Internal Secrets; SHA-256; 28,000 Vulnerabilities disclosed in 2021; Threat Modeling.

Security Journey's hi/5

12-05-2022 • 2 mins

1. Is it safe to use SECRETS_INTERNALS_DO_NOT_USE_OR_YOU_WILL_BE_FIRED?
- https://datasociety.net/wp-content/up...

This first story is a react development issue. A developer was asking if a specific property was safe to use. This shows the importance of naming in understanding the security risks when using specific properties.

2. Adam Shostack -- Fast, cheap, and good threat models
-https://www.securityjourney.com/podca...
Adam is very well known in the world of threat modeling as a thought leader. This is his take on some new approaches he wants everyone in the industry to understand.

3. SHA-256 explained step-by-step visually
- https://sha256algorithm.com/

This is a website that will describe how SHA-256 works. Hashing algorithms are a critical part of how we protect information whether it is at rest or in transit. This is a fascinating way to go through the steps and understand how they work.

4. Over 28,000 Vulnerabilities Disclosed in 2021: Report
- https://sha256algorithm.com/

This article is describing a report published by Risk Based Security highlighting the 28,000 vulnerabilities that were disclosed in 2021. It shows that not much has changed since 2020, but check it out to see all the details.

5. Known exploited vulnerabilities catalog
- https://www.cisa.gov/known-exploited-...

This is the Know Exploited Vulnerabilities Catalog from CISA. There was a pointer in the previous story to the site as a resource to search and stay up to date on different exploitable vulnerabilities and their remediations.

You Might Like

Darknet Diaries
Darknet Diaries
Jack Rhysider
Fortnite Emotes
Fortnite Emotes
Lawrence Hopkinson
Double Tap
Double Tap
Accessible Media Inc.
Hard Fork
Hard Fork
The New York Times
This Week in Retro
This Week in Retro
Neil from RMCretro - The Cave, Chris from 005 AGIMA and Dave
The Vergecast
The Vergecast
The Verge
Waveform: The MKBHD Podcast
Waveform: The MKBHD Podcast
Vox Media Podcast Network
Smashing Security
Smashing Security
Graham Cluley & Carole Theriault
13 Minutes to the Moon
13 Minutes to the Moon
BBC World Service
RNIB Tech Talk
RNIB Tech Talk
RNIB Connect Radio