OpenSSL new vulnerability

OpenSSL new vulnerability

Up next

My new book - Root cause, Stories from two decades of backend bugs

I wrote a new book that has been in the works for years. It is called Root Cause, and it is for those who enjoy the art of backend engineering.Early in my career, 20 years ago, I built backend and database applications without fully grasping their inner mechanics. Performance iss ...  Show more

5 Backend Design Patterns for Managing Threads and Sockets

In this video I introduce 5 different design patterns for building backend applications. Each mode explains how a socket listener is established, a connections are established and how threads and connections are managed to read, write and process requests. 

Recommended Episodes

JavaScript Vulnerabilities with Tim Kadlec - The State of the Web
The State of the Web

<span style="font-weight: 400;">(Originally aired on YouTube on May 30, 2018)</span>

<span style="font-weight: 400;">Rick and Tim talk about how insecure much of the web really is, the various vulnerabilities in web security that can leave you open to attack, the challe ...

  Show more

Daily & Week in Review: Classified info--goose sauce, gander sauce. Security industry buoyed by Avast, AVG.
CyberWire Daily

In today’s podcast, we talk through the ramifications of Android encryption issues. Experts consider the implications of D-Link vulnerabilities for IoT security. The Wendy’s paycard breach has gotten much bigger. Familiar exploits circulate in the wild, and Mac backdoors make a c ...  Show more

No honor in being a criminal. [Research Saturday]
CyberWire Daily

This week, our guest is Reece Baldwin from Kasada discussing their work on "No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign." The Kasada Threat Intelligence team has recently identified a malware campaign targeting users of OpenBullet, a tool popular within ...  Show more

Files stolen from a sneaky SymStealer. [Research Saturday]
CyberWire Daily

Ron Masas of Imperva discusses their work, the "Google Chrome “SymStealer” Vulnerability. How to Protect Your Files from Being Stolen." By reviewing the ways the browser handles file systems, specifically searching for common vulnerabilities relating to how browsers process symli ...  Show more