ºÝºÝߣshows by User: sbc-vn / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: sbc-vn / Wed, 09 Oct 2024 09:22:34 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: sbc-vn ?n m¨¬nh k?t n?i C&C - Xu h??ng t?n c?ng v¨¤ c¨¢ch ph¨°ng th? /slideshow/n-minh-k-t-n-i-c-c-xu-h-ng-t-n-cong-va-cach-phong-th/272289587 nmnhktnicc-xuhngtncngvcchphngth-241009092234-44fb4ace
?n m¨¬nh k?t n?i C&C - Xu h??ng t?n c?ng v¨¤ c¨¢ch ph¨°ng th?]]>

?n m¨¬nh k?t n?i C&C - Xu h??ng t?n c?ng v¨¤ c¨¢ch ph¨°ng th?]]>
Wed, 09 Oct 2024 09:22:34 GMT /slideshow/n-minh-k-t-n-i-c-c-xu-h-ng-t-n-cong-va-cach-phong-th/272289587 sbc-vn@slideshare.net(sbc-vn) ?n m¨¬nh k?t n?i C&C - Xu h??ng t?n c?ng v¨¤ c¨¢ch ph¨°ng th? sbc-vn ?n m¨¬nh k?t n?i C&C - Xu h??ng t?n c?ng v¨¤ c¨¢ch ph¨°ng th? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nmnhktnicc-xuhngtncngvcchphngth-241009092234-44fb4ace-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ?n m¨¬nh k?t n?i C&amp;C - Xu h??ng t?n c?ng v¨¤ c¨¢ch ph¨°ng th?
?n m¨¬nh k?t n?i C&C - Xu h??ng t?n c?ng v¨¤ c¨¢ch ph¨°ng th? from Security Bootcamp
]]>
596 0 https://cdn.slidesharecdn.com/ss_thumbnails/nmnhktnicc-xuhngtncngvcchphngth-241009092234-44fb4ace-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
AI-ttacks - Nghi¨ºn c?u v? m?t s? t?n c?ng v¨¤o c¨¢c m? h¨¬nh h?c m¨¢y v¨¤ AI /slideshow/ai-ttacks-nghien-c-u-v-m-t-s-t-n-cong-vao-cac-mo-hinh-h-c-may-va-ai/272234581 aittackbc2024-241007055820-8cd95cb2
AI-ttacks - Nghi¨ºn c?u v? m?t s? t?n c?ng v¨¤o c¨¢c m? h¨¬nh h?c m¨¢y v¨¤ AI]]>

AI-ttacks - Nghi¨ºn c?u v? m?t s? t?n c?ng v¨¤o c¨¢c m? h¨¬nh h?c m¨¢y v¨¤ AI]]>
Mon, 07 Oct 2024 05:58:20 GMT /slideshow/ai-ttacks-nghien-c-u-v-m-t-s-t-n-cong-vao-cac-mo-hinh-h-c-may-va-ai/272234581 sbc-vn@slideshare.net(sbc-vn) AI-ttacks - Nghi¨ºn c?u v? m?t s? t?n c?ng v¨¤o c¨¢c m? h¨¬nh h?c m¨¢y v¨¤ AI sbc-vn AI-ttacks - Nghi¨ºn c?u v? m?t s? t?n c?ng v¨¤o c¨¢c m? h¨¬nh h?c m¨¢y v¨¤ AI <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/aittackbc2024-241007055820-8cd95cb2-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> AI-ttacks - Nghi¨ºn c?u v? m?t s? t?n c?ng v¨¤o c¨¢c m? h¨¬nh h?c m¨¢y v¨¤ AI
AI-ttacks - Nghi¨ºn c?u v? m?t s? t?n c?ng v¨¤o c¨¢c m? h¨¬nh h?c m¨¢y v¨¤ AI from Security Bootcamp
]]>
772 0 https://cdn.slidesharecdn.com/ss_thumbnails/aittackbc2024-241007055820-8cd95cb2-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Human and AI - Balancing Innovation and Data Privacy in the Age of Cyber Threats /slideshow/human-and-ai-balancing-innovation-and-data-privacy-in-the-age-of-cyber-threats/272181789 linhnhhumanandai-balancinginnovationanddataprivacyintheageofcyberthreats-241004050806-fff10cf7
Human and AI - Balancing Innovation and Data Privacy in the Age of Cyber Threats]]>

