Application Security Weekly's Avatar

Application Security Weekly

@aswpodcast.com

Listen to the Application Security Weekly podcast for interviews and news on everything appsec — and more! Hosted by @mutantzombie.bsky.social, @jlk.bsky.social, and Kalyani Pawar.

93
Followers
2
Following
74
Posts
18.11.2024
Joined
Posts Following

Latest posts by Application Security Weekly @aswpodcast.com

Preview
ASW Recap for March 2025 Recap of the Application Security Weekly podcast episodes from March 2025

Here’s the March recap while I finish writing up what we did in April. #appsec

dangerouserrors.com/appsec/2025/...

03.05.2025 17:26 👍 0 🔁 0 💬 0 📌 0
Preview
Synthwave Shoutouts Synthwave, retrowave, and other shoutouts from the ASW podcast

At the end of every episode I mention a favorite #synthwave track. Because music makes everything better, even #appsec.

And since it’s @bandcamp.com Friday, you can make a musician’s day better by supporting their work and grabbing a track (or two or three).

dangerouserrors.com/synthwave-sh...

02.05.2025 11:12 👍 3 🔁 0 💬 0 📌 0
Preview
Synthwave Shoutouts Synthwave, retrowave, and other shoutouts from the ASW podcast

It’s @bandcamp.com Friday, which is an excellent Friday for supporting musicians.

Buy a track. Buy an album. Enjoy some new music.

And if you like #synthwave (and adjacent) tunes, check out this list for a few ideas.

dangerouserrors.com/synthwave-sh...

02.05.2025 11:08 👍 2 🔁 0 💬 0 📌 0
Preview
Application Security Weekly Random encounters for infosec, music, horror, movies, ttrpgs, and more

Find more episodes, recaps, and some random #appsec reading on the blog.

dangerouserrors.com

02.05.2025 05:43 👍 0 🔁 0 💬 0 📌 0
Title card for AppSec presentation on “Secure Designs, UX Dragons, Vuln Dungeons”

Title card for AppSec presentation on “Secure Designs, UX Dragons, Vuln Dungeons”

Getting ready to sneak in as many D&D references as possible into an #appsec discussion

26.04.2025 21:08 👍 4 🔁 1 💬 0 📌 0
Preview
More WAFs in Blocking Mode and More Security Headaches from LLMs – Sandy Carielli, Janet Worthington – ASW #326 The breaches will continue until appsec improves. Janet Worthington and Sandy Carielli share their latest research on breaches from 2024, WAFs in 2025, and where secure by design fits into all this. W...

@jwo3.bsky.social and I were guests on @aswpodcast.bsky.social this week, talking about WAF, protecting LLMs, breach trends, and software supply chain. Thanks, @mutantzombie.bsky.social for having us!
www.scworld.com/podcast-segm...

15.04.2025 11:04 👍 10 🔁 2 💬 0 📌 0

We were somewhere around Barstow, on the edge of AppSec, when the vibe coding began to take hold.

01.04.2025 18:43 👍 3 🔁 1 💬 0 📌 0
Finding a Use for GenAI in AppSec - Keith Hoodlet - ASW #323
Finding a Use for GenAI in AppSec - Keith Hoodlet - ASW #323 YouTube video by Security Weekly - A CRA Resource

One of my goals this year is to figure out a cost-benefit analysis of fuzzing vs. LLMs vs. grep.

Later on in this episode Keith Hoodlet shared where he's seeing (and not seeing) #appsec potential from LLMs.

Articles and episode at www.scworld.com/podcast-epis...

youtu.be/zn3LT4BqOJo?...

28.03.2025 21:12 👍 1 🔁 0 💬 0 📌 0
The mimic from AD&D 1st edition.

The mimic from AD&D 1st edition.

It reminded me of Ken Thompson's talk in 1984 about trusting compilers (dl.acm.org/doi/10.1145/...).

Which also reminded me of classic D&D monsters like the mimic.

