N7x@infosec.pub • 1 day agoThreat Modeling program milestones: A journey to scaleplus-squarevideomessage-square0 fedilinkarrow-up12
arrow-up12videoThreat Modeling program milestones: A journey to scaleplus-squareN7x@infosec.pub • 1 day agomessage-square0 Commentsfedilink
N7x@infosec.pub • 5 months agoRecommended AppSec conferences in Europe?plus-squaremessage-squaremessage-square0 fedilinkarrow-up12
arrow-up12message-squareRecommended AppSec conferences in Europe?plus-squareN7x@infosec.pub • 5 months agomessage-square0 Commentsfedilink
N7x@infosec.pub • 5 months ago[tl;dr sec] #215 - Cloud Threat Landscape, Web LLM Security Labs, Azure Logs Primerplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-link[tl;dr sec] #215 - Cloud Threat Landscape, Web LLM Security Labs, Azure Logs Primerplus-squareN7x@infosec.pub • 5 months agomessage-square0 Commentsfedilink
N7x@infosec.pub • 5 months agoSigning Requests using RSA Keysplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkSigning Requests using RSA Keysplus-squareN7x@infosec.pub • 5 months agomessage-square0 Commentsfedilink
N7x@infosec.pub • 5 months agoStir Trek 2024: Call for Speakersplus-squareexternal-linkmessage-square1 fedilinkarrow-up11
arrow-up11external-linkStir Trek 2024: Call for Speakersplus-squareN7x@infosec.pub • 5 months agomessage-square1 Commentsfedilink
N7x@infosec.pub • 5 months agoWe Must Consider Software Developers a Key Part of the Cybersecurity Workforceplus-squareexternal-linkmessage-square0 fedilinkarrow-up15
arrow-up15external-linkWe Must Consider Software Developers a Key Part of the Cybersecurity Workforceplus-squareN7x@infosec.pub • 5 months agomessage-square0 Commentsfedilink
N7x@infosec.pub • 6 months agoOWASP Foundation - 2024 Global AppSec Lisbon Call for Trainersplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkOWASP Foundation - 2024 Global AppSec Lisbon Call for Trainersplus-squareN7x@infosec.pub • 6 months agomessage-square0 Commentsfedilink
N7x@infosec.pub • 6 months ago[tl;dr sec] #213 - AWS Secure Defaults, Damn Vulnerable LLM Agent, cdk-goatplus-squareexternal-linkmessage-square0 fedilinkarrow-up12
arrow-up12external-link[tl;dr sec] #213 - AWS Secure Defaults, Damn Vulnerable LLM Agent, cdk-goatplus-squareN7x@infosec.pub • 6 months agomessage-square0 Commentsfedilink
N7x@infosec.pub • 6 months agoReasonable 🔐AppSec #33 - Signing Off '23 with a Bang: Five Security Articles, AppSec New Year's Resolutions, and Podcast Cornerplus-squareexternal-linkmessage-square0 fedilinkarrow-up12
arrow-up12external-linkReasonable 🔐AppSec #33 - Signing Off '23 with a Bang: Five Security Articles, AppSec New Year's Resolutions, and Podcast Cornerplus-squareN7x@infosec.pub • 6 months agomessage-square0 Commentsfedilink
N7x@infosec.pub • 6 months agoTrustwave Transfers ModSecurity Custodianship to OWASP | OWASP Foundationplus-squareexternal-linkmessage-square0 fedilinkarrow-up13
arrow-up13external-linkTrustwave Transfers ModSecurity Custodianship to OWASP | OWASP Foundationplus-squareN7x@infosec.pub • 6 months agomessage-square0 Commentsfedilink
solidsnail@infosec.pub • 7 months agonpm search RCE? - Escape Sequence Injectionplus-squareexternal-linkmessage-square0 fedilinkarrow-up13
arrow-up13external-linknpm search RCE? - Escape Sequence Injectionplus-squaresolidsnail@infosec.pub • 7 months agomessage-square0 Commentsfedilink
solidsnail@infosec.pub • 7 months agoIt’s not a Feature, It’s a Vulnerabilityplus-squareexternal-linkmessage-square0 fedilinkarrow-up13
arrow-up13external-linkIt’s not a Feature, It’s a Vulnerabilityplus-squaresolidsnail@infosec.pub • 7 months agomessage-square0 Commentsfedilink
N7x@infosec.pub • 10 months agoGitHub Copilot, Amazon Code Whisperer emit people's API keysplus-squareexternal-linkmessage-square1 fedilinkarrow-up112
arrow-up112external-linkGitHub Copilot, Amazon Code Whisperer emit people's API keysplus-squareN7x@infosec.pub • 10 months agomessage-square1 Commentsfedilink
N7x@infosec.pub • 10 months agoCommunity review - OWASP Mobile Application Security risk assessment formulaplus-squareexternal-linkmessage-square0 fedilinkarrow-up12
arrow-up12external-linkCommunity review - OWASP Mobile Application Security risk assessment formulaplus-squareN7x@infosec.pub • 10 months agomessage-square0 Commentsfedilink
solidsnail@infosec.pub • 10 months agoFrom Terminal Output to Arbitrary Remote Code Executionplus-squareexternal-linkmessage-square0 fedilinkarrow-up12
arrow-up12external-linkFrom Terminal Output to Arbitrary Remote Code Executionplus-squaresolidsnail@infosec.pub • 10 months agomessage-square0 Commentsfedilink
mwguy@infosec.pub • 10 months agoNew OWASP Cheet Sheet on Mobile Securtyplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkNew OWASP Cheet Sheet on Mobile Securtyplus-squaremwguy@infosec.pub • 10 months agomessage-square0 Commentsfedilink
netrom@infosec.pub • 11 months agoOWASP Top 10 for LLMs (v1.0)plus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkOWASP Top 10 for LLMs (v1.0)plus-squarenetrom@infosec.pub • 11 months agomessage-square0 Commentsfedilink
N7x@infosec.pub • 1 year agoGoogle Cloud Build bug lets hackers launch supply chain attacksplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkGoogle Cloud Build bug lets hackers launch supply chain attacksplus-squareN7x@infosec.pub • 1 year agomessage-square0 Commentsfedilink
N7x@infosec.pub • 1 year agoExploiting XSS in hidden inputs and meta tagsplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkExploiting XSS in hidden inputs and meta tagsplus-squareN7x@infosec.pub • 1 year agomessage-square0 Commentsfedilink
N7x@infosec.pub • 1 year agoWhy Authorization is Hardplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkWhy Authorization is Hardplus-squareN7x@infosec.pub • 1 year agomessage-square0 Commentsfedilink