It’s one of the more controversial topics within the information security realm - vulnerability research. It’s the practice of pulling software and services apart and finding how they were put together incorrectly. What you do with that research, whether it be submitting to a bug bounty, responsibly disclosing, or selling the information on an exploit broker, can seriously impact individuals and corporations. It’s an interesting topic with compelling arguments on most sides, and we’re going to dig into the details here today.
The podcast Security Explained is embedded on this page from an open RSS feed. All files, descriptions, artwork and other metadata from the RSS-feed is the property of the podcast owner and not affiliated with or validated by Podplay.