Channel Avatar

CactusCon @UCfQavabFV0i9RzVpcERESEA@youtube.com

1.6K subscribers - no pronouns :c

The official YouTube channel for Arizona's largest informati


08:21:35
CC12 - Track 2, Saturday 2/17/24 B
07:57:23
CC12 - Track 1, Saturday 2/17/24 B
05:34:25
CC12 - Track 3, Saturday 2/17/24
40:06
CactusCon 12 Closing Remarks
56:25
CC12 - The Best Free Resources to Get Started in Incident Response
49:39
CC12 - The Registry Hives you may be MSIX-ing
41:56
CC12 - Simple Ways to Make Webhook Security Better
59:10
CC12 - SBOMs for Evil: Turning Un-Remediated Software Supply Chain Documentation into an Attack Path
56:55
CC12 - A cactus coup at the goldrush saloon: swindling machine learning caches via wagon train
47:26
CC12 - Opening the DarkGate: Exploring the Destructive Potential of AutoIT and Possible Mitigations
26:49
CC12 - Unlocking RFID Security: A Deep Dive into Flipper Zero and the Vulnerabilities of Multiclass
57:13
CC12 - From Cyber Lemons to Lemonade: A Refreshing Take on Exposed Data
51:50
CC12 - Every Contact Leaves a Trace
27:28
CC12 - Worst of Cybersecurity Reporting 2023
57:56
CC12 Keynote - Naomi Brockwell: Building a More Private Future
56:52
CC12 - Veilid, the future of privacy- aka- how to destroy capitalism with the Cult of the Dead Cow
54:32
CC12 - IAES: Guarding the University of Arizona's Heartbeat – The Watchful Eye on Critical
23:42
CC12 - DON’T PANIC!: An IR Guide to Communicating with Execs
28:52
CC12 - Exploring RMM Tools and Their Forensics
54:04
CC12 - Validating Identity in a World of Deepfakes
50:20
CC12 - Cyber Espionage and the Global Power Struggle: A Deep Dive
39:09
CC12 - Clearing the Fog: Detection and Defense against Cloud Persistence Techniques
06:40:29
CC12 - Track 3, Friday 2/16/23
56:01
CC12 - Never Break the Chain: Attack Chaining for 0-Days
06:35:35
CC12 - Track 2, Friday 2/16/23
44:32
CC12 - Novel Detection Technique of Process Injection using Network Anomalies
02:17:29
CactusCon 12 - Track 1- Friday PART B
25:10
CC12 - Leaving Doors Unlocked With Cognito
57:02
CC12 - Cloud security for the network security engineer, or why it’s all just so wrong these days.
55:38
CC12 - Command, Control, and memes: Cordyceps + ant = zombie
50:28
CC12 - The Story of a Never Ending Scam: When Natalie Hamilton Reemerged with Vengeance and a Power
01:02:56
CC12 - Arizona Elections Security Prep for 2024
58:44
CC12 - Catch Me If You Can: Hunting Cloud Exfiltration Using Anomaly Detection
51:06
CC12 - 60 minutes: Hack this AWS account
04:13:18
CactusCon 12 - Track 1- Friday
04:01
CC12 Keynote - Riana Pfefferkorn: Who's Afraid of Responsible Vulnerability Disclosure?
44:37
CC12 - Betrayed by Your Browser: How Third-Party Tracking Systems Are Following You Online and What
46:09
CC12 - Building a Backyard TI Platform that Works for You
47:41
CC12 - Reverse Engineering Go Malware: A BianLian Story
55:30
CC12 - Breaking in to the Iron Fortress - How I hack IBM mainframes
42:31
CC12 - Come WiFind Me: WiFi and other RF Survelliance
23:05
CC12 - Subdomain Takeover
07:50
CC12 - It's Phishing Season: An Overview of Phishing Kits
01:30:42
CC12 - Track 2, Saturday 2/17/24
02:25
CC12 - Track 1, Saturday 2/17/24
11:54:56
CactusCon 11 - Day 2 (1/28) Track 3
08:59:27
CactusCon 11 - Day 2 (1/28) Track 1
07:42:35
CactusCon 11 - Day 2 (1/28) Track 2
07:28:44
CactusCon 11 - Day 1 (1/27) Track 1
07:21:20
CactusCon 11 - Day 1 (1/27) Track 3
06:51:11
CactusCon 11 - Day 1 (1/27) Track 2
48:16
CactusCon 10 Closing Ceremonies
41:36
CC10 - How not to suck at CFPs: Real-World Feedback from the CC10 Review Board
51:11
CC10 - Offensive Debugging: .NET Poops of Gold
57:36
CC10 - Level Up Your Vulnerability Management Program
44:51
CC10 - Forensic Artifacts in Free Tiers of Azure, GCP, and AWS
30:51
CC10 - Keynote: Charles Shirer