POPULARITY
Think Microsoft's password manager in Windows 11 is enough? Paul Thurrott breaks down why even devoted Edge users might want to look elsewhere for true password security. Host: Paul Thurrott Download or subscribe to Hands-On Windows at https://twit.tv/shows/hands-on-windows Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord. Sponsor: canary.tools/twit - use code: TWIT
In this journey from Darnley's Cyber Café, we explore the chilling aftermath of one of the most talked-about data breaches in modern history: the LastPass incident.But this isn't just a story about what happened. It's about what never stopped.From crypto wallets vanishing in silence to digital vaults bleeding secrets over years, this slow-burn narrative uncovers how one breach spiraled far beyond the headlines...into homes, businesses, and the darkest corners of the web.Whether you're a cybersecurity pro, a digital minimalist, or someone who's ever reused a password (you know who you are), this episode will shift the way you think about data security.☕ Settle in. The café is dim. The breach... still echoes after all these years...Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
CISA warns that pro-Russia hacktivist groups are targeting US critical infrastructure. Google patches three new Chrome zero-day vulnerabilities. North Korean actors exploit React2Shell to deploy a new backdoor. Researchers claim Docker Hub secret leakage is now a systemic problem. Attackers exploit an unpatched zero-day in Gogs, the self-hosted Git service. IBM patches more than 100 vulnerabilities across its product line. Storm-0249 abuses endpoint detection and response tools. The DOJ indicts a former Accenture employee for allegedly misleading federal customers about cloud security. Our guest is Kavitha Mariappan, Chief Transformation Officer at Rubrik, talking about understanding & building resilience against identity-driven threats. A malware tutor gets schooled by the law. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices segment, we are joined by Kavitha Mariappan, Chief Transformation Officer at Knowledge Partner Rubrik, talking about understanding and building resilience against identity-driven threats. Tune into Kavitha's full conversation here. New Rubrik Research Finds Identity Resilience is Imperative as AI Wave Floods the Workplace with AI Agents (Press release) The Identity Crisis: Understanding and Building Resilience Against Identity-Driven Threats (Report) Agentic AI and Identity Sprawl (Data Security Decoded podcast episode) Host Caleb Tolin and guest Joe Hladik, Head of Rubrik Zero Labs, to unpack the findings from their the report Kavitha addresses. Resources: Rubrik's Data Security Decoded podcast airs semi-monthly on the N2K CyberWire network with host Caleb Tolin. You can catch new episodes twice a month on Tuesdays on your favorite podcast app. Selected Reading CISA: Pro-Russia Hacktivists Target US Critical Infrastructure New cybersecurity guidance paves the way for AI in critical infrastructure | CyberScoop Google Releases Critical Chrome Security Update to Address Zero-Days - Infosecurity Magazine North Korea-linked ‘EtherRAT' backdoor used in React2Shell attacks | SC Media Thousands of Exposed Secrets Found on Docker Hub - Flare Hackers exploit unpatched Gogs zero-day to breach 700 servers IBM Patches Over 100 Vulnerabilities - SecurityWeek Ransomware IAB abuses EDR for stealthy malware execution US charges former Accenture employee with misleading feds on cloud platform's security - Nextgov/FCW Man gets jail for filming malware tutorials for syndicate; 129 Singapore victims lost S$3.2m - CNA Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
It is that time of year. Time to reflect… to look back… to realize how little we've learned, and shake our heads in sadness. 123456 is still the most used password according to a new study - and people still think that Taylor Swift is trying to sell them stuff on social media. We're looking at weak passwords and deepfake celebrities for 2025 on this edition of The Checklist, brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@Securemac.com
Another week, another round of cyber fails making headlines. In this episode of Security Squawk, we break down how some of the biggest names in tech and business are still getting owned by basic mistakes. This week: Dell's breach exposes critical platforms to extortion groups ️ A 158-year-old company destroyed by one weak password Ransomware still targeting hospitals while reports claim it is in decline If you think big brands have it figured out, think again. Stay informed and stay protected. Watch or listen now for insights you will not hear anywhere else. ️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! https://streamyard.com/pal/d/65161790...
