What if an GPC project OAUTH access token wasn’t deleted? This could expose databases to bad actors. Tal Skverer from Astrix discusses his DEF CON 31 presentation GhostToken: Exploiting Google Cloud Platform App Infrastructure to Create Unremovable Trojan Apps. Transcript here.
EP 05: Why Are Blue Team Hackers More L33T?
EP 04: Can A Machine Think Like A Hacker?
EP 03: Inside DARPA’s Cyber Grand Challenge
EP 02: Inside DEF CON’s Champion CTF Team PPP
EP 01: Why Is West Point Training Hackers?
EP 00: The Hacker Mind (Promo)
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Darknet Diaries