What if an GPC project OAUTH access token wasn’t deleted? This could expose databases to bad actors. Tal Skverer from Astrix discusses his DEF CON 31 presentation GhostToken: Exploiting Google Cloud Platform App Infrastructure to Create Unremovable Trojan Apps. Transcript here.
EP 45: Hacking Industrial Control Systems
EP 44: Hackers Wanted: Filling the Cybersecurity Skills Gap
EP 43: Follow The Rabbit
EP 42: Hacking Aerospace
EP 41: Hacking The Art of Invisibility
EP 40: Hacking Ethereum Smart Contracts
EP 39: Fuzzing Crypto
EP 38: Going Passwordless
EP 37: A Hacker From Hollywood
EP 36: Fuzzing Message Brokers
EP 35: Digital Forensics
EP 34: Hacking Behavioral Biometrics
EP 33: Scanning the Internet
EP 32: The Hunt For Ghost #1
EP 31: Stopping the Mirai IoT Botnet, One CnC Server At A Time
EP 30: Surviving Stalkerware
EP 29: Learn Competitive Hacking with picoCTF
EP 28: Fuzzing Hyper-V
EP 27: Car Hacking 0x05
EP 26: Hacking Charity
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
A Prairie Home Companion: News from Lake Wobegon