628 Épisodes

  1. Vulnerabilities will be found.

    Publié: 17/02/2022
  2. OWASP security logging and monitoring failures (noun) [Word Notes]

    Publié: 15/02/2022
  3. If you wish for peace, prepare for cyberwar.

    Publié: 10/02/2022
  4. OWASP identification and authentication failures (noun) [Word Notes]

    Publié: 08/02/2022
  5. How to talk your way in anywhere. [Hacking Humans Goes to the Movies]

    Publié: 06/02/2022
  6. The ransomware game has evolved.

    Publié: 03/02/2022
  7. OWASP broken access control (noun) [Word Notes]

    Publié: 01/02/2022
  8. Useful ransomware protection for you.

    Publié: 27/01/2022
  9. OWASP security misconfiguration (noun) [Word Notes]

    Publié: 25/01/2022
  10. The perfect environment for ATOs (account takeovers) to breed.

    Publié: 20/01/2022
  11. OWASP insecure design (noun)

    Publié: 18/01/2022
  12. The only locks you should pick are your own.

    Publié: 13/01/2022
  13. Log4j vulnerability (noun) [Word Notes]

    Publié: 11/01/2022
  14. Changing the game on ransomware.

    Publié: 06/01/2022
  15. OWASP injection (noun) [Word Notes]

    Publié: 04/01/2022
  16. Identity "protection" and a pigeon drop. [Hacking Humans Goes to the Movies]

    Publié: 30/12/2021
  17. Encore: zero trust (noun) [Word Notes]

    Publié: 28/12/2021
  18. The CyberWire: The 12 Days of Malware.

    Publié: 25/12/2021
  19. Hustling the hustler and three-card Monte. [Hacking Humans Goes to the Movies]

    Publié: 24/12/2021
  20. Even if a cause moves you, do your due diligence.

    Publié: 23/12/2021

18 / 32

Deception, influence, and social engineering in the world of cyber crime.

Visit the podcast's native language site