All Episodes

Displaying 81 - 100 of 130 in total

Episode 81: Cryptographic Failures

When encryption fails, the consequences can be catastrophic. In this episode, we explore cryptographic failures—formerly called "Sensitive Data Exposure" in the OWASP ...

Episode 82: Injection Flaws Explained

Injection vulnerabilities have been on the OWASP Top Ten for years—and for good reason. In this episode, we explain how SQL, command-line, and LDAP injection flaws all...

Episode 83: Cross-Site Request Forgery (CSRF)

In this episode, we examine Cross-Site Request Forgery, or CSRF—a vulnerability that tricks authenticated users into executing unwanted actions on a web application. Y...

Episode 84: Directory Traversal Vulnerabilities

When input isn’t properly restricted, users can end up accessing far more than intended. In this episode, we break down directory traversal vulnerabilities—flaws that ...

Episode 85: Insecure Design Patterns

Not all vulnerabilities are bugs—some are architectural. In this episode, we explore the concept of insecure design, a growing concern recognized in recent OWASP ranki...

Episode 86: Security Misconfiguration Issues

Even the strongest tools can be rendered useless by poor configuration. In this episode, we explore how security misconfigurations—ranging from default credentials and...

Episode 87: End-of-Life and Legacy Component Risk

Running outdated software isn't just inconvenient—it’s dangerous. In this episode, we explore the risks posed by end-of-life (EOL) systems and unsupported components, ...

Episode 88: Identification and Authentication Failures

If attackers can bypass your login system, the rest of your defenses may not matter. In this episode, we explore identification and authentication failures such as bro...

Episode 89: Server-Side Request Forgery (SSRF)

Some of the most dangerous requests come from inside the house. In this episode, we unpack Server-Side Request Forgery (SSRF), a vulnerability that allows attackers to...

Episode 90: Remote Code Execution (RCE) Threats

Few vulnerabilities are as critical—or as devastating—as remote code execution. In this episode, we explore how RCE vulnerabilities allow attackers to run arbitrary co...

Episode 91: Privilege Escalation Techniques and Dangers

Attackers often start with limited access—but they rarely stay there. In this episode, we break down privilege escalation vulnerabilities, which allow attackers to mov...

Episode 92: Local/Remote File Inclusion (LFI/RFI)

Sometimes attackers don’t need to upload malicious files—they just need to include them. In this episode, we explore Local File Inclusion (LFI) and Remote File Inclusi...

Episode 93: Compensating Controls in Vulnerability Management

What happens when you can’t fix a vulnerability directly? In this episode, we introduce the concept of compensating controls—alternative safeguards put in place to red...

Episode 94: Control Types and Their Purposes

Not all security controls serve the same function. In this episode, we explain the various types of controls used across cybersecurity programs and why it’s important ...

Episode 95: Patch and Configuration Management Lifecycle

Vulnerabilities don’t just exist—they persist, especially when patch and configuration management processes are weak. In this episode, we walk through the full lifecyc...

Episode 96: Maintenance Windows and Update Timing

Security teams can’t just apply patches whenever they want—especially in enterprise environments where uptime and availability are critical. In this episode, we explor...

Episode 97: Documenting and Handling Exceptions

Sometimes a vulnerability can’t be fixed—at least, not right away. In this episode, we explain how analysts and risk managers document and process exceptions: formal r...

Episode 98: Risk Management Principles for Vulnerability Response

Effective vulnerability management is built on sound risk management principles. In this episode, we explore the four classic risk response strategies—accept, avoid, t...

Episode 99: Policy, Governance, and SLO Integration

Cybersecurity doesn’t happen in a vacuum—it happens under governance. In this episode, we explain how policies, governance structures, and service-level objectives (SL...

Episode 100: Vulnerability Prioritization and Escalation

In a world where thousands of vulnerabilities exist, how do you decide which to address first? In this episode, we break down the art and science of vulnerability prio...

Broadcast by