N7x@infosec.pub to appsec@infosec.pubEnglish · 5 months agoThreat Modeling program milestones: A journey to scaleplus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkThreat Modeling program milestones: A journey to scaleplus-squarewww.youtube.comN7x@infosec.pub to appsec@infosec.pubEnglish · 5 months agomessage-square0fedilink
N7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agoRecommended AppSec conferences in Europe?plus-squaremessage-squaremessage-square0fedilinkarrow-up14arrow-down10
arrow-up14arrow-down1message-squareRecommended AppSec conferences in Europe?plus-squareN7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agomessage-square0fedilink
N7x@infosec.pub to cybersecurity@infosec.pubEnglish · 10 months agoRecommended AppSec conferences in Europe?plus-squaremessage-squaremessage-square0fedilinkarrow-up18arrow-down11
arrow-up17arrow-down1message-squareRecommended AppSec conferences in Europe?plus-squareN7x@infosec.pub to cybersecurity@infosec.pubEnglish · 10 months agomessage-square0fedilink
N7x@infosec.pub to appsec@infosec.pubEnglish · 10 months ago[tl;dr sec] #215 - Cloud Threat Landscape, Web LLM Security Labs, Azure Logs Primerplus-squaretldrsec.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-link[tl;dr sec] #215 - Cloud Threat Landscape, Web LLM Security Labs, Azure Logs Primerplus-squaretldrsec.comN7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agomessage-square0fedilink
N7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agoSigning Requests using RSA Keysplus-squarewww.zaproxy.orgexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkSigning Requests using RSA Keysplus-squarewww.zaproxy.orgN7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agomessage-square0fedilink
minus-squareN7x@infosec.pubOPtoappsec@infosec.pub•Stir Trek 2024: Call for SpeakerslinkfedilinkEnglisharrow-up1·10 months agoWhy the downvotes? This is a call for speakers to a security conference linkfedilink
N7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agoStir Trek 2024: Call for Speakersplus-squaresessionize.comexternal-linkmessage-square1fedilinkarrow-up11arrow-down13
arrow-up1-2arrow-down1external-linkStir Trek 2024: Call for Speakersplus-squaresessionize.comN7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agomessage-square1fedilink
N7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agoWe Must Consider Software Developers a Key Part of the Cybersecurity Workforceplus-squarewww.cisa.govexternal-linkmessage-square0fedilinkarrow-up19arrow-down10
arrow-up19arrow-down1external-linkWe Must Consider Software Developers a Key Part of the Cybersecurity Workforceplus-squarewww.cisa.govN7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agomessage-square0fedilink
N7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agoOWASP Foundation - 2024 Global AppSec Lisbon Call for Trainersplus-squareowasp.submittable.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkOWASP Foundation - 2024 Global AppSec Lisbon Call for Trainersplus-squareowasp.submittable.comN7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agomessage-square0fedilink
N7x@infosec.pub to appsec@infosec.pubEnglish · 10 months ago[tl;dr sec] #213 - AWS Secure Defaults, Damn Vulnerable LLM Agent, cdk-goatplus-squaretldrsec.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-link[tl;dr sec] #213 - AWS Secure Defaults, Damn Vulnerable LLM Agent, cdk-goatplus-squaretldrsec.comN7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agomessage-square0fedilink
N7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agoReasonable 🔐AppSec #33 - Signing Off '23 with a Bang: Five Security Articles, AppSec New Year's Resolutions, and Podcast Cornerplus-squareappsec.beehiiv.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkReasonable 🔐AppSec #33 - Signing Off '23 with a Bang: Five Security Articles, AppSec New Year's Resolutions, and Podcast Cornerplus-squareappsec.beehiiv.comN7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agomessage-square0fedilink
minus-squareN7x@infosec.pubtoNetwork Engineering@infosec.pub•'Networking' community is backlinkfedilinkEnglisharrow-up2·10 months agoGreat! linkfedilink
N7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agoTrustwave Transfers ModSecurity Custodianship to OWASP | OWASP Foundationplus-squareowasp.orgexternal-linkmessage-square0fedilinkarrow-up15arrow-down10
