
Sign up to save your podcasts
Or
1. Top 10 web hacking techniques of 2020
( https://portswigger.net/research/top-10-web-hacking-techniques-of-2020 )
While the OWASP Top 10 is more high level, this list gives you the down and dirty for how attackers are using the web to break applications.
2. What your DevOps team needs to know: 4 lessons from exploited vulnerabilities
( https://techbeacon.com/security/what-your-devops-team-needs-know-4-lessons-exploited-vulnerabilities )
Learn from security past to prevent vulnerabilities in security future.
3. Security Chaos Engineering: How to Security Differently
( https://www.verica.io/blog/security-chaos-engineering-how-to-security-differently/ )
Security chaos engineering is a discipline that can have a large impact on improving your security posture and culture.
4. Introducing sigstore: Easy Code Signing & Verification for Supply Chain Integrity
( https://security.googleblog.com/2021/03/introducing-sigstore-easy-code-signing.html )
Code signing reduces or even eliminates many classes of software supply chain vulns.
5. Nuclei: Fast and customizable vulnerability scanner based on simple YAML based DSL
( https://github.com/projectdiscovery/nuclei/ )
Nuclei is a new tool for security engineers, developers, pen testers, and bug bounty hunters to consider adding to their arsenal.
1. Top 10 web hacking techniques of 2020
( https://portswigger.net/research/top-10-web-hacking-techniques-of-2020 )
While the OWASP Top 10 is more high level, this list gives you the down and dirty for how attackers are using the web to break applications.
2. What your DevOps team needs to know: 4 lessons from exploited vulnerabilities
( https://techbeacon.com/security/what-your-devops-team-needs-know-4-lessons-exploited-vulnerabilities )
Learn from security past to prevent vulnerabilities in security future.
3. Security Chaos Engineering: How to Security Differently
( https://www.verica.io/blog/security-chaos-engineering-how-to-security-differently/ )
Security chaos engineering is a discipline that can have a large impact on improving your security posture and culture.
4. Introducing sigstore: Easy Code Signing & Verification for Supply Chain Integrity
( https://security.googleblog.com/2021/03/introducing-sigstore-easy-code-signing.html )
Code signing reduces or even eliminates many classes of software supply chain vulns.
5. Nuclei: Fast and customizable vulnerability scanner based on simple YAML based DSL
( https://github.com/projectdiscovery/nuclei/ )
Nuclei is a new tool for security engineers, developers, pen testers, and bug bounty hunters to consider adding to their arsenal.