Four decades later we still have both -- random objects that we're sure are monsters and code that we're not sure we can trust.

28.03.2025 00:42 👍 0 🔁 0 💬 0 📌 0
Ken Thompson’s Secret Hack — Trust No Compiler!
Ken Thompson’s Secret Hack — Trust No Compiler! YouTube video by Security Weekly - A CRA Resource

Historical context for the "BadSeek" post by Shrivu Shankar (blog.sshh.io/p/how-to-bac...).

He tweaked model weights to subtly introduce a backdoor into generated code, regardless of prompt, and noted the difficultly in detecting such manipulation.

youtube.com/shorts/nB_KK...

28.03.2025 00:42 👍 0 🔁 0 💬 1 📌 0

We covered #appsec articles about:
- Next.js middleware and where to place security controls
- ruby-saml authentication bypass and how many different parsers a library should have
- an NTLM hash leak and when a UX feature becomes a security liability

26.03.2025 21:19 👍 0 🔁 0 💬 1 📌 0
Preview
Finding a Use for GenAI in AppSec - Keith Hoodlet - ASW #323 YouTube video by Security Weekly - A CRA Resource

Memory safe code was having an unsafe design week this week.

News articles and notes at www.scworld.com/podcast-epis...

www.youtube.com/watch?featur...

26.03.2025 21:19 👍 0 🔁 0 💬 1 📌 0

Keith Hoodlet and Kalyani Pawar shared their ideas on better designs and better defaults. We also pondered just how much more secure the world might be if there was no more XML...

26.03.2025 21:19 👍 0 🔁 0 💬 0 📌 0

I always enjoy talking with Keith. Regardless of how much of a future we'll have with appsec toasters, he'll always be a human I turn to for insights in this area.

26.03.2025 00:44 👍 0 🔁 0 💬 0 📌 0

LLMs have some promise as assistants, like crafting a fuzzing corpus. There are areas where LLMs could quite directly prove their value in bug bounty hunting. But there are also areas where we've been underwhelmed (so far!) by the generic LLM responses to threat modeling and security reviews.

26.03.2025 00:44 👍 0 🔁 0 💬 1 📌 0
Finding a Use for GenAI in AppSec - Keith Hoodlet - ASW #323
Finding a Use for GenAI in AppSec - Keith Hoodlet - ASW #323 YouTube video by Security Weekly - A CRA Resource

Sure, LLMs are helping devs write code, but is it secure code? How are LLMs helping #appsec teams?

Keith Hoodlet returned to talk about those questions and put the capabilities of LLMs into perspective.

Show notes at www.scworld.com/podcast-epis...

youtu.be/zn3LT4BqOJo?...

26.03.2025 00:44 👍 0 🔁 0 💬 1 📌 0

We also discussed the importance of reading beyond the headlines of research papers in order to avoid hype and better understand what's improving -- and what's not -- in terms of code generation and security capabilities.

26.03.2025 00:44 👍 0 🔁 0 💬 1 📌 0

More importantly, he talked about the logic problems behind oracle manipulation and flash loan attacks.

Crypto is rife with rug pulls, scams, and questionable tokens. It's also a great learning space for classes of attacks that aren't memory safety flaws or the dusty XSS and SQLi of the web.

18.03.2025 17:50 👍 1 🔁 0 💬 0 📌 0

I appreciate this particular Top 10 list because it's not repetitive of all the others and it has entries that are very domain-specific to crypto. Shashank provided lots of technical background and real examples across familiar #appsec flaws like integer overflows and reentrancy problems.

18.03.2025 17:50 👍 0 🔁 0 💬 1 📌 0

Shashank went into the details of the 2025 edition of the Smart Contract Top 10, how it has changed over the past two years, and how security improvements in Solidity might change it again (for the better!) in another two years.

18.03.2025 17:50 👍 0 🔁 0 💬 1 📌 0
Redlining the Smart Contract Top 10 - Shashank - ASW #322
Redlining the Smart Contract Top 10 - Shashank - ASW #322 YouTube video by Security Weekly - A CRA Resource

There's no better place to discover the impact of logic flaws than in the cryptocurrency space, where every token is its own self-funding bug bounty and every contract is a gamble in correctness.

