Difference between revisions of "ASW Episode78"

From Security Weekly Wiki
Jump to navigationJump to search
(Created page with "''Recorded September 30, 2019 at G-Unit Studios in Rhode Island!'' == Episode Audio == <!-- <div align="center"> {{#widget:SoundCloud |id=651835745 |width=75% |height=100 |co...")
 
Line 30: Line 30:
  
 
===== Bugs, Breaches, and More! =====
 
===== Bugs, Breaches, and More! =====
 +
* [https://cofense.com/threat-actors-use-percentage-based-url-encoding-bypass-email-gateways/ Threat Actors Use Percentage-Based URL Encoding to Bypass Email Gateways]
  
 
===== If you build it, they will come =====
 
===== If you build it, they will come =====
 +
* [https://webkit.org/blog/9521/intelligent-tracking-prevention-2-3/ Intelligent Tracking Prevention 2.3] and a discussion to [https://github.com/whatwg/fetch/issues/903 Limit the length of the Referer header] with some background on [https://github.com/xsleaks/xsleaks/wiki/Browser-Side-Channels Browser Side Channels]
  
 
===== Learning & Tools =====
 
===== Learning & Tools =====
 +
* [https://www.darkreading.com/application-security/why-you-need-to-think-about-api-security/a/d-id/1335861 Why You Need to Think About API Security] and the [https://www.owasp.org/index.php/OWASP_API_Security_Project#tab=Main OWASP API Security Project]
  
 
===== Food for Thought =====
 
===== Food for Thought =====
 +
* [https://www.darkreading.com/edge/theedge/why-clouds-keep-leaking-data/b/d-id/1335921 Why Clouds Keep Leaking Data]
 +
* [https://www.csoonline.com/article/3439737/3-devsecops-success-stories.html 3 DevSecOps success stories]
  
 
{{SocialMedia}}
 
{{SocialMedia}}

Revision as of 04:40, 30 September 2019

Recorded September 30, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • John Kinsella
    is the Vice President of Container Security for Qualys.
  • Mike Shema
    is the Product Security Lead of Square.
  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.

    Interview: Ryan Kelso, 10-Sec, Inc.

    Nicolas Valcárcel
    is the Application Security Engineer at 10-Sec, Inc..

    Former developer turned application security engineer with a passion for giving back to the security community that has helped me out tremendously with getting into this field.

    Segment Topic:
    Information Disclosure Vulnerabilities

    Segment Description:
    Information disclosures traditionally aren't seen as high priority fixes, but can be pretty important in an exploitation chain. The more information provided to an attacker, the better equipped that attacker is.



    News

    Bugs, Breaches, and More!
    If you build it, they will come
    Learning & Tools
    Food for Thought


    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+