Category: Mix

Bug Bytes #206 – Citrix more like Crit-trix amiright?
05
Jul
2023

Bug Bytes #206 – Citrix more like Crit-trix amiright?

Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…

AI and Machine Learning in Cybersecurity
05
Jul
2023

AI and Machine Learning in Cybersecurity

Note: this post currently just has content on AI + reverse engineering, but check back soon and I’ll be covering…

Practical Continuous Threat Modeling Work for Your Team
05
Jul
2023

Practical Continuous Threat Modeling Work for Your Team

Izar describes the attributes required by threat modelling approaches in order to succeed in Agile dev environments, how to build…

Behind the Scenes: Securing In-House Execution of Unsafe Third-Party Executables
05
Jul
2023

Behind the Scenes: Securing In-House Execution of Unsafe Third-Party Executables

Mukul Khullar, Staff Security Engineer, LinkedIn twitter, linkedinabstract slides video Mukul recommends a three step defense-in-depth process for mitigating these risks. 1….

An Attacker’s View of Serverless and GraphQL Apps
05
Jul
2023

An Attacker’s View of Serverless and GraphQL Apps

An overview of functions-as-a-service (FaaS) and GraphQL, relevant security considerations and attacks, and a number of demos. What is Functions-as-a-Service…

Securing your Workspaces from a Bot Uprising
05
Jul
2023

Securing your Workspaces from a Bot Uprising

Real TalkOne thing I appreciated about this talk is that Kelly and Nikki kept it real. Most blog posts, talks,…

Preventing Mobile App and API Abuse
04
Jul
2023

Preventing Mobile App and API Abuse

An overview of the mobile and API security cat and mouse game (securely storing secrets, TLS, cert pinning, bypassing protections…

Node.js and NPM Ecosystem: What are the Security Stakes?
04
Jul
2023

Node.js and NPM Ecosystem: What are the Security Stakes?

Vladimir de Turckheim, Software Engineer, Sqreen twitter, linkedinabstract slides video For vulnerabilities, a SQL injection example is given as well as regular…

the Clear Site Data Header
04
Jul
2023

the Clear Site Data Header

The new Clear-Site-Data HTTP header allows a website to tell a user’s browser to clear various browsing data (cookies, storage,…

Building Cloud-Native Security for Apps and APIs with NGINX
04
Jul
2023

Building Cloud-Native Security for Apps and APIs with NGINX

Stepan Ilyin, Co-founder, Wallarm twitter, linkedinabstract slides video How NGINX modules and other tools can be combined to give you a nice…

Securing Third Party Applications at Scale
04
Jul
2023

Securing Third Party Applications at Scale

If you don’t get the process right, the technical stuff goes to waste. Background The Salesforce AppExchange was launched in…

Offensive Threat Models Against the Supply Chain
04
Jul
2023

Offensive Threat Models Against the Supply Chain

In this talk, Tony discusses the economic and geopolitical impacts of supply chain attacks, a walkthrough of supply chain threat…