Human and AI - Balancing Innovation and Data Privacy in the Age of Cyber Threats]]>
Fri, 04 Oct 2024 05:08:05 GMT /slideshow/human-and-ai-balancing-innovation-and-data-privacy-in-the-age-of-cyber-threats/272181789 sbc-vn@slideshare.net(sbc-vn) Human and AI - Balancing Innovation and Data Privacy in the Age of Cyber Threats sbc-vn Human and AI - Balancing Innovation and Data Privacy in the Age of Cyber Threats <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/linhnhhumanandai-balancinginnovationanddataprivacyintheageofcyberthreats-241004050806-fff10cf7-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Human and AI - Balancing Innovation and Data Privacy in the Age of Cyber Threats
Human and AI - Balancing Innovation and Data Privacy in the Age of Cyber Threats from Security Bootcamp
]]>
1619 0 https://cdn.slidesharecdn.com/ss_thumbnails/linhnhhumanandai-balancinginnovationanddataprivacyintheageofcyberthreats-241004050806-fff10cf7-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Robustness of Deep learning mode ls.pptx /slideshow/robustness-of-deep-learning-mode-ls-pptx/272179818 thanhnguyencong-robustnessofdeeplearningmodels-241004030402-875d646f
Thanh Nguyen Cong - Robustness of Deep learning models]]>

Thanh Nguyen Cong - Robustness of Deep learning models]]>
Fri, 04 Oct 2024 03:04:02 GMT /slideshow/robustness-of-deep-learning-mode-ls-pptx/272179818 sbc-vn@slideshare.net(sbc-vn) Robustness of Deep learning mode ls.pptx sbc-vn Thanh Nguyen Cong - Robustness of Deep learning models <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/thanhnguyencong-robustnessofdeeplearningmodels-241004030402-875d646f-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Thanh Nguyen Cong - Robustness of Deep learning models
Robustness of Deep learning mode ls.pptx from Security Bootcamp
]]>
1970 0 https://cdn.slidesharecdn.com/ss_thumbnails/thanhnguyencong-robustnessofdeeplearningmodels-241004030402-875d646f-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
DLL Sideloading cho m?i nh¨¤ - Security Bootcamp 2024 /slideshow/dll-sideloading-cho-m-i-nha-security-bootcamp-2024/272178124 dllsideloading2024-241004013225-d92fa789
DLL Sideloading cho m?i nh¨¤ - Security Bootcamp 2024]]>

DLL Sideloading cho m?i nh¨¤ - Security Bootcamp 2024]]>
Fri, 04 Oct 2024 01:32:25 GMT /slideshow/dll-sideloading-cho-m-i-nha-security-bootcamp-2024/272178124 sbc-vn@slideshare.net(sbc-vn) DLL Sideloading cho m?i nh¨¤ - Security Bootcamp 2024 sbc-vn DLL Sideloading cho m?i nh¨¤ - Security Bootcamp 2024 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dllsideloading2024-241004013225-d92fa789-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> DLL Sideloading cho m?i nh¨¤ - Security Bootcamp 2024
DLL Sideloading cho m?i nh¨¤ - Security Bootcamp 2024 from Security Bootcamp
]]>
2147 0 https://cdn.slidesharecdn.com/ss_thumbnails/dllsideloading2024-241004013225-d92fa789-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Let the Hunt Begin - Security Bootcamp 2024 /slideshow/let-the-hunt-begin-security-bootcamp-2024/272177882 securitybootcamp2024tuedenngodefendletthehuntbegin2-241004011907-075febc9
Let the Hunt Begin - Security Bootcamp 2024]]>