Welcome to the CanadianSME Small Business Podcast, hosted by Maheen, where we explore essential strategies and technologies for staying safe and secure in today's digital world. In this episode, we dive deep into the realm of online security, the critical role of password managers, and the fascinating psychology behind our password habits.With cyber threats growing more sophisticated and human error remaining a key vulnerability, this discussion offers valuable insights on how individuals and businesses can strengthen their defenses in an ever-evolving landscape.Joining us today is Karolis Arbaciauskas, Head of Product & Business Development at NordPass, a secure, user-friendly password manager developed by the cybersecurity experts behind NordVPN.Key Highlights:1. Evolution of Online Security: How digital threats have changed over time and why strong password hygiene is more crucial than ever. How NordPass helps protect users and businesses.2. Psychology of Weak Passwords: Why people still use weak or reused passwords despite risks, and how NordPass uses research to drive awareness and behavioral change.3. Building a Privacy-First Digital Future: NordPass's zero-knowledge architecture and commitment to data protection, empowering users to control their digital lives.4. Global Password Trends: Surprising findings from NordPass's research on common workplace passwords worldwide and the security risks they pose.5. The Future of Authentication: The path beyond passwords, the role of passkeys, and how NordPass is pioneering the next evolution in authentication.Special Thanks to Our Partners:RBC: https://www.rbcroyalbank.com/dms/business/accounts/beyond-banking/index.htmlUPS: https://solutions.ups.com/ca-beunstoppable.html?WT.mc_id=BUSMEWAGoogle: https://www.google.ca/A1 Global College: https://a1globalcollege.ca/For more expert insights, visit www.canadiansme.ca and subscribe to the CanadianSME Small Business Magazine. Stay innovative, stay informed, and thrive in the digital age!Disclaimer: The information shared in this podcast is for general informational purposes only and should not be considered as direct financial or business advice. Always consult with a qualified professional for advice specific to your situation.
Trends in the current credential theft landscape and changing compliance standardsStrategies to reduce password risk - continuous scanning, enforced policies and exclusion dictionariesEncouraging users to create strong, securely stored passwords without reuseThis episode is hosted by Thom Langfordhttps://www.linkedin.com/in/thomlangford/Shannon Muller, Cyber security Specialist, Microsofthttps://www.linkedin.com/in/shannon-muller/Jay Vinda, Cyber Risk Engineering and Emerging Solutions Lead, Mosaic Insurance https://www.linkedin.com/in/jayvindaDarren James, Senior Product Manager, Specopshttps://www.linkedin.com/in/darren-james-91055310
In this episode, we're diving into one of the most enduring cybersecurity challenges—weak passwords. We'll explore how poor password practices and identity management pitfalls leave organizations vulnerable to compromise. From understanding the most common mistakes to implementing effective defenses, we're breaking down what it takes to fortify your systems against attackers exploiting the weakest link. Sourceshttps://www.verizon.com/about/news/2023-data-breach-investigations-report?utm_source=chatgpt.comhttps://blog.1password.com/challenges-of-shadow-it/https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/microsoft-digital-defense-report-2024?msockid=2e875ee0e1fe64d22f854aa6e0746523Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://twitter.com/cyberthreatpovWork with Us: https://securit360.com
Blue Batteries for Baby Safety: A Colourful Caution against Coin Cells. Printed Perfection: Pioneering Progress in Polymer Palaces. AI Alert Advances: Saving Lives with Smart Technology. Password Protection Paradigm: UK's Pioneering Policy. Rapid Rails: Revolutionising US Travel with Speed and Sustainability. Phishing Fiasco: Foiling a Formidable Fraudulence Factory. Solar Splendour: Scientists Spin Stretchable Solar Cells for Smart Wear. Outage Outcry: Protecting Triple-0 in Telecom Turmoil. Google's Gemini Galore: Gearing up with Generative AI.
