5:05 Hundreds of Repos Compromised by NPM Worm Shai-Hulud Latio - Learn Security Together 3.1K views - 6 months ago
13:39 Another supply chain attack targeting crypto - Qix NPM Malware Latio - Learn Security Together 198 views - 7 months ago
7:52 Cybersecurity has a massive problem (MITRE and CVE lose funding) Latio - Learn Security Together 5.1K views - 11 months ago
14:22 Ingress Nightmare for Dummies (CVE-2025-1974) Latio - Learn Security Together 1.2K views - 1 year ago
22:36 Everything to know about the tj-actions attacks Latio - Learn Security Together 409 views - 1 year ago
20:25 Introduction to Cloud Vulnerability Management Latio - Learn Security Together 1.7K views - 1 year ago
26:26 How to Become a Top CTF Hacker, Interview with Jonathan Jacobi Latio - Learn Security Together 1K views - 1 year ago
18:17 Why Software Composition Analysis (SCA) Sucks Latio - Learn Security Together 1.1K views - 1 year ago
13:37 How to Detect and Respond to Polyfill Attack (Polykill) Latio - Learn Security Together 2.6K views - 1 year ago
8:55 How to Find, Exploit, and Fix Privileged Containers Latio - Learn Security Together 437 views - 1 year ago
16:38 Is runtime SCA reachability a gimmick? A look at Oligo Security Latio - Learn Security Together 1.4K views - 1 year ago
6:47 Nightly Container Rebuilds and Reducing Vulnerabilities Latio - Learn Security Together 473 views - 1 year ago
13:42 Function and Internet Reachability with Backslash Latio - Learn Security Together 562 views - 1 year ago
14:11 CVE-2024-3094 and the Future of Supply Chain Vulnerabilities Latio - Learn Security Together 722 views - 2 years ago
16:17 Secure LLM Architecture - Testing LLM Guard Latio - Learn Security Together 2.7K views - 2 years ago
9:56 What's the difference between container and SCA vulnerability scanning? Latio - Learn Security Together 880 views - 2 years ago
13:04 Container Vulnerability Scanning Sucks Latio - Learn Security Together 1.7K views - 2 years ago
24:06 Kubernetes Security (Part 3): Runtime Protection with Spyderbat Latio - Learn Security Together 797 views - 2 years ago
31:02 Kubernetes Security (Part 2): Vulnerability and Compliance Scanning Latio - Learn Security Together 970 views - 2 years ago
13:22 Kubernetes Security (Part 1): Overview and Setting up OWASP Juice Shop on EKS Latio - Learn Security Together 1.8K views - 2 years ago
13:48 How to get into Cybersecurity with no experience Latio - Learn Security Together 585 views - 2 years ago
8:41 SAST Code Security Showdown, ChatGPT vs. Snyk Code! Latio - Learn Security Together 944 views - 2 years ago
3:55 How to Setup GitLab Protected Branches, as fast as possible Latio - Learn Security Together 3.3K views - 2 years ago
19:34 How to Secure Your AI Apps - OWASP Top 10 for LLMs Latio - Learn Security Together 907 views - 2 years ago