
Sign up to save your podcasts
Or


WebSocket hijack that leads to a full workspace takeover in a cloud IDE, malicious packages flood public repos, side-channel attack on a post-quantum algorithm, looking at OWASP's evolution, OAuth misconfigs lead to account takeover, AI risk management framework, Zed Attack Proxy
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw231
By Security Weekly Productions4.8
44 ratings
WebSocket hijack that leads to a full workspace takeover in a cloud IDE, malicious packages flood public repos, side-channel attack on a post-quantum algorithm, looking at OWASP's evolution, OAuth misconfigs lead to account takeover, AI risk management framework, Zed Attack Proxy
Visit https://www.securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw231

7,599 Listeners

372 Listeners

268 Listeners

372 Listeners

651 Listeners

1,021 Listeners

8,061 Listeners

179 Listeners

180 Listeners

314 Listeners

74 Listeners

57 Listeners

139 Listeners

40 Listeners

44 Listeners