
NO. 360 | NEWS, ANALYSIS & DISCOVERY SERIES
Unsupervised Learning
00:00
CICD Risks - Part 2
Deep fence threat mapper looks for threats in your production platforms and ranks those threats based on risk of exploit. Pup process HTML at the command line reads from SDN. A project discovery sequel injection chain use a combination of subfinder HTTP acts katana GF and sequel map se to run sequel injection testing at scale. And a conversation with our kong zang of Jupiter one about what mistakes we keep making when it comes to vulnerability management.
Transcript
Play full episode