ATT&CK | SOC & DFIR Detection Strategy

У цьому відео ми розбираємо Man-in-the-Middle (MITM) атаки не як окремі трюки (ARP, DNS, Wi-Fi), а як повноцінний Kill ...

9:56
MITM Kill Chain — Mapping до MITRE ATT&CK | SOC & DFIR Detection Strategy

18 views

3 weeks ago

Shailendra Srivastava
🚀 MITRE ATT&CK Framework in Hindi| Cyber Security Explained | Ethical Hacking🔥@shailendra-srivastava

MITRE ATT&CK Framework Explained in Hindi क्या आप जानते हैं कि hackers cyber attacks कैसे plan ...

7:22
🚀 MITRE ATT&CK Framework in Hindi| Cyber Security Explained | Ethical Hacking🔥@shailendra-srivastava

743 views

10 months ago

Cyber@UC
Meeting 74: MITRE Framework, pt. 1

This week, Chris talked about MITRE's ATT&CK Framework, a globally accessible knowledge base of cyber adversary tactics and ...

1:13:41
Meeting 74: MITRE Framework, pt. 1

81 views

Streamed 7 years ago