Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Pentaradio, Pentacast, Pentamusic
…
continue reading
C3D2 Pentaradio
…
continue reading
C3D2 Podcast
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Der Podcast für Freunde des abseitigen Films. Flo, Jan, Martin und Burger pairen Arthouse und Trash-Filme (Art or Trash), diskutieren aktuelle Filmperlen (CCC) und handeln den Genrefilm thematisch - auf der Jagd nach obskuren Perlen - ab (Genrejagd).
…
continue reading
This feed contains all events from 33c3-sendezentrum as opus
…
continue reading
This feed contains all events from 36c3 as mp4
…
continue reading
Der Podcast der WTF Kooperative eG - Werkkooperative der Technikfreundinnen Dieser Podcast wird als MP3 Feed bereit gestellt.
…
continue reading
Basis 108. Der IT-Zukunftspodcast. heißt das Audioformat der Bechtle AG. Einmal im Monat begrüßt Moderatorin Svea Eckert interessante Gäste aus Wirtschaft, Politik und Wissenschaft. Svea Eckert ist eine investigative Tech-Journalistin. Sie arbeitet als freie Reporterin für die Tagesschau, die Tagesthemen, die ARD-Story und das junge YouTube-Format strg_f. Viele ihrer Recherchen wurden mit Preisen ausgezeichnet. Sie hostet verschiedene Podcasts und spricht auf großen Konferenzen, wie der Defc ...
…
continue reading
Im KI•POWERBOOST Podcast gibt es spannende Updates, Persönlichkeiten und Insights aus der Welt der Künstlichen Intelligenz.
…
continue reading
In der Bamberger Psychokalypse besprechen die Psychologen Niklas Döbler, Claus-Christian Carbon (CCC) und Marius Raab Aktuelles und Klassisches aus der psychologischen Wissenschaft. Alle drei Reiter forschen an der Otto-Friedrich Universität Bamberg. Zusammen wollen sie neue Fragen aufwerfen, alte beantworten, aber vor allem: sich zusammen mit den Hörer:innen in den unendlichen Weiten des menschlichen Geistes verlieren. Immer mit dabei sind die Leidenschaft für die Psychologie und ihre Anwen ...
…
continue reading
Es ist einer der aufsehenerregendsten True-Crime-Stoffe der letzten Jahrzehnte: Am 30. März 1985 werden die Eltern der kanadischen Studentin Elizabeth Haysom in ihrem Haus in Virginia auf brutalste Weise ermordet. Sie hatten mit ihrem Mörder zuvor offenbar gegessen und getrunken. Haysoms Freund – der deutsche Diplomatensohn und Student Jens Söring – und sie selbst werden im April 1986 in London festgenommen. »Das System Söring« erzählt die Geschichte eines wegen zweifachen Mordes verurteilte ...
…
continue reading
Ich bin Cedric und in diesem Podcast rede ich immer wieder mal über Informatik, Datenschutz, Sicherheit und alles erwähnenswerte. Mit dabei sind immer wieder sehr bekannte und engagierte Menschen, die Experte auf ihrem Gebiet sind. Erreichbar bin ich hier überall: https://open.spotify.com/show/0xlIih789FcMbZaASyhuAm https://podcasts.apple.com/de/podcast/speak-1337/id1577956101 https://podcasts.google.com/feed/aHR0cHM6Ly9hbmNob3IuZm0vcy9jODIxYjEwL3BvZGNhc3QvcnNz https://www.youtube.com/channe ...