arrow-up15arrow-down1external-linkTrustwave Transfers ModSecurity Custodianship to OWASP | OWASP Foundationplus-squareowasp.orgN7x@infosec.pub to appsec@infosec.pubEnglish · 10 months agomessage-square0fedilink
N7x@infosec.pub to appsec@infosec.pubEnglish · 1 year agoGitHub Copilot, Amazon Code Whisperer emit people's API keysplus-squarewww.theregister.comexternal-linkmessage-square11fedilinkarrow-up119arrow-down11
arrow-up118arrow-down1external-linkGitHub Copilot, Amazon Code Whisperer emit people's API keysplus-squarewww.theregister.comN7x@infosec.pub to appsec@infosec.pubEnglish · 1 year agomessage-square11fedilink
N7x@infosec.pub to appsec@infosec.pubEnglish · 1 year agoCommunity review - OWASP Mobile Application Security risk assessment formulaplus-squaremas.owasp.orgexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkCommunity review - OWASP Mobile Application Security risk assessment formulaplus-squaremas.owasp.orgN7x@infosec.pub to appsec@infosec.pubEnglish · 1 year agomessage-square0fedilink
minus-squareN7x@infosec.pubtoappsec@infosec.pub•Black Hat USA 2023 slideslinkfedilinkEnglisharrow-up1·1 year agoNice resources linkfedilink
minus-squareN7x@infosec.pubtoappsec@infosec.pub•OWASP Top 10 for LLMs (v1.0)linkfedilinkEnglisharrow-up1·1 year agoThank you! linkfedilink
minus-squareN7x@infosec.pubOPtoappsec@infosec.pub•Feedback open until 31 of August for CVSS 4.0linkfedilinkEnglisharrow-up1·1 year agoThat’s kind of legacy debt at some point. I understand why they still want to move towards evolving the standard linkfedilink
N7x@infosec.pub to cybersecurity@infosec.pubEnglish · 1 year agoNew OpenSSH Vulnerability Exposes Linux Systems to Remote Command Injectionplus-squarethehackernews.comexternal-linkmessage-square0fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkNew OpenSSH Vulnerability Exposes Linux Systems to Remote Command Injectionplus-squarethehackernews.comN7x@infosec.pub to cybersecurity@infosec.pubEnglish · 1 year agomessage-square0fedilink
N7x@infosec.pub to cybersecurity@infosec.pubEnglish · 1 year agoNorway government ministries hit by cyber attackplus-squarewww.reuters.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkNorway government ministries hit by cyber attackplus-squarewww.reuters.comN7x@infosec.pub to cybersecurity@infosec.pubEnglish · 1 year agomessage-square0fedilink
N7x@infosec.pub to Security News@infosec.pubEnglish · 1 year agoKevin Mitnick Obituary - Las Vegas, NVplus-squarewww.dignitymemorial.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkKevin Mitnick Obituary - Las Vegas, NVplus-squarewww.dignitymemorial.comN7x@infosec.pub to Security News@infosec.pubEnglish · 1 year agomessage-square0fedilink
N7x@infosec.pub to cybersecurity@infosec.pubEnglish · 1 year agoGoogle Cloud Build bug lets hackers launch supply chain attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGoogle Cloud Build bug lets hackers launch supply chain attacksplus-squarewww.bleepingcomputer.comN7x@infosec.pub to cybersecurity@infosec.pubEnglish · 1 year agomessage-square0fedilink
N7x@infosec.pub to appsec@infosec.pubEnglish · 1 year agoGoogle Cloud Build bug lets hackers launch supply chain attacksplus-squarewww.bleepingcomputer.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkGoogle Cloud Build bug lets hackers launch supply chain attacksplus-squarewww.bleepingcomputer.comN7x@infosec.pub to appsec@infosec.pubEnglish · 1 year agomessage-square0fedilink
N7x@infosec.pub to appsec@infosec.pubEnglish · 1 year agoExploiting XSS in hidden inputs and meta tagsplus-squareportswigger.netexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkExploiting XSS in hidden inputs and meta tagsplus-squareportswigger.netN7x@infosec.pub to appsec@infosec.pubEnglish · 1 year agomessage-square0fedilink
N7x@infosec.pub to appsec@infosec.pubEnglish · 1 year agoWhy Authorization is Hardplus-squarewww.osohq.comexternal-linkmessage-square0fedilinkarrow-up12arrow-down10
arrow-up12arrow-down1external-linkWhy Authorization is Hardplus-squarewww.osohq.comN7x@infosec.pub to appsec@infosec.pubEnglish · 1 year agomessage-square0fedilink
Why the downvotes? This is a call for speakers to a security conference