Are you prone to using easy-to-remember passwords? If you live in the UK, it's time to change your habits: a new law has made the country the first place in the world where it is actually illegal to use weak passwords on connected devices. According to The Guardian, the new laws mean all manufacturers of smartphones, TVs, smart doorbells, and other devices must protect their connected devices by prompting users to change any default or common passwords. Whether you live in the UK or not, changing default passwords on your devices is an important first step during the setup process. Leaving these passwords unchanged, or setting them to something that is easily guessable, such as 12345 or ‘password', is like leaving your front door open for cyber criminals. And once they get in, those criminals can take over your devices and use them to hack others, send spam emails, and conduct the aggressive denial of service campaigns that regularly bring down company websites. The 60-second "Security Nudge" is brought to you by CybSafe, developers of the Human Risk Management Platform. Learn more at https://cybsafe.com
Welcome to the security box, podcast 148. On this podcast, I may have a complete moron with a company, we'll have news, notes and more. The topic deals with passwords and it isn't looking that great. Morons We stand in solidarity with you, Reddit users. Reddit is taking advantage of the situation just like Twitter did so many months before. Apparently, Reddit has decided to do the same thing. One article says they're only charging $0.24 per 1,000 calls to their API, but people indicate its much different. The cost is $12,000 per month or roughly up to $20 million per year according to some estimates. Here are the blog posts as of writing in regards to Reddit. Accessibility apps will be free for API use on Reddit Reddit communities to go dark on June 12th, setting themselves to private Reddit to charge $12k for 50k calls to API? Its Official, Apollo shutting down Here's an ars article on Apollo Van Nuys is not too far from where I live in a town called Woodland Hills. I go through there every time I take the bus. According to a KNX article which is very short, it says a guy from there was caught selling drugs on the dark web. Here is the blog post from the tech blog titled Van Nuys man pleads Not Guilty to selling drugs online which links to the KNX article. In Case you Missed it In Case you missed it, I finished Tracers in the Dark. It was a very interesting book, one I didn't want to put down until I did. Book Review: Tracers in the dark, by Andy Greenberg is the blog post and I'm not giving anything away. Our Topic: Weak Passwords Our topic comes to us from Cyberscoop. It was an interesting read. The article is title Nation-state actors are taking advantage of weak passwords to go after cloud customers, Google says and I found it interesting. This proves again that we need to make sure that our users are using strong passwords or pass phraises. Don't worry, Cyber Security Awareness Month is coming up, so TSB will be starting all over again with basic stuff when it comes to your security. I hope that every single person will enjoy today's program, and thanks so much for listening! Supporting the podcast If you'd like to support our efforts on what this podcast is doing, you can feel free to donate to the network, subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog page found here. Thanks so much for listening, reading and learning! We can't do this alone.
A monster episode this week with updates to Chat, Cloud Search, Sites, Access Approvals, Classroom, Drive, and more. Over Passover, I was offline a lot and had the chance to catch up on some reading and I absolutely tore through Losing the Signal which is the story of the epic rise and eventual fall of Blackberry. They changed how we communicate and not only got completely blindsided by Apple and then Google, they completely refused to believe this is the future people would want. Now I loved my Crackberrys and had many different models over the years including the touch screen Storm Slider, and the design was getting better but the OS was just trash at that point. This book goes behind the scenes and now I know why. They are releasing a new movie based on this book called Blackberry and if you are anything like me, I recommend reading the book and seeing the movie. It releases May 12th. Blackberry Trailer: https://youtu.be/cXL_HDzBQsM #notsponsored Click here to learn all about the Google ChromeOS Administrator Certification and how to pass it: https://youtu.be/KHPy_n0qVk8
Weak passwords targeted on Google Cloud Potential IT snitches warned about employment stitches Discord cooperating with leaked document investigation And now a word from our sponsor, AppOmni Can you name all the third party apps connected to your major SaaS platforms, like Salseforce, Microsoft 365, or Google Workspace? What about the data these apps can access? After all, one compromised 3rd party app could put your entire SaaS ecosystem at risk. With AppOmni, you get visibility to all third party apps and SaaS-to-SaaS connections — including which end users have enabled them, and the level of data access they've been granted. Visit AppOmni.com today to request a free risk assessment.
See omnystudio.com/listener for privacy information.
