![Phoenix Cast artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts123/v4/57/22/64/5722648a-cee4-a04d-fdb5-4c8a8349af9f/mza_8062597899916828582.jpg/100x100bb.jpg)
Parler Compromised
Phoenix Cast
English - January 22, 2021 10:00 - 57 minutes - 56 MBGovernment Homepage Download Google Podcasts Overcast Castro Pocket Casts RSS feed
In this episode of Phoenix Cast, hosts John and Kyle and Rich talk about the compromise of the social media app Parler. They discuss how a sequence of unprecedented events led to 80 terabytes of the site's data being scraped and the cybersecurity lessons to be learned from this event.
Episode Links:
Wired article: https://www.wired.com/story/parler-hack-data-public-posts-images-video/
Insecure direct object reference: https://www.acunetix.com/blog/web-security-zone/what-are-insecure-direct-object-references/#:~:text=Insecure%20direct%20object%20references%20(IDOR,control%20and%2For%20authorization%20checks.
Project Maven: https://www.nytimes.com/2018/04/04/technology/google-letter-ceo-pentagon-project.html
Share your thoughts with us on Twitter: @USMC_TFPhoenix