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deVon OWASP German Chapter
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deVon OWASP German Chapter
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deVon OWASP German Chapter
…
continue reading
1
Modern solutions against Cross-Site Attacks (god2024)
27:11
27:11
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
27:11
Web security is increasingly an opt-in approach, leaving developers with both the opportunity and the responsibility to protect their applications. This talk will explore why and how developers can secure their sites against evolving threats.We'll delve into the nuances of cross-site leaks (xs-leaks) and discuss the Cross-Origin Resource Policy (CO…
…
continue reading
1
Modern solutions against Cross-Site Attacks (god2024)
27:11
27:11
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
27:11
Web security is increasingly an opt-in approach, leaving developers with both the opportunity and the responsibility to protect their applications. This talk will explore why and how developers can secure their sites against evolving threats.We'll delve into the nuances of cross-site leaks (xs-leaks) and discuss the Cross-Origin Resource Policy (CO…
…
continue reading
1
Modern solutions against Cross-Site Attacks (god2024)
27:11
27:11
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
27:11
Web security is increasingly an opt-in approach, leaving developers with both the opportunity and the responsibility to protect their applications. This talk will explore why and how developers can secure their sites against evolving threats.We'll delve into the nuances of cross-site leaks (xs-leaks) and discuss the Cross-Origin Resource Policy (CO…
…
continue reading
1
Double-Edged Crime: How Browser Extension Fingerprinting Might Endanger Users and Extensions Alike (god2024)
23:43
23:43
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
23:43
Browser extensions are powerful tools that enhance the web browsing experience, offering their users a wide range of functionalities. However, these features can also introduce security and privacy issues for their users, mainly through a technique known as extension fingerprinting — where malicious websites track users based on the extensions they…
…
continue reading
1
Double-Edged Crime: How Browser Extension Fingerprinting Might Endanger Users and Extensions Alike (god2024)
23:43
23:43
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
23:43
Browser extensions are powerful tools that enhance the web browsing experience, offering their users a wide range of functionalities. However, these features can also introduce security and privacy issues for their users, mainly through a technique known as extension fingerprinting — where malicious websites track users based on the extensions they…
…
continue reading
1
Double-Edged Crime: How Browser Extension Fingerprinting Might Endanger Users and Extensions Alike (god2024)
23:43
23:43
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
23:43
Browser extensions are powerful tools that enhance the web browsing experience, offering their users a wide range of functionalities. However, these features can also introduce security and privacy issues for their users, mainly through a technique known as extension fingerprinting — where malicious websites track users based on the extensions they…
…
continue reading
1
Protecting Web Applications with Project Foxhound (god2024)
11:31
11:31
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
11:31
Recent developments in web technologies have seen a paradigm shift from monolithic server-based applications to REST-based microservices with feature-rich browser-based frontends. This progression has brought with it novel classes of security flaws. In this talk we review how client-side variants of injection vulnerabilities such as cross-site scri…
…
continue reading
1
Protecting Web Applications with Project Foxhound (god2024)
11:31
11:31
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
11:31
Recent developments in web technologies have seen a paradigm shift from monolithic server-based applications to REST-based microservices with feature-rich browser-based frontends. This progression has brought with it novel classes of security flaws. In this talk we review how client-side variants of injection vulnerabilities such as cross-site scri…
…
continue reading
1
Protecting Web Applications with Project Foxhound (god2024)
11:31
11:31
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
11:31
Recent developments in web technologies have seen a paradigm shift from monolithic server-based applications to REST-based microservices with feature-rich browser-based frontends. This progression has brought with it novel classes of security flaws. In this talk we review how client-side variants of injection vulnerabilities such as cross-site scri…
…
continue reading
1
SSRF: Attacks, Defense and Status Quo (god2024)
10:25
10:25
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
10:25