Retirement Lifestyle Show with Roshan Loungani, Erik Olson & Adrian Nicholson
Today on the Retirement Lifestyle Show, Roshan Loungani, Erik Olson, and Adrian Nicholson break down some of the leading password managers and explain why it might be a good idea to have a password manager. They talk about the reasons why most people don't have a password manager, the risks of reusing similar passwords, and the best password managers for business or family use. [04:30] How to Hack-Proof Your Passwords [06:40] Top Brands in the Password Manager Space [10:23] The Best Password Managers For Businesses [12:00] Key Features of the Keeper Software Manager [13:15] Why Roshan Settled on LastPass Password Manager [15:55] The Reason Why Most People Don't Have a Password Manager [18:27] The Risks Associated with Weak Passwords [21:00] How to Save Your Passwords Automatically [22:51] Password Managers, Browser Extensions, and VPN Use [30:10] Understanding the Google Authentication Tool [32:03] The Trusted Contacts and Family Feature [38:15] Parting Thoughts Roshan can be reached at roshan.loungani@aretewealth.com or at 202-536-4468. Erik can be reached at erik.olson@aretewealth.com or 815-940-4652. Adrian can be reached at adrian.nicholson@aretewealth.com or at 703-915-8905. Follow Us At: Website: https://retirementlifestyleshow.com/ https://www.retirewithroshan.com https://youtu.be/hKVzI87v0tA https://twitter.com/RoshanLoungani https://www.linkedin.com/in/roshanloungani/ https://www.facebook.com/retirewithroshan/ https://www.linkedin.com/in/financialerik/ https://www.linkedin.com/in/adrian-nicholson-74b82b13b/ #retirementlifestylepodcast #fire #podcast #FI #Retire #retirewithroshan #BAM #BusinessAsMission #ImpactInvesting All opinions expressed by podcast hosts and guests are solely their own. While based on information they believe is reliable, neither Arete Wealth nor its affiliates warrant its completeness or accuracy, nor do their opinions reflect the opinion of Arete Wealth. This podcast is for general informational purposes only and should not be regarded as specific advice or recommendations for any individual. Before making any decisions, consult a professional.
I came across this article on CNBC about passwords that are used by people that can't be easily hacked into on this show we help you with what you should not need to do when creating a password and a top 20 passwords used that shouldn't be if you want more you can go to the article by Tom Huddleston @ https://www.cnbc.com/2022/02/27/most-common-passwords-hackers-leak-on-the-dark-web-lookout-report.html --- Send in a voice message: https://anchor.fm/joseph-beslow7/message
In this episode, host Bidemi Ologunde presents an incident where two young men are awaiting sentencing for breaking into female students' university email accounts and then gaining further access into their social media accounts to steal their nude pictures and trade them with their co-conspirators.Please send questions, comments, and suggestions to bidemi@thebidpicture.com. You can also get in touch on LinkedIn, Twitter, the Clubhouse app (@bid), and the Wisdom app (@bidemi).
Tree Humper, Weird Drive-thru Stories, Weak Punishment, Meat-eating Vegetarian Babysitter, Middle School Pepper Eating Contest, Weak Passwords, Criminal Brings Child to Work, Black Market COVID-19 Tests, Barista Confessions Join our community here to keep laughing!
