Channel Avatar

Security BSides London @UCXXNOelGiY_N96a2nfhcaDA@youtube.com

4.9K subscribers - no pronouns :c

The Official Security B-Sides London YouTube Channel This is


12:49
Exploring Retail’s Cyber Threat Landscape - Alexandra Forsyth
12:48
An Abridged History Of Malware Olivia Betts
44:08
Scaling Detection And Response Teams: Enabling Efficient Investigations - James Dorgan
39:39
Breaking Bad Multifactor: MFA Bypasses And How To Assess The Risks - Chester Wisniewski
20:35
A Talk About Cross Site Scripting XSS In 2023 The Mitigated Unmitigated Vulnerability Val Resh
36:48
Elevate & Conquer: A Journey Into Kernel Exploitation - Tijme Gommers
13:47
Cloudy With A Chance Of Security Sascha Bharath
13:43
Ethical Hacking: Navigating The Modern Ethical And Moral Landscape - Muhammed Aanish Butt
45:18
Oh My Phish! - Theram and Dhruv Bisani
17:58
DevSecOps On A Budget: Building A Secure Dev Pipeline Without Breaking The Bank - Robbie Thandi
31:57
Security Is Key: The Vulnerabilities Of API Security - Joe Wrieden
37:36
Breaking The Cloud: A Tale Of 3 Breaches! - Ashish Rajan
45:49
Slightly SOSL'ed: Locating And Testing SOSL Injection - Nick Dunn
31:30
Bugs Are Shallow: Finding Vulnerabilities In Top GitHub Projects - Laurence Tennant
47:56
SOC Adventurez In TiETW- Luke Jones
43:54
Physical Intrusion - Access Un-Controlled - Iain Parkes
13:51
In Space; Everyone Can Hear Your Downlink Minus
16:26
Red Teaming On Critical Infrastructure Granit Beka
14:04
XS Leaks Client Side Attacks In A Post XSS World Zeyu Zayne Zhang
44:57
Your Friendly Penguin: Using Linux And WSL To Stay Under The Radar - Idan Ron and Max De Lacey
44:04
The Internet Never Forgets: OSINT'ing Myself To Uncover 30 Years Of Data Leakage - Thomas Preece
12:56
Wires Gone Rogue IoT Security At The Cable Level Aunart Grajqevci
12:34
Exploring The Dark Web Forums, Markets, And Scam Insights Stefan Bargan
44:35
Anti-forensics Techniques Used By Threat Actors In The Wild - Hela Lucas
17:51
The Art Of Cyber Deception - Joshua Wardle
35:33
Decentralization: Mo' Systems, Mo' Bridges, Mo' Comms, ... Mo' Problems? - Maya Boeckh
15:06
Cyber Resilience @ Industry 4.0: Strengthening Standards & Embracing Emerging Tech - Shaza Al-Haddad
14:16
The Simple Approach To Security Risk Management Asher Selman
16:39
The NonInclusivity Of InfoSec My Experience Dan Ogleby
13:22
Of Microchips And Mammals - Elliott Nash
17:44
Welcome - David Zilberberg
30:02
Connected Chaos: Uncovering Router Vulnerabilities Via Cloud API Connections - Vangelis Stykas
11:49
Abusing RWX-S Binaries For Post-exploitation - At0m
15:43
Game Hackers And You: Knowledge Extraction From Toxic Places - Morgan Brazier
48:59
Beyond The Code / SBOM: Supply Chain Security - Anant Shrivastava
10:44
Off The Hinge: Dating With OSINT - Taylor Rhoades
43:20
Closing - Brian Whelton
42:36
Game Of Codes: QR Thrones, Image Battles, And The Quest For Initial Access - Josh Kamdjou
38:38
"Open, Sesame!" Unlocking Bluetooth Padlocks With Kind Requests - Miłosz Gaczkowski & Alex Pettifer
48:01
Automated Wargaming Of A Chemical Plant - Martyn
41:13
Cloud Chatter: Defending Against Cloud C2 by Dagmawi Mulugeta
39:40
Hacking Serverless Applications: A Treasure Map For Uncharted Waters by Chen Alon
35:47
Patterns, Trends And Practises In Software Security by Elisa Cavatorta
38:37
The Office Of Danger: A Choose Your Own Adventure Story! by Phil Eveleigh
25:20
Evil Neighbour Attacks On SaaS Platforms Cloudflare, Bitbucket, Etc by Yash Kadakia
14:57
Rainbow Road: The Game Behind Cyber's Colour Theory by Ana Vijay
46:21
Detection At Scale by Troy Defty
19:53
Introduction To Bug Hunting by Hasan Elisert
13:55
Everybody Loves TAXII by Alexander Darby
21:38
Where Do You Draw The Line? by Patricia R
17:33
Exploiting Linux Capabilities by Yannis Folias
11:13
How To Introduce Proactive Security In Your Team by Wiktor Wielento
22:44
DLP Without GOD Keys A Journey In Maths by Mick Vaites
15:28
The Rise Of RaaS by Ellis Casey
13:48
Fangxiao, A Chinese Phishing Threat Actor by Emily Dennison and Alana Witten
19:34
Honeypots, I Shrunk The Data by Oscar Williamson
16:19
Hacking Brains: The Security Of Brain-Computer Interfaces by Julia Wilk
13:24
MITRE D3FEND by James Gibbins
43:42
F*** Around & Get Found Out: Disinformation As A Service by Andy Gill
14:02
DFIR - Don't Forget Your Roots! by Sabastian Hague