Nov. 20, 2023, 7:11 p.m. | LiveOverflow

LiveOverflow www.youtube.com

Follow me down the rabbit hole into the wonderful world of IT security.

Buy my terrible font (ad): https://shop.liveoverflow.com
Learn hacking (ad): https://hextree.io

Related Videos:
https://www.youtube.com/watch?v=866olNIzbrk
https://www.youtube.com/watch?v=lKzsNp4AveY

Tweets:
https://twitter.com/LiveOverflow/status/1720734431659376995
https://twitter.com/LiveOverflow/status/1720799912181284864
https://twitter.com/LiveOverflow/status/1721493232310214910

Understanding the Risks of Stolen Credentials: https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/46437.pdf

Chapters:
00:00 - Intro
00:40 - Security Terminology
01:38 - Direct Database Access
03:40 - Introducing a Security Boundary
05:36 - Typical Web Security Vulnerabilities
07:03 - Clear-text Passwords in Database
09:28 - Security Weakness vs. Vulnerability
11:05 - Effective Mitigations
13:03 …

access clear database down it security mitigations passwords security text tweets videos vulnerabilities vulnerability weakness web web security world

Security Specialist

@ Protect Democracy | Remote, US

Information And Security Controller - Tram (UAE National)

@ Keolis | Dubaï, AE

Cybersecurity Engineer

@ Alstom Transport | Cairo, EG

IT Security Specialist (m/w/d) - Data Center & Cloud

@ CLAAS | Harsewinkel, NW, DE, 33428

Security Architect - Central Government sector

@ BAE Systems | London, GB

Project Cyber Security Manager

@ Alstom | Bangkok, TH