Security Journey's hi/5 artwork

Web Hacking Techniques, Exploited Vulnerabilities, Security Chaos Engineering and more

Security Journey's hi/5

English - April 01, 2021 18:00 - 5 minutes - 3.98 MB - ★★★★★ - 1 rating
Technology application security security news security journey Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed


1. Top 10 web hacking techniques of 2020
( https://portswigger.net/research/top-10-web-hacking-techniques-of-2020 )

While the OWASP Top 10 is more high level, this list gives you the down and dirty for how attackers are using the web to break applications.​

2. What your DevOps team needs to know: 4 lessons from exploited vulnerabilities
( https://techbeacon.com/security/what-your-devops-team-needs-know-4-lessons-exploited-vulnerabilities )

Learn from security past to prevent vulnerabilities in security future.​

3. Security Chaos Engineering: How to Security Differently​
( https://www.verica.io/blog/security-chaos-engineering-how-to-security-differently/ )

Security chaos engineering is a discipline that can have a large impact on improving your security posture and culture.​

4. Introducing sigstore: Easy Code Signing & Verification for Supply Chain Integrity
( https://security.googleblog.com/2021/03/introducing-sigstore-easy-code-signing.html )

Code signing reduces or even eliminates many classes of software supply chain vulns.​

5. Nuclei: Fast and customizable vulnerability scanner based on simple YAML based DSL
( https://github.com/projectdiscovery/nuclei/ )

Nuclei is a new tool for security engineers, developers, pen testers, and bug bounty hunters to consider adding to their arsenal.​