Let the Hunt Begin - Security Bootcamp 2024]]>
Fri, 04 Oct 2024 01:19:07 GMT /slideshow/let-the-hunt-begin-security-bootcamp-2024/272177882 sbc-vn@slideshare.net(sbc-vn) Let the Hunt Begin - Security Bootcamp 2024 sbc-vn Let the Hunt Begin - Security Bootcamp 2024 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securitybootcamp2024tuedenngodefendletthehuntbegin2-241004011907-075febc9-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Let the Hunt Begin - Security Bootcamp 2024
Let the Hunt Begin - Security Bootcamp 2024 from Security Bootcamp
]]>
2177 0 https://cdn.slidesharecdn.com/ss_thumbnails/securitybootcamp2024tuedenngodefendletthehuntbegin2-241004011907-075febc9-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Detection as Code - Effective Approach to manage & optimize SOC Development /slideshow/detection-as-code-effective-approach-to-manage-optimize-soc-development/272177780 longnhvdetectionascodeslide2-241004011313-3568eb35
Detection as Code - Effective Approach to manage & optimize SOC Development]]>

Detection as Code - Effective Approach to manage & optimize SOC Development]]>
Fri, 04 Oct 2024 01:13:13 GMT /slideshow/detection-as-code-effective-approach-to-manage-optimize-soc-development/272177780 sbc-vn@slideshare.net(sbc-vn) Detection as Code - Effective Approach to manage & optimize SOC Development sbc-vn Detection as Code - Effective Approach to manage & optimize SOC Development <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/longnhvdetectionascodeslide2-241004011313-3568eb35-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Detection as Code - Effective Approach to manage &amp; optimize SOC Development
Detection as Code - Effective Approach to manage & optimize SOC Development from Security Bootcamp
]]>
2229 0 https://cdn.slidesharecdn.com/ss_thumbnails/longnhvdetectionascodeslide2-241004011313-3568eb35-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Qu?n tr? r?i ro ngu?n m? t?i c¨¢c doanh nghi?p ph?n m?m Vi?t Nam /slideshow/qu-n-tr-r-i-ro-ngu-n-m-t-i-cac-doanh-nghi-p-ph-n-m-m-vi-t-nam/272177684 quantriruironguonmo-nhq-241004010545-9bb82d9f
Qu?n tr? r?i ro ngu?n m? t?i c¨¢c doanh nghi?p ph?n m?m Vi?t Nam: Hi?n tr?ng, kh¨® kh?n v¨¤ h??ng gi?i quy?t]]>

Qu?n tr? r?i ro ngu?n m? t?i c¨¢c doanh nghi?p ph?n m?m Vi?t Nam: Hi?n tr?ng, kh¨® kh?n v¨¤ h??ng gi?i quy?t]]>
Fri, 04 Oct 2024 01:05:44 GMT /slideshow/qu-n-tr-r-i-ro-ngu-n-m-t-i-cac-doanh-nghi-p-ph-n-m-m-vi-t-nam/272177684 sbc-vn@slideshare.net(sbc-vn) Qu?n tr? r?i ro ngu?n m? t?i c¨¢c doanh nghi?p ph?n m?m Vi?t Nam sbc-vn Qu?n tr? r?i ro ngu?n m? t?i c¨¢c doanh nghi?p ph?n m?m Vi?t Nam: Hi?n tr?ng, kh¨® kh?n v¨¤ h??ng gi?i quy?t <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/quantriruironguonmo-nhq-241004010545-9bb82d9f-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Qu?n tr? r?i ro ngu?n m? t?i c¨¢c doanh nghi?p ph?n m?m Vi?t Nam: Hi?n tr?ng, kh¨® kh?n v¨¤ h??ng gi?i quy?t
Qu?n tr? r?i ro ngu?n m? t?i c¨¢c doanh nghi?p ph?n m?m Vi?t Nam from Security Bootcamp
]]>
2059 0 https://cdn.slidesharecdn.com/ss_thumbnails/quantriruironguonmo-nhq-241004010545-9bb82d9f-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ph?n t¨ªch m?t chi?n d?ch ransomware: T? lan truy?n ??n t?ng ti?n /slideshow/phan-tich-m-t-chi-n-d-ch-ransomware-t-lan-truy-n-d-n-t-ng-ti-n/272177610 slideransomware2-241004010024-5f08887e
Ph?n t¨ªch m?t chi?n d?ch ransomware: T? lan truy?n ??n t?ng ti?n]]>

