Channel Avatar

Crashtest Security @[email protected]

2.3K subscribers - no pronouns :c

Crashtest Security is a SaaS-based security vulnerability sc


06:01
What Are Unvalidated Redirects And Forwards in Cyber Security
07:53
What is a Javascript Injection Attack and How is it Orchestrated?
08:47
Everything You Need To Know About Privilege Escalation Explained In Less Than 10 Minutes
11:28
Best Practices and Tools to Prevent Systems and Applications from Privilege Escalation Attacks
07:01
Check Out The Ultimate Guide For Web Cache Poisoning
09:05
XSS vs CSRF Attacks – Here are the Differences
05:40
This is How You Use Lambda@Edge to Configure HTTP Security Headers for CloudFront
06:51
This is How You Can Disable an Insecure Algorithm
04:49
JavaScript Apps: Automated Security Testing Challenges
07:51
This is Your Guide to DevSecOps Automation
07:17
A08:2021 – Software and Data Integrity Failures- Explained
07:55
Startup Cybersecurity Guidelines: What’s Needed In Your Growth Stage?
07:57
SecDevOps  Benefits and Best Practices -  No Agility Without Security
08:31
Secure TLS Configuration In a Few Easy Steps
05:20
Here Are Five Ways to Screw Up Your Website Security
07:50
Here are the Five Data Breach Stages
08:22
Single Page vs. Multi-Page Application: Differences, Benefits, and Disadvantages
04:35
TLS Errors: This is How You Can Manage TLS Warnings
06:47
Differences in Certificate Key Size and How to Increase TLS Key Size
06:42
Cybersecurity Basics Checklist – 10 Steps for Starting Your Strategy
10:53
Ultimate Guide for Cybersecurity Audits
07:12
Common Weakness Enumeration Explained
07:12
Here are 6 Quick Wins for Your DevSecOps
09:52
Those are the Best Practices in Microservices Security
06:02
This is how you can secure Open-Source Projects
07:43
Top 6 Web Vulnerabilities for Managers
05:02
What is Citrix ADC
10:51
Why Security and DevOps Should Work Hand in Hand?
11:57
Here are the Latest Cybersecurity Trends
05:10
What are Sidejacking Vulnerabilities?
09:01
Security Testing Tools for DevOps
11:35
SSL and TLS Security Misconfiguration and How to Avoid It
06:27
Changes of Browser Support for TLS 1.0 & 1.1
08:16
How to Generate a Positive ROI through Web Application Security
13:26
What are the most common Security Issues with WordPress?
04:10
How to Prevent Web Server Information Leakage
07:53
File Inclusion Types, Examples, and Prevention
04:38
What is the Ticketbleed Vulnerability
09:22
How to Choose and Implement Vulnerability Assessment Tools
09:22
Cybersecurity KPIs and Metrics
08:34
Best CI/CD security tools
10:09
SAST, DAST, IAST, RASP Explained
05:43
How to Prevent Sensitive Data Exposure?
07:37
Sensitive Data Exposure Fuzzing Guide
03:10
How to Configure Trusted Certificates?
04:26
What is CCS Injection, and how to prevent it?
06:59
What is the CVE 2021 21972 Vulnerability and How to Detect It?
06:29
All You Need to Know About Server-Side Includes (SSI)
10:07
Web Security Basics and Best Practices
07:35
How to choose a Cybersecurity Tech Stack
03:34
How to Harden TLS Session Resumption?
07:28
Footprinting/Fingerprinting in Cybersecurity
06:59
What are TLS Security Settings and how to enable TLS Encryption
03:27
Disable Deprecated SSL Protocol Versions
09:56
OWASP Top 10 Cryptographic Failures A02 – Explained
08:28
All about DevOps Methodology Explained
05:38
Framing attacks and Cross-Frame Scripting Explained
09:09
SSL POODLE Attack - Definition and Prevention
10:34
HTTP Request Smuggling Explained
09:53
Automated Vulnerability Scanner Types and Benefits