Category: Mix
In this talk, Steve describes the various use cases of a software bill-of-materials (BOM), including facilitating accurate vulnerability and other…
What I Learned Watching All 44 AppSec Cali 2019 Talks OWASP AppSec California is one of my favorite security conferences:…
I hope you’ve been doing well! New Platform, Who Dis? 👋 Hello and welcome to the first edition of tl;dr…
I hope you’ve been doing well! 💪 Bro-ing Out This week I’m visiting by brother, who has kindly offered to…
I hope you’ve been doing well! The “Full Utah” Experience Last weekend I got to hang out with my friend…
In this talk, Louis covers 3 web cache related attacks: cache deception, edge side includes, and cache poisoning. Note: this…
Back in March 2023, I noticed an interesting security advisory that was published by Wordfence about a critical “Authentication Bypass…
Emma Stocks | 03 July 2023 at 14:54 UTC Want to create customized scans without the hassle of learning advanced…
Summary URL query parameters are not adequately sanitised before they are placed into an HTTP Location header. An attacker can…
One of the targets we looked at late last year was Citrix Gateway. Citrix Gateway is another of these “all-in-one”…
Ollie Whitehouse | 29 June 2023 at 12:46 UTC Scripted scan checks in Burp Suite Professional are now a thing…
Customizable integrations for today’s security team Resolving vulnerabilities quickly depends on several factors, not least how effectively security and product…


![[tl;dr sec] #186 – Enterprise Purple Teaming, Cloud CTFs, Code Review with LLMs [tl;dr sec] #186 - Enterprise Purple Teaming, Cloud CTFs, Code Review with LLMs](https://image.cybernoz.com/wp-content/uploads/2023/07/tldr-sec-186-Enterprise-Purple-Teaming-Cloud-CTFs-Code-360x270.jpg)
![[tl;dr sec] #187 – AWS Pentest Methodology, Destroyed by Breach, Awesome LLM Cybersecurity Tools [tl;dr sec] #187 - AWS Pentest Methodology, Destroyed by Breach, Awesome LLM Cybersecurity Tools](https://image.cybernoz.com/wp-content/uploads/2023/07/tldr-sec-187-AWS-Pentest-Methodology-Destroyed-by-Breach-360x270.jpg)
![[tl;dr sec] #188 – Security Interview Questions, Secret Scanning Tools, PentestGPT [tl;dr sec] #188 - Security Interview Questions, Secret Scanning Tools, PentestGPT](https://image.cybernoz.com/wp-content/uploads/2023/07/tldr-sec-188-Security-Interview-Questions-Secret-Scanning-Tools-360x270.jpg)