Ph?n t¨ªch m?t chi?n d?ch ransomware: T? lan truy?n ??n t?ng ti?n]]>
Fri, 04 Oct 2024 01:00:24 GMT /slideshow/phan-tich-m-t-chi-n-d-ch-ransomware-t-lan-truy-n-d-n-t-ng-ti-n/272177610 sbc-vn@slideshare.net(sbc-vn) Ph?n t¨ªch m?t chi?n d?ch ransomware: T? lan truy?n ??n t?ng ti?n sbc-vn Ph?n t¨ªch m?t chi?n d?ch ransomware: T? lan truy?n ??n t?ng ti?n <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/slideransomware2-241004010024-5f08887e-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ph?n t¨ªch m?t chi?n d?ch ransomware: T? lan truy?n ??n t?ng ti?n
Ph¥Æ¡¸n t¥Æ¥åch m±_³å chiÌo¥½n d±_×hh ransomware: T±_¥© lan truy±_£Ý ¥È÷쥳¥½n t±_„“g ti±_£Ý from Security Bootcamp
]]>
2145 0 https://cdn.slidesharecdn.com/ss_thumbnails/slideransomware2-241004010024-5f08887e-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CyberJutsu - The Joern-ey of Static Code Analysis.pdf /slideshow/cyberjutsu-the-joern-ey-of-static-code-analysis-pdf/272177431 cyberjutsu-thejoern-eyofstaticcodeanalysis-241004005335-a38c06a0
CyberJutsu - The Joern-ey of Static Code Analysis.pdf]]>

CyberJutsu - The Joern-ey of Static Code Analysis.pdf]]>
Fri, 04 Oct 2024 00:53:35 GMT /slideshow/cyberjutsu-the-joern-ey-of-static-code-analysis-pdf/272177431 sbc-vn@slideshare.net(sbc-vn) CyberJutsu - The Joern-ey of Static Code Analysis.pdf sbc-vn CyberJutsu - The Joern-ey of Static Code Analysis.pdf <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cyberjutsu-thejoern-eyofstaticcodeanalysis-241004005335-a38c06a0-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> CyberJutsu - The Joern-ey of Static Code Analysis.pdf
CyberJutsu - The Joern-ey of Static Code Analysis.pdf from Security Bootcamp
]]>
2267 0 https://cdn.slidesharecdn.com/ss_thumbnails/cyberjutsu-thejoern-eyofstaticcodeanalysis-241004005335-a38c06a0-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security in the AI and Web3 era - Veramine /slideshow/security-in-the-ai-and-web3-era-veramine/272177313 secaiweb3-sbc2024-241004004339-067b8c99
Secucity in the AI and Web3 era - Nguy?n Duy L?n - Veramine]]>

Secucity in the AI and Web3 era - Nguy?n Duy L?n - Veramine]]>
Fri, 04 Oct 2024 00:43:39 GMT /slideshow/security-in-the-ai-and-web3-era-veramine/272177313 sbc-vn@slideshare.net(sbc-vn) Security in the AI and Web3 era - Veramine sbc-vn Secucity in the AI and Web3 era - Nguy?n Duy L?n - Veramine <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/secaiweb3-sbc2024-241004004339-067b8c99-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Secucity in the AI and Web3 era - Nguy?n Duy L?n - Veramine
Security in the AI and Web3 era - Veramine from Security Bootcamp
]]>
2123 0 https://cdn.slidesharecdn.com/ss_thumbnails/secaiweb3-sbc2024-241004004339-067b8c99-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
?? AI ???C AN TO?N, MINH B?CH, C? TR?CH NHI?M V? ¡®NH?N T?NH¡¯ H?N /slideshow/d-ai-d-c-an-toan-minh-b-ch-co-trach-nhi-m-va-nhan-tinh-h-n/272159065 sbc2024-241003043945-37cf2ffa
?? AI ???C AN TO?N, MINH B?CH, C? TR?CH NHI?M V? ¡®NH?N T?NH¡¯ H?N]]>

