The talk will focus on increasing awareness about SBOM, a key buzzword in the wake of cyber-attacks, and discussing its importance, formats, and ways to generate, manage, and monitor SBOMs in different stages of SDLC.
This workshop aims to break the security myths about managed Kubernetes clusters & demos a takeover attack on an exposed EKS cluster with default configuration & insecure workloads.
An intentional vulnerable android application. Master Android Application Security by analyzing and overcoming advanced vulnerabilities in a real-world-like banking app