Category: Mix
Real TalkOne thing I appreciated about this talk is that Kelly and Nikki kept it real. Most blog posts, talks,…
An overview of the mobile and API security cat and mouse game (securely storing secrets, TLS, cert pinning, bypassing protections…
Vladimir de Turckheim, Software Engineer, Sqreen twitter, linkedinabstract slides video For vulnerabilities, a SQL injection example is given as well as regular…
The new Clear-Site-Data HTTP header allows a website to tell a user’s browser to clear various browsing data (cookies, storage,…
Stepan Ilyin, Co-founder, Wallarm twitter, linkedinabstract slides video How NGINX modules and other tools can be combined to give you a nice…
If you don’t get the process right, the technical stuff goes to waste. Background The Salesforce AppExchange was launched in…
In this talk, Tony discusses the economic and geopolitical impacts of supply chain attacks, a walkthrough of supply chain threat…
Elevation of Privilege: Background Adam originally created Elevation of Privilege at Microsoft as a fun and low barrier to entry…
Gareth Heyes | 04 July 2023 at 13:00 UTC As a penetration tester, you need your tools to find the…
In this talk, David gives an overview and demo of ZAP’s new heads-up display (HUD), an intuitive and awesome way…
These tools leverage the advantage that white hat penetration testers have over external attackers: they have access to server binaries/bytecode…
Existing tools were either dead, regex-based, or didn’t support the analysis capabilities he wanted, so he built and open sourced…











