Terraform, CI/CD, Bug Bounties and more

Security Journey's hi/5

28-04-2022 • 2 mins

Bounty Everything
This ebook has in-depth explanations of how bug bounties work, how the economy works within the bug bounty, and how the researchers are paid and treated.
Understanding Website SQL Injections
A high-level deep dive into SQL injection, so even those that have no understanding of what an injection attack is can learn how they work.
Mazin Ahmed -- Terraform Security
Terraform is all the rage in the infrastructurous code world. Mazin walks through all things you need to understand about terraform, the security challenges and where to learn more in this episode of the Application Security Podcast.
10 real-world stories of how we've compromised CI/CD pipeline
We all have CI/CD pipelines that we are using in a DevOps world to build our production software; those pipelines have vulnerabilities. Check out these real-world examples to become more educated about the security issues you need to care about.
Cryptocurrencies: Tracing the evolution of criminal finances
This Intelligence Notification provides an overview of the illicit use of cryptocurrencies, including those services that facilitate their illicit use, illustrating relevant modi opzerandi using case examples.


You Might Like

Darknet Diaries
Darknet Diaries
Jack Rhysider
Fortnite Emotes
Fortnite Emotes
Lawrence Hopkinson
Double Tap
Double Tap
Accessible Media Inc.
Smashing Security
Smashing Security
Graham Cluley & Carole Theriault
This Week in Retro
This Week in Retro
Neil from RMCretro - The Cave, Chris from 005 AGIMA and Dave
TechStuff
TechStuff
iHeartPodcasts
The Vergecast
The Vergecast
The Verge
Waveform: The MKBHD Podcast
Waveform: The MKBHD Podcast
Vox Media Podcast Network
13 Minutes to the Moon
13 Minutes to the Moon
BBC World Service
Hard Fork
Hard Fork
The New York Times
Malicious Life
Malicious Life
Malicious Life