Security Journey's hi/5

Web Hacking Techniques, Exploited Vulnerabilities, Security Chaos Engineering and more


Listen Later

1. Top 10 web hacking techniques of 2020
( https://portswigger.net/research/top-10-web-hacking-techniques-of-2020 )

While the OWASP Top 10 is more high level, this list gives you the down and dirty for how attackers are using the web to break applications.​

2. What your DevOps team needs to know: 4 lessons from exploited vulnerabilities
( https://techbeacon.com/security/what-your-devops-team-needs-know-4-lessons-exploited-vulnerabilities )

Learn from security past to prevent vulnerabilities in security future.​

3. Security Chaos Engineering: How to Security Differently​
( https://www.verica.io/blog/security-chaos-engineering-how-to-security-differently/ )

Security chaos engineering is a discipline that can have a large impact on improving your security posture and culture.​

4. Introducing sigstore: Easy Code Signing & Verification for Supply Chain Integrity
( https://security.googleblog.com/2021/03/introducing-sigstore-easy-code-signing.html )

Code signing reduces or even eliminates many classes of software supply chain vulns.​

5. Nuclei: Fast and customizable vulnerability scanner based on simple YAML based DSL
( https://github.com/projectdiscovery/nuclei/ )

Nuclei is a new tool for security engineers, developers, pen testers, and bug bounty hunters to consider adding to their arsenal.​

...more
View all episodesView all episodes
Download on the App Store

Security Journey's hi/5By Security Journey