What if an GPC project OAUTH access token wasn’t deleted? This could expose databases to bad actors. Tal Skverer from Astrix discusses his DEF CON 31 presentation GhostToken: Exploiting Google Cloud Platform App Infrastructure to Create Unremovable Trojan Apps. Transcript here.
EP 85: The Rise Of Bots (and Bots As A Service)
EP 84: When Old Medical Devices Keep Pre-shared Keys
EP 83: Tales From The Dark Web: Ransomware, Data Extortion, and Operational Technology
EP 82: The Vulkan Files
EP 81: Hacking Visual Studio Code Extensions
EP 79: Conducting Incident Response in Costa Rica Post Conti Ransomware
EP 78: Defending Costa Rica From Conti Ransomware
EP 77: Security Chaos Engineering with Kelly Shortridge
EP 76: Hacking Medical Systems
EP 75: Hacking .Mil And Other TLD Domains (Ethically)
EP 74: Disarming Document Threats
EP 73: Hacking Human Behavior
EP 72: Tales From A Ransomware Negotiator
EP 71: The Internet As A Pen Test
EP 70: Hacking Real World Criminals Online
EP 69: Self-Healing Operating Systems
EP 68: Incident Response in the Cloud
EP 67: When The Dark Web Discovered ChatGPT
EP 66: Shattering InfoSec’s Glass Ceiling
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
Black Wolf Feed (Chapo Premium Feed Bootleg)
Bannon`s War Room