?? AI ???C AN TO?N, MINH B?CH, C? TR?CH NHI?M V? ¡®NH?N T?NH¡¯ H?N]]>
Thu, 03 Oct 2024 04:39:45 GMT /slideshow/d-ai-d-c-an-toan-minh-b-ch-co-trach-nhi-m-va-nhan-tinh-h-n/272159065 sbc-vn@slideshare.net(sbc-vn) ?? AI ???C AN TO?N, MINH B?CH, C? TR?CH NHI?M V? ¡®NH?N T?NH¡¯ H?N sbc-vn ?? AI ???C AN TO?N, MINH B?CH, C? TR?CH NHI?M V? ¡®NH?N T?NH¡¯ H?N <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sbc2024-241003043945-37cf2ffa-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ?? AI ???C AN TO?N, MINH B?CH, C? TR?CH NHI?M V? ¡®NH?N T?NH¡¯ H?N
?? AI ???C AN TO?N, MINH B?CH, C? TR?CH NHI?M V? ¡®NH?N T?NH¡¯ H?N from Security Bootcamp
]]>
2085 0 https://cdn.slidesharecdn.com/ss_thumbnails/sbc2024-241003043945-37cf2ffa-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Modern Security Operations - Building and leading modern SOC /slideshow/modern-security-operations-building-and-leading-modern-soc/272155619 sbc-modern-security-operations-cuong-241003011811-52fdcebd
MODERN SECURITY OPERATIONS- BUILDING AND LEADING MODERN SOC]]>

MODERN SECURITY OPERATIONS- BUILDING AND LEADING MODERN SOC]]>
Thu, 03 Oct 2024 01:18:11 GMT /slideshow/modern-security-operations-building-and-leading-modern-soc/272155619 sbc-vn@slideshare.net(sbc-vn) Modern Security Operations - Building and leading modern SOC sbc-vn MODERN SECURITY OPERATIONS- BUILDING AND LEADING MODERN SOC <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sbc-modern-security-operations-cuong-241003011811-52fdcebd-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> MODERN SECURITY OPERATIONS- BUILDING AND LEADING MODERN SOC
Modern Security Operations - Building and leading modern SOC from Security Bootcamp
]]>
2222 0 https://cdn.slidesharecdn.com/ss_thumbnails/sbc-modern-security-operations-cuong-241003011811-52fdcebd-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Humanity and AI: Balancing Innovation and Data Privacy in the Age of Cyber Threats /slideshow/humanity-and-ai-balancing-innovation-and-data-privacy-in-the-age-of-cyber-threats/272155552 linhnhthamlunsbc-2024-241003011255-070717a5
Humanity and AI: Balancing Innovation and Data Privacy in the Age of Cyber Threats]]>

Humanity and AI: Balancing Innovation and Data Privacy in the Age of Cyber Threats]]>
Thu, 03 Oct 2024 01:12:55 GMT /slideshow/humanity-and-ai-balancing-innovation-and-data-privacy-in-the-age-of-cyber-threats/272155552 sbc-vn@slideshare.net(sbc-vn) Humanity and AI: Balancing Innovation and Data Privacy in the Age of Cyber Threats sbc-vn Humanity and AI: Balancing Innovation and Data Privacy in the Age of Cyber Threats <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/linhnhthamlunsbc-2024-241003011255-070717a5-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Humanity and AI: Balancing Innovation and Data Privacy in the Age of Cyber Threats
Humanity and AI: Balancing Innovation and Data Privacy in the Age of Cyber Threats from Security Bootcamp
]]>
541 0 https://cdn.slidesharecdn.com/ss_thumbnails/linhnhthamlunsbc-2024-241003011255-070717a5-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
SBC2024_AI TRONG CYBER SECURITY_final.pptx /slideshow/sbc2024_ai-trong-cyber-security_final-pptx/272155480 sbc2024aitrongcybersecurityfinal-241003010936-7783f2ff
SBC2024_AI TRONG CYBER SECURITY_final.pptx]]>

