As long as code and data cannot be distinguished by machines, Injection attacks will prevail. Injection flaws are very prevalent, particularly in legacy code. Injection flaws occur when an application sends untrusted data to an interpreter. This talk will focus on different injection flaws, challenges associated with it and possible ways to mitigate it.
I am Cybersecurity Professional currently working on DAST and SAST in DevSecOps.In My Previous experience I have worked on Web Application Security, Mobile Application's- Android & IOS Security.
Starts at Saturday February 24 2018, 12:30 PM. The sessions runs for 40 minutes.