Showing: 1 - 3 of 7 RESULTS

Hacking with JWT

JWTs are an important part of how modern APIs are used, they assert your identify to the application. You will see them in SOAP, REST, and GraphQL. Many decisions about authorization and access are based on the claims contained within the JWT. If there are vulnerabilities within the framework used to create them, or in …

Exploring the Value of Different Threat Intelligence Sources

This presentation will explore the different types of technical and non-technical sources that are behind threat intelligence collections and analysis. From internal incident response data to criminal forums to open source blogs, different sources serve different purposes for threat intelligence. I will discuss the variety of sources that a threat intelligence team may use, the …