Credential stuffing
Secure Softwares
Credential stuffing
2:55
Credential Stuffing - Your Password Could Be For Sale Right Now
Secure Softwares
Credential Stuffing - Your Password Could Be For Sale Right Now
1:00
What is Software Composition Analysis (SCA)? | Securing Open Source Dependencies
Secure Softwares
What is Software Composition Analysis (SCA)? | Securing Open Source Dependencies
3:00
What is Software Composition Analysis (SCA)
Secure Softwares
What is Software Composition Analysis (SCA)
1:00
AI Supply Chain Attacks Explained — How Hackers Compromise Machine Learning Pipelines
Secure Softwares
AI Supply Chain Attacks Explained — How Hackers Compromise Machine Learning Pipelines
3:00
AI Supply Chain Attacks Explained
Secure Softwares
AI Supply Chain Attacks Explained
1:00
LDAP Injection Explained
Secure Softwares
LDAP Injection Explained
3:00
LDAP Injection
Secure Softwares
LDAP Injection
1:00
Command Injection Explained
Secure Softwares
Command Injection Explained
3:00
The Danger of Command Injection
Secure Softwares
The Danger of Command Injection
1:00
CSRF Attack: The Silent Hack
Secure Softwares
CSRF Attack: The Silent Hack
3:00
Buffer Overflow Attack
Secure Softwares
Buffer Overflow Attack
1:00
XML Injection Explained
Secure Softwares
XML Injection Explained
3:00
Path Traversal Explained
Secure Softwares
Path Traversal Explained
0:49
LLM Injection (Prompt Injection)
Secure Softwares
LLM Injection (Prompt Injection)
4:04
Testing Cross Site Scripting using Automated / Penetration Testing Tools
Secure Softwares
Testing Cross Site Scripting using Automated / Penetration Testing Tools
4:51
Testing for Cross Site Scripting/Demo
Secure Softwares
Testing for Cross Site Scripting/Demo
7:38
Cross Site Scripting Types
Secure Softwares
Cross Site Scripting Types
5:49
Cross Site Scripting (XSS) Explained!
Secure Softwares
Cross Site Scripting (XSS) Explained!
4:17
Finding SQL Injection in Source Code
Secure Softwares
Finding SQL Injection in Source Code
11:57
Cyber Security Career Paths
Secure Softwares
Cyber Security Career Paths
6:03
DoS vs D-DoS
Secure Softwares
DoS vs D-DoS
0:54
Testing for Insecure Direct Object Reference IDOR using BurpSuite
Secure Softwares
Testing for Insecure Direct Object Reference IDOR using BurpSuite
20:51
Clickjacking
Secure Softwares
Clickjacking
0:59
Insecure Direct Object Reference (IDOR)
Secure Softwares
Insecure Direct Object Reference (IDOR)
8:49
Spear Phishing #appsec
Secure Softwares
Spear Phishing #appsec
0:50
Advanced SQL injection using SQL map
Secure Softwares
Advanced SQL injection using SQL map
15:21
SQL Injection
Secure Softwares
SQL Injection
15:32
Advanced Persistent Threats (APT)
Secure Softwares
Advanced Persistent Threats (APT)
0:43
CVE (Common Vulnerabilities & Exposures) #appsec #cybersecurity #applicationsecurity
Secure Softwares
CVE (Common Vulnerabilities & Exposures) #appsec #cybersecurity #applicationsecurity
0:49
Dynamic Application Security Testing (DAST) & OWASP Top 10
Secure Softwares
Dynamic Application Security Testing (DAST) & OWASP Top 10
7:58
SBOM  #cybersecurity  #appsec  #sbom
Secure Softwares
SBOM #cybersecurity #appsec #sbom
0:38
Application Security Testing
Secure Softwares
Application Security Testing
10:30