Web apps use Server-Side Requests to request data from other servers, e.g., for link previews. However, they are exploited by attackers who might request internal resources or non-public services. This attack is called Server-Side Request Forgery (SSRF).The talk explains what SSRF is, how it can be used to exploit servers, and how to defend against…
…
continue reading
1
SSRF: Attacks, Defense and Status Quo (god2024)
10:25
10:25
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
10:25
Web apps use Server-Side Requests to request data from other servers, e.g., for link previews. However, they are exploited by attackers who might request internal resources or non-public services. This attack is called Server-Side Request Forgery (SSRF).The talk explains what SSRF is, how it can be used to exploit servers, and how to defend against…
…
continue reading
1
SSRF: Attacks, Defense and Status Quo (god2024)
10:25
10:25
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
10:25
Web apps use Server-Side Requests to request data from other servers, e.g., for link previews. However, they are exploited by attackers who might request internal resources or non-public services. This attack is called Server-Side Request Forgery (SSRF).The talk explains what SSRF is, how it can be used to exploit servers, and how to defend against…
…
continue reading
1
„Well, What Would You Say if I Said That You Could?” – Scanning for Vulnerabilities Without Getting Into Trouble (god2024)
27:07
27:07
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
27:07
The need for comprehensive measurements of security and privacy risks on the Web is undeniable as it helps developers in focusing on emerging trends in security. However, large-scale scans for server-side vulnerabilities remains a sensitive topic, due to their potential to harm servers, disrupt services, and incur financial losses. Even smaller, si…
…
continue reading
1
„Well, What Would You Say if I Said That You Could?” – Scanning for Vulnerabilities Without Getting Into Trouble (god2024)
27:07
27:07
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
27:07
The need for comprehensive measurements of security and privacy risks on the Web is undeniable as it helps developers in focusing on emerging trends in security. However, large-scale scans for server-side vulnerabilities remains a sensitive topic, due to their potential to harm servers, disrupt services, and incur financial losses. Even smaller, si…
…
continue reading
1
„Well, What Would You Say if I Said That You Could?” – Scanning for Vulnerabilities Without Getting Into Trouble (god2024)
27:07
27:07
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
27:07
The need for comprehensive measurements of security and privacy risks on the Web is undeniable as it helps developers in focusing on emerging trends in security. However, large-scale scans for server-side vulnerabilities remains a sensitive topic, due to their potential to harm servers, disrupt services, and incur financial losses. Even smaller, si…
…
continue reading
1
SAP from an Attacker's Perspective – Common Vulnerabilities and Pitfalls (god2024)
22:35
22:35
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
22:35
As organizations increasingly rely on SAP systems to manage critical business processes, the security of these environments is an increasing challenge for companies and has also been recognized by the OWASP Core Business Application Security (CBAS) project. This talk will explore the security of SAP systems from an attacker's perspective, uncoverin…
…
continue reading
1
SAP from an Attacker's Perspective – Common Vulnerabilities and Pitfalls (god2024)
22:35
22:35
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
22:35
As organizations increasingly rely on SAP systems to manage critical business processes, the security of these environments is an increasing challenge for companies and has also been recognized by the OWASP Core Business Application Security (CBAS) project. This talk will explore the security of SAP systems from an attacker's perspective, uncoverin…
…
continue reading
1
SAP from an Attacker's Perspective – Common Vulnerabilities and Pitfalls (god2024)
22:35
22:35
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
22:35
As organizations increasingly rely on SAP systems to manage critical business processes, the security of these environments is an increasing challenge for companies and has also been recognized by the OWASP Core Business Application Security (CBAS) project. This talk will explore the security of SAP systems from an attacker's perspective, uncoverin…
…
continue reading
1
Network Fingerprinting for Securing User Accounts - Opportunities and Challenges (god2024)
25:00
25:00
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:00
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
…
continue reading
1
Network Fingerprinting for Securing User Accounts - Opportunities and Challenges (god2024)
25:00
25:00
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:00
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
…
continue reading
1
Network Fingerprinting for Securing User Accounts - Opportunities and Challenges (god2024)
25:00
25:00
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
25:00
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
