0:52 This is the difference between me and you – Aikido Superbowl Ad Aikido Security 194 views - 1 week ago
3:36 Intro to CSPM with aikido.dev | Cloud Secure Posture Management Aikido Security 385 views - 1 month ago
0:31 From “No Bullsh*t Security” to $1B: We Just Raised Our $60m Series B Aikido Security 186 views - 1 month ago
6:25 Intro to ASPM with aikido.dev | Application Posture Management Aikido Security 477 views - 2 months ago
10:40 AI Pentesting Vs DAST: Is AI the end of Dynamic Security Testing? Aikido Security 5.9K views - 2 months ago
15:43 What Are Code Quality Tools? How They Differ from SAST, Linters & Security Scanner Aikido Security 7.1K views - 2 months ago
24:36 OWASP Top 10 2025: Your complete guide to securing your applications Aikido Security 8.6K views - 2 months ago
13:11 Complete Guide to AI Pentesting: Using agentic AI to hack your application Aikido Security 3.5K views - 2 months ago
38:02 Inside ShaiHulud 2.0: The Supply-Chain Worm That Read Your Secrets - Bad Dependencies Podcast Aikido Security 6.4K views - 2 months ago
9:32 Cloud Security - What is CSPM / CNAP? Cloud Security Posture Management explained Aikido Security 13.4K views - 2 months ago
43:21 The State of AI in Security and Development 2026 | Virtual Session Aikido Security 124 views - 3 months ago
9:25 What Is IaC Security Scanning? Terraform, Kubernetes & Cloud Misconfigurations Explained Aikido Security 11.3K views - 3 months ago
10:03 Detecting and Preventing Malware in Modern Software Supply Chains: Tool Time by Aikido Aikido Security 7.8K views - 3 months ago
48:54 Security Masterclass for Windsurf & Devin Builders | all vibes, no vulns Aikido Security 114 views - 3 months ago
23:00 The OpenVSX Supply Chain Attack: Invisible Malware in VS Code - Bad Dependencies Podcast Aikido Security 359 views - 3 months ago
11:04 Secrets Detection: The Ultimate Guide to Secret Detection in Application Security (Aikido Tool Time) Aikido Security 1.1K views - 4 months ago
13:44 Supply Chain Security - The Ultimate Guide to Software Composition Analysis (SCA) Tools Aikido Security 21.2K views - 4 months ago
53:47 The Security Masterclass for Supabase Builders ❤️🔥 | all vibes, no vulns Aikido Security 3.2K views - 4 months ago
12:34 The Ultimate SAST Guide: What is Static Application Security Testing? Code Security with Mackenzie Aikido Security 17.6K views - 4 months ago
29:03 Discovering Shai-Hulud and the Struggle to Raise the Alarm: Bad Dependencies ft Daniel Pereira Aikido Security 3.1K views - 5 months ago
1:03:48 Security Masterclass for Lovable & Supabase with Aikido Aikido Security 439 views - 5 months ago
7:48 NPM Breach - debug & chalk Compromised in Supply Chain Attack from developer qix Aikido Security 2.1K views - 5 months ago
4:05 Scaling security to 150+ developers in just 45 minutes: GEA’s Aikido story Aikido Security 145 views - 5 months ago
5:22 Why Go Autonomous Switched from Snyk to Aikido Security Aikido Security 319 views - 6 months ago
0:21 "No Bullsh*t Security" - Literally | Introducing "The Roll" Aikido Security 225 views - 6 months ago
27:08 Phishing Attacks on NPM, Accidental Stylus Removal and Aikido Safe Chain: Bad Dependencies Episode 4 Aikido Security 131 views - 6 months ago
5:14 McDonald’s data breach - It wasn't a weak password (it was worse) Aikido Security 1.3K views - 7 months ago
28:26 Bad Dependencies Episode 3: Malware, Bug Bounties, and the Ethics of Offense Aikido Security 198 views - 7 months ago
9:30 AI Polymorphic Malware: The Future of Undetectable Threats Aikido Security 3.8K views - 7 months ago
49:29 How to secure Windsurf AI Applications - Secure Vibe Coding Webinar Aikido Security 284 views - 7 months ago
16:12 Bad Dependencies – Episode 2: The React Native Aria Backdoor Meltdown Aikido Security 159 views - 8 months ago
53:39 Securing Your Bolt.new Apps: Vibe coding security masterclass Aikido Security 463 views - 8 months ago
34:49 Bad Dependencies: JPEGs, JavaScript, and Janky Malware: Image-Based Attacks in NPM Aikido Security 271 views - 8 months ago
9:28 Identification and Authentication Failures Explained: OWASP Top 10 A07 Aikido Security 6.6K views - 9 months ago
0:27 Introducing Changelog Analysis: Upgrade with Confidence Aikido Security 111 views - 9 months ago
6:53 Insane malware hidden with invisible Unicode and Google Calendar invites! Aikido Security 79.8K views - 9 months ago
9:36 RATatouille: Finding a RAT (Remote Access Trojan) in a popular NPM package Aikido Security 4.2K views - 9 months ago
55:23 Lovable Security Masterclass - Build and Secureyour Loveable.dev Apps Aikido Security 1.9K views - 10 months ago
7:49 XRP Ledger HACKED: Official NPM Package Infected with Crypto-Stealing Malware! Aikido Security 764 views - 10 months ago
14:44 Malware breakdown: How Lazarus hides malware in plain sight, and how we spied on the Aikido Security 136.9K views - 10 months ago