Hacker Public Radio

HPR3906: The Oh No! News.


Listen Later

The Oh No! news.
Oh No! News is Good
News.
TAGS: Oh No News, InfoSec, browser security,
session tokens, session id
InfoSec; the language
of security.
Source: Session ID.
Source: JSON Web
Token.
Terms
of Use: Copyleft, free content
Source: Session
vs Token Based Authentication.
Terms
of Use: CC-BY-SA (with CC-BY-NC-SA elements).
Source: Steal Application
Access Token. Adversaries can steal application access tokens as a
means of acquiring credentials to access remote systems and resources.
Application access tokens are used to make authorized API requests on
behalf of a user or service and are commonly used as a way to access
resources in cloud and container-based applications and
software-as-a-service (SaaS).
Terms of
Use: Similar to CC-BY-SA
Source: Analysis:
CircleCI attackers stole session cookie to bypass MFA.
Terms of
Use: Section 8. CONTENT AND CONTENT LICENSES. NOT
certain
Source: How to Prevent
Session Hijacking?
Terms of
Use: Copyright, restrictive
Additional Information.
What is a "Data
Breach"? A data breach is a security violation, in which sensitive,
protected or confidential data is copied, transmitted, viewed, stolen,
altered or used by an individual unauthorized to do so.
What is "Malware"?
Malware (a portmanteau for
malicious software) is any software intentionally designed to cause
disruption to a computer, server, client, or computer network, leak
private information, gain unauthorized access to information or systems,
deprive access to information, or which unknowingly interferes with the
user's computer security and privacy.
What is a "Payload"?
In the context of a computer virus or worm, the payload is the portion
of the malware which performs malicious action; deleting data, sending
spam or encrypting data. In addition to the payload, such malware also
typically has overhead code aimed at simply spreading itself, or
avoiding detection.
What is "Phishing"?
Phishing is a form of so
...more
View all episodesView all episodes
Download on the App Store

Hacker Public RadioBy Hacker Public Radio

  • 4.2
  • 4.2
  • 4.2
  • 4.2
  • 4.2

4.2

34 ratings


More shows like Hacker Public Radio

View all
The Changelog: Software Development, Open Source by Changelog Media

The Changelog: Software Development, Open Source

289 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

373 Listeners

LINUX Unplugged by Jupiter Broadcasting

LINUX Unplugged

268 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

653 Listeners

Curious Cases by BBC Radio 4

Curious Cases

826 Listeners

The Strong Towns Podcast by Strong Towns

The Strong Towns Podcast

422 Listeners

Late Night Linux by The Late Night Linux Family

Late Night Linux

164 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,046 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

181 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

TechCrunch Daily Crunch by TechCrunch

TechCrunch Daily Crunch

42 Listeners

Strict Scrutiny by Crooked Media

Strict Scrutiny

5,809 Listeners

2.5 Admins by The Late Night Linux Family

2.5 Admins

98 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

140 Listeners

What the Hack? by DeleteMe

What the Hack?

221 Listeners