…
continue reading
1
The Debian OpenSSL bug and other Public Private Keys (god2024)
21:50
21:50
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
21:50
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
…
continue reading
1
The Debian OpenSSL bug and other Public Private Keys (god2024)
21:50
21:50
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
21:50
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
…
continue reading
1
The Debian OpenSSL bug and other Public Private Keys (god2024)
21:50
21:50
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
21:50
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
…
continue reading
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
…
continue reading
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
…
continue reading
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
…
continue reading
1
GenAI in the Battle of Security: Attacks, Defenses, and the Laws Shaping AI's Future (god2024)
28:56
28:56
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
28:56
The presentation explores the security challenges and opportunities posed by Generative AI (GenAI). While GenAI offers tremendous potential, it also has a darker side, such as its use in creating deepfakes that can spread misinformation, manipulate political events, or facilitate fraud, as demonstrated in a live deepfake example. Malicious variants…
…
continue reading
1
GenAI in the Battle of Security: Attacks, Defenses, and the Laws Shaping AI's Future (god2024)
28:56
28:56
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
28:56
The presentation explores the security challenges and opportunities posed by Generative AI (GenAI). While GenAI offers tremendous potential, it also has a darker side, such as its use in creating deepfakes that can spread misinformation, manipulate political events, or facilitate fraud, as demonstrated in a live deepfake example. Malicious variants…
…
continue reading
1
GenAI in the Battle of Security: Attacks, Defenses, and the Laws Shaping AI's Future (god2024)
28:56
28:56
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
28:56
The presentation explores the security challenges and opportunities posed by Generative AI (GenAI). While GenAI offers tremendous potential, it also has a darker side, such as its use in creating deepfakes that can spread misinformation, manipulate political events, or facilitate fraud, as demonstrated in a live deepfake example. Malicious variants…
…
continue reading
1
Overview of OWASP AI Exchange: A Comprehensive Guide to AI Security (god2024)
21:46
21:46
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
21:46
The OWASP AI Exchange provides a comprehensive framework to address the evolving security challenges presented by AI systems. As artificial intelligence continues to transform industries, securing these systems against emerging threats has become a top priority. This presentation will offer an in-depth overview of the OWASP AI Exchange, focusing on…
…
continue reading
1
Overview of OWASP AI Exchange: A Comprehensive Guide to AI Security (god2024)
21:46
21:46
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
21:46
The OWASP AI Exchange provides a comprehensive framework to address the evolving security challenges presented by AI systems. As artificial intelligence continues to transform industries, securing these systems against emerging threats has become a top priority. This presentation will offer an in-depth overview of the OWASP AI Exchange, focusing on…
…
continue reading
1
Overview of OWASP AI Exchange: A Comprehensive Guide to AI Security (god2024)
21:46
21:46
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
21:46
The OWASP AI Exchange provides a comprehensive framework to address the evolving security challenges presented by AI systems. As artificial intelligence continues to transform industries, securing these systems against emerging threats has become a top priority. This presentation will offer an in-depth overview of the OWASP AI Exchange, focusing on…
…
continue reading
1
NIS2 entmystifiziert - Was Unternehmen nun tun müssen (god2024)
23:14
23:14
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
23:14
Die NIS2-Richtlinie (Network and Information Security Directive) der Europäischen Union stellt eine Weiterentwicklung der bestehenden Cybersicherheitsanforderungen dar und zielt darauf ab, die Resilienz und Sicherheit kritischer Infrastrukturen in der EU zu stärken. In Deutschland liegt derzeit mit dem NIS2UmsuCG (NIS-2-Umsetzungs- und Cybersicherh…
…
continue reading
1
NIS2 entmystifiziert - Was Unternehmen nun tun müssen (god2024)
23:14
23:14
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
23:14
Die NIS2-Richtlinie (Network and Information Security Directive) der Europäischen Union stellt eine Weiterentwicklung der bestehenden Cybersicherheitsanforderungen dar und zielt darauf ab, die Resilienz und Sicherheit kritischer Infrastrukturen in der EU zu stärken. In Deutschland liegt derzeit mit dem NIS2UmsuCG (NIS-2-Umsetzungs- und Cybersicherh…
…
continue reading
1
NIS2 entmystifiziert - Was Unternehmen nun tun müssen (god2024)
23:14
23:14
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