Learn about how your weak passwords can get approved even when they shouldn’t; why Saturn’s rings might not be as old as we thought; and how much time you should spend with someone to know if you really enjoy their company. Sources: The Top 100 Worst Passwords of 2019 | SplashData — https://www.teamsid.com/100-50-worst-passwords-2019/ 'Inconsistent and misleading' password meters could increase risk of cyber attacks | EurekAlert! — https://www.eurekalert.org/pub_releases/2019-12/uop-am121819.php 2019 Data Breach Investigations Report | Verizon — https://enterprise.verizon.com/resources/reports/dbir/ Password meters: inaccurate advice offered inconsistently? | Computer Fraud & Security, Volume 2019, Issue 11, November 2019 — https://www.sciencedirect.com/science/article/abs/pii/S1361372319301162?via%3Dihub Ancestor of Humans Lived With Dinosaurs | Seeker — https://www.seeker.com/ancestor-of-humans-lived-with-dinosaurs-1768223125.html Are Saturn’s Rings Really as Young as the Dinosaurs? | Quanta Magazine — https://www.quantamagazine.org/are-saturns-rings-really-as-young-as-the-dinosaurs-20191121/ The origin of Saturn's rings and moons | Science — https://science.sciencemag.org/content/364/6445/1028 Measurement and implications of Saturn’s gravity field and ring mass | Science — https://science.sciencemag.org/content/364/6445/eaat2965 The 3-Encounter Rule | The Art of Manliness — https://www.artofmanliness.com/articles/the-3-encounter-rule/ Relational mate value: Consensus and uniqueness in romantic evaluations. | Journal of Personality and Social Psychology — https://psycnet.apa.org/record/2014-08116-001 Relational Mate Value: Consensus and Uniqueness in Romantic Evaluations | Journal of Personality and Social Psychology (PDF) — https://static1.squarespace.com/static/504114b1e4b0b97fe5a520af/t/536558a7e4b00d4ffa0c60a0/1399150759190/EastwickHunt2014JPSP.pdf Amazon smart speaker users: you can listen to our podcast as part of your Amazon Alexa Flash Briefing! Just click or tap “enable” here: https://curiosity.im/podcast-flash-briefing.
This is the ProactiveIT Podcast. This Week: The latest in IT and Cyber Security news plus Weak Passwords, schools targeted by ransomware and HIPAA Right of Access Explained. This is... The post ProactiveIT Ep 9 – Dentists & HIPAA | Schools & Ransomware appeared first on Nwaj Tech - Information Tech & Cloud Support.
10/11/18 Weak Passwords Banned; Same Passwords; Researcher or Crook?; Internet Weather | AT&T ThreatTraq
This week, Tenable researcher reveals extended MikroTik Router Vulnerability, Wi-Fi versions will get names people can actually understand, don't accept Facebook's 2nd friend request, Google Plus exposed 500,000 users data, weak passwords are being banned in California, and code execution bug in malicious repositories resolved by Git Project! Juxin Dyrmishi Brigjaj of Acunetix joins us for expert commentary to talk about the resurgence of XSS after the big British Airways and NewEgg Hack! All that and more, on this episode of Hack Naked News! Full Show Notes: https://wiki.securityweekly.com/HNNEpisode192 Sponsor Landing Page: https://www.acunetix.com/securityweekly/ Visit https://www.securityweekly.com/hnn for all the latest episodes! Visit https://www.activecountermeasures/hnn to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Tenable researcher reveals extended MikroTik Router Vulnerability, Wi-Fi versions will get names people can actually understand, don't accept Facebook's 2nd friend request, Google Plus exposed 500,000 users data, weak passwords are being banned in California, and code execution bug in malicious repositories resolved by Git Project! Juxin Dyrmishi Brigjaj of Acunetix joins us for expert commentary to talk about the resurgence of XSS after the big British Airways and NewEgg Hack! All that and more, on this episode of Hack Naked News! Full Show Notes: https://wiki.securityweekly.com/HNNEpisode192 Sponsor Landing Page: https://www.acunetix.com/securityweekly/ Visit https://www.securityweekly.com/hnn for all the latest episodes! Visit https://www.activecountermeasures/hnn to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Tenable Researcher Reveals Extended MikroTik Router Vulnerability, Wi-Fi versions will get names people can actually understand, don't accept Facebook's 2nd friend request, Google Plus exposed 500,000 users data, Weak passwords are being banned in California, and Code execution bug in malicious repositories resolved by Git Project! Juxin Dyrmishi Brigjaj of Acunetix joins us for expert commentary to talk about the resurgence of XSS after the big British Airways and NewEgg Hack! All that and more, on this episode of Hack Naked News! Full Show Notes: https://wiki.securityweekly.com/HNNEpisode192 Sponsor Landing Page: https://www.acunetix.com/securityweekly/ Visit http://hacknaked.tv to get all the latest episodes!
