
Sign up to save your podcasts
Or


China's top hacking contest turns months of effort into 15 minutes of exploits, an injection flaw in GitHub Actions, understanding post-compromise activity in exploits targeting Solaris and VoIP, security and quality challenges in integrating software from multiple vendors, and CVE naming turns into wibbly wobbly timey wimey stuff!
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://wiki.securityweekly.com/asw129
By Security Weekly Productions4.8
44 ratings
China's top hacking contest turns months of effort into 15 minutes of exploits, an injection flaw in GitHub Actions, understanding post-compromise activity in exploits targeting Solaris and VoIP, security and quality challenges in integrating software from multiple vendors, and CVE naming turns into wibbly wobbly timey wimey stuff!
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://wiki.securityweekly.com/asw129

7,728 Listeners

371 Listeners

266 Listeners

375 Listeners

638 Listeners

1,020 Listeners

8,007 Listeners

178 Listeners

181 Listeners

314 Listeners

74 Listeners

57 Listeners

136 Listeners

40 Listeners

46 Listeners