
Sign up to save your podcasts
Or


This week in the Application Security News, JSON Web Token Validation Bypass in Auth0 Authentication API, Mining for malicious Ruby gems, A Brief History of a Rootable Docker Image, Privacy In The Time Of COVID, and Threat modeling explained: A process for anticipating cyber attacks!
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://wiki.securityweekly.com/ASWEpisode104
By Security Weekly Productions4.8
44 ratings
This week in the Application Security News, JSON Web Token Validation Bypass in Auth0 Authentication API, Mining for malicious Ruby gems, A Brief History of a Rootable Docker Image, Privacy In The Time Of COVID, and Threat modeling explained: A process for anticipating cyber attacks!
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://wiki.securityweekly.com/ASWEpisode104

7,728 Listeners

371 Listeners

266 Listeners

375 Listeners

638 Listeners

1,020 Listeners

8,007 Listeners

178 Listeners

181 Listeners

314 Listeners

74 Listeners

57 Listeners

136 Listeners

40 Listeners

46 Listeners