Hosted by @mutantzombie.bsky.social, @jlk.bsky.social, and Kalyani Pawar.
Which also reminded me of classic D&D monsters like the mimic.
Four decades later we still have both -- random objects that we're sure are monsters and code that we're not sure we can trust.
Which also reminded me of classic D&D monsters like the mimic.
Four decades later we still have both -- random objects that we're sure are monsters and code that we're not sure we can trust.
- Next.js middleware and where to place security controls
- ruby-saml authentication bypass and how many different parsers a library should have
- an NTLM hash leak and when a UX feature becomes a security liability
- Next.js middleware and where to place security controls
- ruby-saml authentication bypass and how many different parsers a library should have
- an NTLM hash leak and when a UX feature becomes a security liability
Crypto is rife with rug pulls, scams, and questionable tokens. It's also a great learning space for classes of attacks that aren't memory safety flaws or the dusty XSS and SQLi of the web.
Crypto is rife with rug pulls, scams, and questionable tokens. It's also a great learning space for classes of attacks that aren't memory safety flaws or the dusty XSS and SQLi of the web.
Articles and show notes at www.scworld.com/podcast-epis...
Articles and show notes at www.scworld.com/podcast-epis...