SBC2024_AI TRONG CYBER SECURITY_final.pptx]]>
Thu, 03 Oct 2024 01:09:36 GMT /slideshow/sbc2024_ai-trong-cyber-security_final-pptx/272155480 sbc-vn@slideshare.net(sbc-vn) SBC2024_AI TRONG CYBER SECURITY_final.pptx sbc-vn SBC2024_AI TRONG CYBER SECURITY_final.pptx <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sbc2024aitrongcybersecurityfinal-241003010936-7783f2ff-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> SBC2024_AI TRONG CYBER SECURITY_final.pptx
SBC2024_AI TRONG CYBER SECURITY_final.pptx from Security Bootcamp
]]>
2133 0 https://cdn.slidesharecdn.com/ss_thumbnails/sbc2024aitrongcybersecurityfinal-241003010936-7783f2ff-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber GenAI ¨C Another Chatbot? - Trellix /slideshow/cyber-genai-another-chatbot-trellix/272155422 cybergenaiv2-241003010359-d902502c
Cyber GenAI ¨CAnother Chatbot?]]>

Cyber GenAI ¨CAnother Chatbot?]]>
Thu, 03 Oct 2024 01:03:59 GMT /slideshow/cyber-genai-another-chatbot-trellix/272155422 sbc-vn@slideshare.net(sbc-vn) Cyber GenAI ¨C Another Chatbot? - Trellix sbc-vn Cyber GenAI ¨CAnother Chatbot? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybergenaiv2-241003010359-d902502c-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber GenAI ¨CAnother Chatbot?
Cyber GenAI ¨C Another Chatbot? - Trellix from Security Bootcamp
]]>
2209 0 https://cdn.slidesharecdn.com/ss_thumbnails/cybergenaiv2-241003010359-d902502c-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Akamai_ API Security Best Practices - Real-world attacks and breaches /slideshow/akamai_-api-security-best-practices-real-world-attacks-and-breaches/272155326 akamaiapisecuritybestpractices-241003005801-ee2d4c54
Akamai_ API Security Best Practices - Real-world attacks and breaches]]>

Akamai_ API Security Best Practices - Real-world attacks and breaches]]>
Thu, 03 Oct 2024 00:58:01 GMT /slideshow/akamai_-api-security-best-practices-real-world-attacks-and-breaches/272155326 sbc-vn@slideshare.net(sbc-vn) Akamai_ API Security Best Practices - Real-world attacks and breaches sbc-vn Akamai_ API Security Best Practices - Real-world attacks and breaches <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/akamaiapisecuritybestpractices-241003005801-ee2d4c54-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Akamai_ API Security Best Practices - Real-world attacks and breaches
Akamai_ API Security Best Practices - Real-world attacks and breaches from Security Bootcamp
]]>
2256 0 https://cdn.slidesharecdn.com/ss_thumbnails/akamaiapisecuritybestpractices-241003005801-ee2d4c54-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to steal a drone Drone Hijacking - VNPT Cyber Immunity /slideshow/how-to-steal-a-drone-drone-hijacking-vnpt-cyber-immunity/272155286 vcihijackingdrone-241003005415-37de2018
How to steal a drone Drone Hijacking]]>

