Episodios

  • OWASP vulnerable and outdated components (noun)
    Jun 24 2025
    Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. Audio reference Link: "⁠The Panama Papers: A Closer Look⁠," Late Night with Seth Meyers, YouTube, 12 April 2016 Learn more about your ad choices. Visit megaphone.fm/adchoices
    Más Menos
    8 m
  • OWASP software and data integrity failures (noun)
    Jun 10 2025
    Please enjoy this encore of Word Notes. Code and data repositories that don't protect against unauthorized changes. Learn more about your ad choices. Visit megaphone.fm/adchoices
    Más Menos
    8 m
  • OWASP server-side request forgery (noun)
    Jun 3 2025
    Please enjoy this encore of Word Notes. An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers. Learn more about your ad choices. Visit megaphone.fm/adchoices
    Más Menos
    8 m
  • OWASP security logging and monitoring failures (noun)
    May 27 2025
    Please enjoy this encore of Word Notes. The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. Learn more about your ad choices. Visit megaphone.fm/adchoices
    Más Menos
    6 m
  • OWASP identification and authentication failures (noun)
    May 20 2025
    Please enjoy this encore of Word Notes. Ineffectual confirmation of a user's identity or authentication in session management. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure⁠ Audio reference link: “⁠Mr. Robot Hack - Password Cracking - Episode 1⁠.” YouTube Video. YouTube, September 21, 2016. Learn more about your ad choices. Visit megaphone.fm/adchoices
    Más Menos
    6 m
  • Log4j vulnerability (noun)
    May 13 2025
    Please enjoy this encore of Word Notes. An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/log4j⁠ Audio reference link: “⁠CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her Career⁠,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021. Learn more about your ad choices. Visit megaphone.fm/adchoices
    Más Menos
    9 m
  • OWASP broken access control (noun)
    May 6 2025
    Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls. Learn more about your ad choices. Visit megaphone.fm/adchoices
    Más Menos
    8 m
  • OWASP security misconfiguration (noun)
    Apr 29 2025
    Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: ⁠⁠https://thecyberwire.com/glossary/owasp-security-misconfiguration⁠⁠ Audio reference link: ⁠⁠“What Is the Elvish Word for Friend?”⁠⁠ Quora, 2021. Learn more about your ad choices. Visit megaphone.fm/adchoices
    Más Menos
    7 m