
Sign up to save your podcasts
Or
1. Is it safe to use SECRETS_INTERNALS_DO_NOT_USE_OR_YOU_WILL_BE_FIRED?
- https://datasociety.net/wp-content/up...
This first story is a react development issue. A developer was asking if a specific property was safe to use. This shows the importance of naming in understanding the security risks when using specific properties.
2. Adam Shostack -- Fast, cheap, and good threat models
-https://www.securityjourney.com/podca...
Adam is very well known in the world of threat modeling as a thought leader. This is his take on some new approaches he wants everyone in the industry to understand.
3. SHA-256 explained step-by-step visually
- https://sha256algorithm.com/
This is a website that will describe how SHA-256 works. Hashing algorithms are a critical part of how we protect information whether it is at rest or in transit. This is a fascinating way to go through the steps and understand how they work.
4. Over 28,000 Vulnerabilities Disclosed in 2021: Report
- https://sha256algorithm.com/
This article is describing a report published by Risk Based Security highlighting the 28,000 vulnerabilities that were disclosed in 2021. It shows that not much has changed since 2020, but check it out to see all the details.
5. Known exploited vulnerabilities catalog
- https://www.cisa.gov/known-exploited-...
This is the Know Exploited Vulnerabilities Catalog from CISA. There was a pointer in the previous story to the site as a resource to search and stay up to date on different exploitable vulnerabilities and their remediations.
1. Is it safe to use SECRETS_INTERNALS_DO_NOT_USE_OR_YOU_WILL_BE_FIRED?
- https://datasociety.net/wp-content/up...
This first story is a react development issue. A developer was asking if a specific property was safe to use. This shows the importance of naming in understanding the security risks when using specific properties.
2. Adam Shostack -- Fast, cheap, and good threat models
-https://www.securityjourney.com/podca...
Adam is very well known in the world of threat modeling as a thought leader. This is his take on some new approaches he wants everyone in the industry to understand.
3. SHA-256 explained step-by-step visually
- https://sha256algorithm.com/
This is a website that will describe how SHA-256 works. Hashing algorithms are a critical part of how we protect information whether it is at rest or in transit. This is a fascinating way to go through the steps and understand how they work.
4. Over 28,000 Vulnerabilities Disclosed in 2021: Report
- https://sha256algorithm.com/
This article is describing a report published by Risk Based Security highlighting the 28,000 vulnerabilities that were disclosed in 2021. It shows that not much has changed since 2020, but check it out to see all the details.
5. Known exploited vulnerabilities catalog
- https://www.cisa.gov/known-exploited-...
This is the Know Exploited Vulnerabilities Catalog from CISA. There was a pointer in the previous story to the site as a resource to search and stay up to date on different exploitable vulnerabilities and their remediations.