How to steal a drone Drone Hijacking]]>
Thu, 03 Oct 2024 00:54:15 GMT /slideshow/how-to-steal-a-drone-drone-hijacking-vnpt-cyber-immunity/272155286 sbc-vn@slideshare.net(sbc-vn) How to steal a drone Drone Hijacking - VNPT Cyber Immunity sbc-vn How to steal a drone Drone Hijacking <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vcihijackingdrone-241003005415-37de2018-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to steal a drone Drone Hijacking
How to steal a drone Drone Hijacking - VNPT Cyber Immunity from Security Bootcamp
]]>
2238 0 https://cdn.slidesharecdn.com/ss_thumbnails/vcihijackingdrone-241003005415-37de2018-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Empowering Malware Analysis with IDA AppCall /slideshow/empowering-malware-analysis-with-ida-appcall/272155208 empoweringmalwareanalysiswithidaappcallfeature-241003004832-9cc5dc53
Empowering Malware Analysis with IDA AppCall]]>

Empowering Malware Analysis with IDA AppCall]]>
Thu, 03 Oct 2024 00:48:32 GMT /slideshow/empowering-malware-analysis-with-ida-appcall/272155208 sbc-vn@slideshare.net(sbc-vn) Empowering Malware Analysis with IDA AppCall sbc-vn Empowering Malware Analysis with IDA AppCall <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/empoweringmalwareanalysiswithidaappcallfeature-241003004832-9cc5dc53-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Empowering Malware Analysis with IDA AppCall
Empowering Malware Analysis with IDA AppCall from Security Bootcamp
]]>
2195 0 https://cdn.slidesharecdn.com/ss_thumbnails/empoweringmalwareanalysiswithidaappcallfeature-241003004832-9cc5dc53-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Detection of Spreading Process on many assets over the network /slideshow/detection-of-spreading-process-on-many-assets-over-the-network/272155106 akamaithreathuntsegmentationfocusedonriskremediation-241003004037-b164602f
Detection of Spreading Process on many assets over the network]]>

Detection of Spreading Process on many assets over the network]]>
Thu, 03 Oct 2024 00:40:37 GMT /slideshow/detection-of-spreading-process-on-many-assets-over-the-network/272155106 sbc-vn@slideshare.net(sbc-vn) Detection of Spreading Process on many assets over the network sbc-vn Detection of Spreading Process on many assets over the network <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/akamaithreathuntsegmentationfocusedonriskremediation-241003004037-b164602f-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Detection of Spreading Process on many assets over the network
Detection of Spreading Process on many assets over the network from Security Bootcamp
]]>
2139 0 https://cdn.slidesharecdn.com/ss_thumbnails/akamaithreathuntsegmentationfocusedonriskremediation-241003004037-b164602f-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-sbc-vn-48x48.jpg?cb=1728465647 Security Bootcamp lu?n l¨¤ m?t di?n ?¨¤n phi l?i nhu?n gi¨²p c¨¢c th¨¤nh vi¨ºn k?t n?i, chia s? v¨¤ c?p nh?t c¨¢c ki?n th?c v¨¤ k? n?ng m?i nh?t v? An ninh th?ng tin securitybootcamp.org.vn/ https://cdn.slidesharecdn.com/ss_thumbnails/nmnhktnicc-xuhngtncngvcchphngth-241009092234-44fb4ace-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/n-minh-k-t-n-i-c-c-xu-h-ng-t-n-cong-va-cach-phong-th/272289587 ?n m¨¬nh k?t n?i C&amp;C - ... https://cdn.slidesharecdn.com/ss_thumbnails/aittackbc2024-241007055820-8cd95cb2-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/ai-ttacks-nghien-c-u-v-m-t-s-t-n-cong-vao-cac-mo-hinh-h-c-may-va-ai/272234581 AI-ttacks - Nghi¨ºn c?u... https://cdn.slidesharecdn.com/ss_thumbnails/linhnhhumanandai-balancinginnovationanddataprivacyintheageofcyberthreats-241004050806-fff10cf7-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/human-and-ai-balancing-innovation-and-data-privacy-in-the-age-of-cyber-threats/272181789 Human and AI - Balanci...