Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

The 443 Podcast - Episode 266 - The Threat Actor That Hacked MGM

This week on the podcast, we review a thorough unmasking of Octa Tempest, the threat actor beind the MGM and Caesars Entertainment attacks in September. Before that, we give an update on the Cisco IOS XE vulnerability that head to an implant installed on thousands of exposed devices. We round out the episode with an analysis of CitrixBleed, an information disclosure vulnerability in Citrix NetScaler that was just patched last week.

AI Hallucinations and Manipulation: AI Code Vulnerabilities in React and Fastify Node.js (part 2)

AI Hallucinations and Manipulation: AI Code Vulnerabilities in React and Fastify Node.js (part 2) Generative AI can help you write code faster, but is it secure? Learn how you can leverage the power of AI to increase your velocity while mitigating risks and staying secure. Learn from security experts Liran Tal & Simon Maple in a hands-on session where they walk through.

Voice of the SOC 2023- Key Findings

Join Tines founder Eoin Hinchy as he presents the key findings of The Voice of the SOC report 2023 and gives his insight in how we as a security community can address the more worrying trends while also capitalising on some of the positives. Having created the Voice of the SOC Analyst report in 2022, this year Tines went a step further opening up the survey to everyone in the security team right up to C-level and also surveyed security professionals across the world.

RKVST for Dropbox - bring provenance to your Dropbox files

Bring provenance to your Dropbox files with RKVST. How can you prove that your work is original, authentic, and trustworthy? How can you protect it from being copied, manipulated, or misused? That’s where RKVST comes in, documenting the origin, history, and validity of your content, such as text, images, audio, or video, so you can prove where it came from. With RKVST you can: And with RKVST for Dropbox creating and recording the provenance metadata is as easy as a click of a button. Watch our video to find out how.

Splunk SOAR Playbooks - Dynamic Identifier Reputation Analysis (Part 2)

The Dynamic Identifier Reputation Analysis playbook is an essential tool for any security operations center (SOC) team looking for a comprehensive view of their environment’s threat landscape. By leveraging MITRE DEFEND's approach for dynamic identifier reputation analysis, SOC teams can quickly identify potential threats and vulnerabilities and take proactive steps towards mitigating risk before it causes damage.

Voice of the SOC Report 2023 - Key Findings

The report follows 2022's Voice of the SOC Analyst. In 2023, we expanded the scope beyond the United States to include Europe, and sought perspectives from 900 security professionals up to and including the C-suite, rather than just analysts. This is a great opportunity to learn more about the biggest challenges facing security teams today, and how to solve them, so please do join us. Don’t worry if you can’t make it on the day - registrants will receive a recording after the webinar.

Demystifying Deep Learning: Unraveling the Brain-Inspired Evolution of AI || Razorthorn Security

Dive deep into the world of artificial intelligence with our latest video, "Unlocking the Power of Deep Learning: Exploring the Brain-Inspired Revolution in Machine Learning." In this comprehensive exploration, we'll unravel the fascinating concept of deep learning, a subset of machine learning, and understand how it's attempting to simulate the complexity of the human brain.