Security Journey's hi/5
Bounty Everything [https://datasociety.net/wp-content/uploads/2022/01/BountyEverythingFinal01052022.pdf] This ebook has in-depth explanations of how bug bounties work, how the economy works within the bug bounty, and how the researchers are paid and treated. Understanding Website SQL Injections [https://blog.sucuri.net/2022/01/understanding-website-sql-injections.html] A high-level deep dive into SQL injection, so even those that have no understanding of what an injection attack is can learn how they work. Mazin Ahmed -- Terraform Security [https://www.securityjourney.com/podcast-episode/mazin-ahmed-terraform-security] Terraform is all the rage in the infrastructurous code world. Mazin walks through all things you need to understand about terraform, the security challenges and where to learn more in this episode of the Application Security Podcast. 10 real-world stories of how we've compromised CI/CD pipeline [https://research.nccgroup.com/2022/01/13/10-real-world-stories-of-how-weve-compromised-ci-cd-pipelines/] We all have CI/CD pipelines that we are using in a DevOps world to build our production software; those pipelines have vulnerabilities. Check out these real-world examples to become more educated about the security issues you need to care about. Cryptocurrencies: Tracing the evolution of criminal finances [https://www.europol.europa.eu/publications-events/publications/cryptocurrencies-tracing-evolution-of-criminal-finances] This Intelligence Notification provides an overview of the illicit use of cryptocurrencies, including those services that facilitate their illicit use, illustrating relevant modi opzerandi using case examples.
43 episoder
Kommentarer
0Vær den første til at kommentere
Tilmeld dig nu og bliv en del af Security Journey's hi/5-fællesskabet!