Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OAuth security gaps at Booking.com (now remediated)

This short video explains how Salt Labs researchers identified several critical security flaws on the popular travel site Booking.com. The flaws were found in the site's authentication functionality and could have allowed a malicious attacker to take over user accounts, access profile information, and take actions on behalf of the user such as booking or canceling reservations and ordering transportation services.

Stranger Danger: Your JavaScript Attack Surface Just Got Bigger

Building JavaScript applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome - you're a cloud native application developer! As developers, our responsibility has broadened, and more software means more software security concerns for us to address.

What Keeps Cybersecurity Leaders Up At Night: A Global Perspective

Our research shows that 48% of security leaders are worried about a cloud breach, and they have reason to worry if their cloud security isn’t ready for potential threats. Join us for a LinkedIn Live as we dig into the data from our “Global Uncertainty” survey and offer up next steps for organizations to ease their cybersecurity concerns and start securing their systems.

Hello CISO - Episode 9: Practicing Good Breach Response

What makes a company successful at breach response? In a word, preparation. In this episode, Troy breaks down an historically bad example of breach response, and how to avoid a similar fate. Hello CISO is a collaboration between Troy Hunt and the people who build the world's most trusted enterprise password manager.