Panel: Charles Max Wood AJ O’Neal Joe Eames Special Guests: Adam Baldwin In this episode, JavaScript Jabber panelist speak with Adam Baldwin. Adam is a return guest and has many years of application security experience. Currently, Adam runs the Node Security Project/Node Security Platform, and Lift Security. Adam discusses the latest of security of Node Security with Charles and AJ. Discussion topics cover security in other platforms, dependencies, security habits, breaches, tokens, bit rot or digital atrophy, and adding security to your development. In particular, we dive pretty deep on: What is the Node Security Project/Node Security Platform Dependency trees NPM Tokens and internal data What does Node Security do for me? NPX and NSP Command Line CIL Bit Rot or Digital Atrophy How often should you check repos. Advisories If I NPM install? Circle CI or Travis NSP Check What else could I add to the securities? Incorporate security as you build things How do you find the vulnerabilities in the NPM packages Two Factor authentication for NPM Weak Passwords OL Dash? Install Scripts Favorite Security Story? And much more! Links: Node Security Lift Security https://github.com/evilpacket @nodesecurity @liftsecurity @adam_baldwin Picks: Adam Key Base Have I been Pwned? Charles Nettie Pot convo.com AJ This Episode with Adam Baldwin Free the Future of Radical Price Made In America Sam Walton Sonic - VGM Album Joe Pych - Movie NG Conf Why We Don’t Suck
Panel: Charles Max Wood AJ O’Neal Joe Eames Special Guests: Adam Baldwin In this episode, JavaScript Jabber panelist speak with Adam Baldwin. Adam is a return guest and has many years of application security experience. Currently, Adam runs the Node Security Project/Node Security Platform, and Lift Security. Adam discusses the latest of security of Node Security with Charles and AJ. Discussion topics cover security in other platforms, dependencies, security habits, breaches, tokens, bit rot or digital atrophy, and adding security to your development. In particular, we dive pretty deep on: What is the Node Security Project/Node Security Platform Dependency trees NPM Tokens and internal data What does Node Security do for me? NPX and NSP Command Line CIL Bit Rot or Digital Atrophy How often should you check repos. Advisories If I NPM install? Circle CI or Travis NSP Check What else could I add to the securities? Incorporate security as you build things How do you find the vulnerabilities in the NPM packages Two Factor authentication for NPM Weak Passwords OL Dash? Install Scripts Favorite Security Story? And much more! Links: Node Security Lift Security https://github.com/evilpacket @nodesecurity @liftsecurity @adam_baldwin Picks: Adam Key Base Have I been Pwned? Charles Nettie Pot convo.com AJ This Episode with Adam Baldwin Free the Future of Radical Price Made In America Sam Walton Sonic - VGM Album Joe Pych - Movie NG Conf Why We Don’t Suck
Panel: Charles Max Wood AJ O’Neal Joe Eames Special Guests: Adam Baldwin In this episode, JavaScript Jabber panelist speak with Adam Baldwin. Adam is a return guest and has many years of application security experience. Currently, Adam runs the Node Security Project/Node Security Platform, and Lift Security. Adam discusses the latest of security of Node Security with Charles and AJ. Discussion topics cover security in other platforms, dependencies, security habits, breaches, tokens, bit rot or digital atrophy, and adding security to your development. In particular, we dive pretty deep on: What is the Node Security Project/Node Security Platform Dependency trees NPM Tokens and internal data What does Node Security do for me? NPX and NSP Command Line CIL Bit Rot or Digital Atrophy How often should you check repos. Advisories If I NPM install? Circle CI or Travis NSP Check What else could I add to the securities? Incorporate security as you build things How do you find the vulnerabilities in the NPM packages Two Factor authentication for NPM Weak Passwords OL Dash? Install Scripts Favorite Security Story? And much more! Links: Node Security Lift Security https://github.com/evilpacket @nodesecurity @liftsecurity @adam_baldwin Picks: Adam Key Base Have I been Pwned? Charles Nettie Pot convo.com AJ This Episode with Adam Baldwin Free the Future of Radical Price Made In America Sam Walton Sonic - VGM Album Joe Pych - Movie NG Conf Why We Don’t Suck
In this Episode, Kevin, James and Jason discuss implications of using default or weak credentials on systems and applications. In addition, they discuss some other mis-configurations regarding HTTP Methods and Web Server file accessibility (web.xml).