Guest: Anant Srivastava, Chief researcher & Founder @ Cyfinoid Research Pvt Ltd It's not your code that gets breached, it's the code you inherit. We expose the hidden dangers lurking in your Software Supply Chain and reveal the single document that can save you: the SBOM . This episode breaks down why relying on Open Source components creates major risk. Learn how the Software Bill of Materials tracks every transitive dependency, allowing instant mapping of a new CVE to your production a...
All content for Breakpoint Security Podcast is the property of Neelu Tripathy and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Guest: Anant Srivastava, Chief researcher & Founder @ Cyfinoid Research Pvt Ltd It's not your code that gets breached, it's the code you inherit. We expose the hidden dangers lurking in your Software Supply Chain and reveal the single document that can save you: the SBOM . This episode breaks down why relying on Open Source components creates major risk. Learn how the Software Bill of Materials tracks every transitive dependency, allowing instant mapping of a new CVE to your production a...
S04EP01 | Zero Day Playbook with Coverage-Guided PHP Fuzzing | Sebastian Neef
Breakpoint Security Podcast
12 minutes
2 months ago
S04EP01 | Zero Day Playbook with Coverage-Guided PHP Fuzzing | Sebastian Neef
Ever wonder how zero-day vulnerabilities in your favorite websites get uncovered? Our guest today is diving into a game-changing technique: coverage-guided fuzzing for PHP web apps! Forget slow scanners; we're talking about finding critical bugs before the bad guys do. Guest: Sebastian Neef, PhD at the Technical University of Berlin, at the Chair for Security in Telecommunications In this segment, we explore PHUZZ, an open-source tool that's shaking up web application security testing. Our ...
Breakpoint Security Podcast
Guest: Anant Srivastava, Chief researcher & Founder @ Cyfinoid Research Pvt Ltd It's not your code that gets breached, it's the code you inherit. We expose the hidden dangers lurking in your Software Supply Chain and reveal the single document that can save you: the SBOM . This episode breaks down why relying on Open Source components creates major risk. Learn how the Software Bill of Materials tracks every transitive dependency, allowing instant mapping of a new CVE to your production a...