Discover the tactics of deception and manipulation used in cyber crime, revealing how influence shapes our interactions in the digital landscape.
OWASP identification and authentication failures (noun) [Word Notes]
S2 E84 • 6 mins • May 20, 2025
Charts
- 18Increased by 1
- 18Increased by 46
- 19Increased by 18
- 19Increased by 13
- 23Increased by 26
Recent Episodes

May 20, 2025
OWASP identification and authentication failures (noun) [Word Notes]
S2 E84 • 6 mins

May 15, 2025
The band is finally back together.
S8 E338 • 44 mins

May 13, 2025
Log4j vulnerability (noun) [Word Notes]
S2 E83 • 9 mins

May 8, 2025
What’s inside the mystery box? Spoiler: It’s a scam!
S8 E337 • 46 mins

May 6, 2025
The RMM protocol: Remote, risky, and ready to strike. [OMITB]
S1 E12 • 42 mins

Language
English
Country
United States
Feed Host
Website
Feed
Request an Update
Updates may take a few minutes.