Show notes: www.scworld.com/podcast-epis...

youtu.be/0GlIbGgi1OY?...

18.03.2025 17:50 👍 1 🔁 0 💬 1 📌 0
Preview
Application Security Weekly Random encounters for infosec, music, horror, movies, ttrpgs, and more

Find episodes, recaps, and some random #appsec thoughts on the blog.

deadliestwebattacks.com

13.03.2025 16:27 👍 0 🔁 0 💬 0 📌 0

Jackie McGuire added insightful context to that discussion. But we also talked about technical research, nuances between ML models and LLMs, and (once again) why I think prompt injections and jailbreaks are the modern XSS.

Articles and show notes at www.scworld.com/podcast-epis...

13.03.2025 16:16 👍 0 🔁 0 💬 0 📌 0
Skype Hangs Up, Android Backdoors, Jailbreak Research, Pretend AirTags, Wallbleed - ASW #321
Skype Hangs Up, Android Backdoors, Jailbreak Research, Pretend AirTags, Wallbleed - ASW #321 YouTube video by Security Weekly - A CRA Resource

From Skype's embrace of e2ee to the recent Wallbleed research against the GFW, there are tons of reasons why #appsec is not a myopic technical topic.

It reminds me of an old joke about oversimplifying models. We shouldn't treat appsec as a spherical CVE in a vacuum.

youtu.be/Cbzthj0s44I?...

13.03.2025 16:16 👍 0 🔁 0 💬 1 📌 0

We talked with Jack about the important qualifiers that "easy" fixes have to be "easy to implement and deploy". Not everyone has Google's budget for #appsec.

13.03.2025 06:31 👍 0 🔁 0 💬 0 📌 0

It's not like vuln classes and countermeasures are unknown. Phrack 54 covered SQL injection vulns in 1998. All the major databases supported prepared statements by 2004. Yet in 2025 we already have a few hundred CVEs for SQL injection (and XSS and a few other familiar classes).

13.03.2025 06:31 👍 0 🔁 0 💬 1 📌 0
CISA's Secure by Design Principles, Pledge, and Progress - Jack Cable - ASW #321
CISA's Secure by Design Principles, Pledge, and Progress - Jack Cable - ASW #321 YouTube video by Security Weekly - A CRA Resource

CISA has been pushing for more software to be secure by design and secure by default. Jack Cable shares how CISA chose to frame their Secure by Design principles and encourage businesses to improve their software quality.

Show notes at www.scworld.com/podcast-epis...

youtu.be/fjc2zqEFcAI?...

13.03.2025 06:31 👍 0 🔁 0 💬 1 📌 0
Video thumbnail

I’ll be hosting the Qualys Cyber Risk Series: AppSec Edition tomorrow at 9am PT! Join me and experts in the #AppSec and #APISecurity space as we discuss the latest trends, threats, and techniques to stay ahead.

Register now: qualys.brighttalk.com?utm_source=i...

#Qualys #CyberRiskSeries

11.03.2025 21:46 👍 4 🔁 0 💬 0 📌 0
Preview
Keeping Curl Successful and Secure Over the Decades – Daniel Stenberg – ASW #320 Curl and libcurl are everywhere. Not only has the project maintained success for almost three decades now, but it’s done that while being written in C. Daniel Stenberg talks about the challenges in de...

Check out what it's like to maintain code that's on over 20 billion devices!

www.scworld.com/podcast-epis...

04.03.2025 19:07 👍 0 🔁 0 💬 0 📌 0

For example, tracking how often each line of code has changed, digging into the origin of bugs, tweaking test cases to correctly handle various states.

He also points out that over half the security flaws were logical errors or errors unrelated to a memory safety issue.

04.03.2025 19:07 👍 0 🔁 0 💬 1 📌 0