Secure Softwares
Credential stuffing
2:55
Secure Softwares
Credential Stuffing - Your Password Could Be For Sale Right Now
1:00
Secure Softwares
What is Software Composition Analysis (SCA)? | Securing Open Source Dependencies
3:00
Secure Softwares
What is Software Composition Analysis (SCA)
1:00
Secure Softwares
AI Supply Chain Attacks Explained — How Hackers Compromise Machine Learning Pipelines
3:00
Secure Softwares
AI Supply Chain Attacks Explained
1:00
Secure Softwares
LDAP Injection Explained
3:00
Secure Softwares
LDAP Injection
1:00
Secure Softwares
Command Injection Explained
3:00
Secure Softwares
The Danger of Command Injection
1:00
Secure Softwares
CSRF Attack: The Silent Hack
3:00
Secure Softwares
Buffer Overflow Attack
1:00
Secure Softwares
XML Injection Explained
3:00
Secure Softwares
Path Traversal Explained
0:49
Secure Softwares
LLM Injection (Prompt Injection)
4:04
Secure Softwares
Testing Cross Site Scripting using Automated / Penetration Testing Tools
4:51
Secure Softwares
Testing for Cross Site Scripting/Demo
7:38
Secure Softwares
Cross Site Scripting Types
5:49
Secure Softwares
Cross Site Scripting (XSS) Explained!
4:17
Secure Softwares
Finding SQL Injection in Source Code
11:57
Secure Softwares
Cyber Security Career Paths
6:03
Secure Softwares
DoS vs D-DoS
0:54
Secure Softwares
Testing for Insecure Direct Object Reference IDOR using BurpSuite
20:51
Secure Softwares
Clickjacking
0:59
Secure Softwares
Insecure Direct Object Reference (IDOR)
8:49
Secure Softwares
Spear Phishing #appsec
0:50
Secure Softwares
Advanced SQL injection using SQL map
15:21
Secure Softwares
SQL Injection
15:32
Secure Softwares
Advanced Persistent Threats (APT)
0:43
Secure Softwares
CVE (Common Vulnerabilities & Exposures) #appsec #cybersecurity #applicationsecurity
0:49
Secure Softwares
Dynamic Application Security Testing (DAST) & OWASP Top 10
7:58
Secure Softwares
SBOM #cybersecurity #appsec #sbom
0:38
Secure Softwares
Application Security Testing
10:30