Offensive Threat Models Against the Supply Chain
In this talk, Tony discusses the economic and geopolitical impacts of supply chain attacks, a walkthrough of supply chain threat...
Read more →In this talk, Tony discusses the economic and geopolitical impacts of supply chain attacks, a walkthrough of supply chain threat...
Read more →Elevation of Privilege: Background Adam originally created Elevation of Privilege at Microsoft as a fun and low barrier to entry...
Read more →Gareth Heyes | 04 July 2023 at 13:00 UTC As a penetration tester, you need your tools to find the...
Read more →In this talk, David gives an overview and demo of ZAP’s new heads-up display (HUD), an intuitive and awesome way...
Read more →These tools leverage the advantage that white hat penetration testers have over external attackers: they have access to server binaries/bytecode...
Read more →Existing tools were either dead, regex-based, or didn’t support the analysis capabilities he wanted, so he built and open sourced...
Read more →In this talk, Steve describes the various use cases of a software bill-of-materials (BOM), including facilitating accurate vulnerability and other...
Read more →What I Learned Watching All 44 AppSec Cali 2019 Talks OWASP AppSec California is one of my favorite security conferences:...
Read more →I hope you’ve been doing well! New Platform, Who Dis? 👋 Hello and welcome to the first edition of tl;dr...
Read more →I hope you’ve been doing well! 💪 Bro-ing Out This week I’m visiting by brother, who has kindly offered to...
Read more →I hope you’ve been doing well! The “Full Utah” Experience Last weekend I got to hang out with my friend...
Read more →In this talk, Louis covers 3 web cache related attacks: cache deception, edge side includes, and cache poisoning. Note: this...
Read more →