
Sign up to save your podcasts
Or
1. Sonatype Catches New PyPI Cryptomining Malware
Malicious packages continue to infect our public package repositories; all developers must understand these threats!
2. (Technical) Infosec Core Competencies
While these core competencies stray slightly to the red team / pen test side, this is a solid list of what folks need to know as they grow.
3. SSRF Cheat Sheet & Bypass Techniques
SSRF vulns are growing; application security people must understand SSRF and know how to properly find it and mitigate it.
4. MySQL 101: Installation, care, and feeding on Ubuntu
Security professionals need to have basic skills to understand and operate the technologies in our developers' tech stack.
5. BEC Taxonomy: Extortion
As application security people, we must understand the threats that impact our entire user population and look for ways to help secure the Enterprise.
1. Sonatype Catches New PyPI Cryptomining Malware
Malicious packages continue to infect our public package repositories; all developers must understand these threats!
2. (Technical) Infosec Core Competencies
While these core competencies stray slightly to the red team / pen test side, this is a solid list of what folks need to know as they grow.
3. SSRF Cheat Sheet & Bypass Techniques
SSRF vulns are growing; application security people must understand SSRF and know how to properly find it and mitigate it.
4. MySQL 101: Installation, care, and feeding on Ubuntu
Security professionals need to have basic skills to understand and operate the technologies in our developers' tech stack.
5. BEC Taxonomy: Extortion
As application security people, we must understand the threats that impact our entire user population and look for ways to help secure the Enterprise.