
Sign up to save your podcasts
Or
Bounty Everything
This ebook has in-depth explanations of how bug bounties work, how the economy works within the bug bounty, and how the researchers are paid and treated.
Understanding Website SQL Injections
A high-level deep dive into SQL injection, so even those that have no understanding of what an injection attack is can learn how they work.
Mazin Ahmed -- Terraform Security
Terraform is all the rage in the infrastructurous code world. Mazin walks through all things you need to understand about terraform, the security challenges and where to learn more in this episode of the Application Security Podcast.
10 real-world stories of how we've compromised CI/CD pipeline
We all have CI/CD pipelines that we are using in a DevOps world to build our production software; those pipelines have vulnerabilities. Check out these real-world examples to become more educated about the security issues you need to care about.
Cryptocurrencies: Tracing the evolution of criminal finances
This Intelligence Notification provides an overview of the illicit use of cryptocurrencies, including those services that facilitate their illicit use, illustrating relevant modi opzerandi using case examples.
Bounty Everything
This ebook has in-depth explanations of how bug bounties work, how the economy works within the bug bounty, and how the researchers are paid and treated.
Understanding Website SQL Injections
A high-level deep dive into SQL injection, so even those that have no understanding of what an injection attack is can learn how they work.
Mazin Ahmed -- Terraform Security
Terraform is all the rage in the infrastructurous code world. Mazin walks through all things you need to understand about terraform, the security challenges and where to learn more in this episode of the Application Security Podcast.
10 real-world stories of how we've compromised CI/CD pipeline
We all have CI/CD pipelines that we are using in a DevOps world to build our production software; those pipelines have vulnerabilities. Check out these real-world examples to become more educated about the security issues you need to care about.
Cryptocurrencies: Tracing the evolution of criminal finances
This Intelligence Notification provides an overview of the illicit use of cryptocurrencies, including those services that facilitate their illicit use, illustrating relevant modi opzerandi using case examples.