23:14
Die NIS2-Richtlinie (Network and Information Security Directive) der Europäischen Union stellt eine Weiterentwicklung der bestehenden Cybersicherheitsanforderungen dar und zielt darauf ab, die Resilienz und Sicherheit kritischer Infrastrukturen in der EU zu stärken. In Deutschland liegt derzeit mit dem NIS2UmsuCG (NIS-2-Umsetzungs- und Cybersicherh…
…
continue reading
1
The Crucial Role of Web Protocols and Standards in Digital Wallet Ecosystems (god2024)
31:29
31:29
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:29
In the coming years, all EU member states will be required to provide their citizens with a digital identity wallet, as mandated by the European Union. The EU Digital Identity Wallet (EUDI Wallet) represents the largest implementation of its kind to date and brings with it significant challenges, particularly in terms of security, privacy, and inte…
…
continue reading
1
The Crucial Role of Web Protocols and Standards in Digital Wallet Ecosystems (god2024)
31:29
31:29
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:29
In the coming years, all EU member states will be required to provide their citizens with a digital identity wallet, as mandated by the European Union. The EU Digital Identity Wallet (EUDI Wallet) represents the largest implementation of its kind to date and brings with it significant challenges, particularly in terms of security, privacy, and inte…
…
continue reading
1
The Crucial Role of Web Protocols and Standards in Digital Wallet Ecosystems (god2024)
31:29
31:29
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:29
In the coming years, all EU member states will be required to provide their citizens with a digital identity wallet, as mandated by the European Union. The EU Digital Identity Wallet (EUDI Wallet) represents the largest implementation of its kind to date and brings with it significant challenges, particularly in terms of security, privacy, and inte…
…
continue reading
1
How (Not) to Use OAuth in 2024 (god2024)
36:48
36:48
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
36:48
OAuth 2.0 has become the backbone of secure delegated authorization on the web, enabling users to grant third-party applications access to their data without revealing their credentials. It's also foundational for federated authentication via OpenID Connect and plays a critical role in emerging technologies like wallet ecosystems. However, despite …
…
continue reading
1
How (Not) to Use OAuth in 2024 (god2024)
36:48
36:48
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
36:48
OAuth 2.0 has become the backbone of secure delegated authorization on the web, enabling users to grant third-party applications access to their data without revealing their credentials. It's also foundational for federated authentication via OpenID Connect and plays a critical role in emerging technologies like wallet ecosystems. However, despite …
…
continue reading
1
How (Not) to Use OAuth in 2024 (god2024)
36:48
36:48
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
36:48
OAuth 2.0 has become the backbone of secure delegated authorization on the web, enabling users to grant third-party applications access to their data without revealing their credentials. It's also foundational for federated authentication via OpenID Connect and plays a critical role in emerging technologies like wallet ecosystems. However, despite …
…
continue reading
1
OWASP Juice Shop 10th anniversary: Is it still fresh? (god2024)
31:59
31:59
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:59
Once upon a time, developers and security experts relied on mostly server-side rendered vulnerable applications to train their web hacking skills. In 2014 the Juice Shop entered the stage as one of the first Rich Internet Application representatives. What started as a personal pet project with two dozen hacking challenges, became an OWASP Flagship …
…
continue reading
1
OWASP Juice Shop 10th anniversary: Is it still fresh? (god2024)
31:59
31:59
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:59
Once upon a time, developers and security experts relied on mostly server-side rendered vulnerable applications to train their web hacking skills. In 2014 the Juice Shop entered the stage as one of the first Rich Internet Application representatives. What started as a personal pet project with two dozen hacking challenges, became an OWASP Flagship …
…
continue reading
1
OWASP Juice Shop 10th anniversary: Is it still fresh? (god2024)
31:59
31:59
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:59
Once upon a time, developers and security experts relied on mostly server-side rendered vulnerable applications to train their web hacking skills. In 2014 the Juice Shop entered the stage as one of the first Rich Internet Application representatives. What started as a personal pet project with two dozen hacking challenges, became an OWASP Flagship …
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deVon OWASP German Chapter
…
continue reading
Licensed to the public under https://creativecommons.org/licenses/by-sa/4.0/about this event: https://c3voc.deVon OWASP German Chapter
…
continue reading