0:00
36:35
What if an GPC project OAUTH access token wasn’t deleted? This could expose databases to bad actors. Tal Skverer from Astrix discusses his DEF CON 31 presentation GhostToken: Exploiting Google Cloud Platform App Infrastructure to Create Unremovable Trojan Apps. Transcript here.
More episodes from "The Hacker Mind"
Don't miss an episode of “The Hacker Mind” and subscribe to it in the GetPodcast app.