No video

Open Source Libraries Can Kill Your Supply Chain Security

  Рет қаралды 85

AppSecEngineer

AppSecEngineer

Күн бұрын

Sign up NOW: www.blackhat.com/asia-24/trai...
Did you know you could get compromised if you forgot to include the version number when importing third-party libraries? This is an attack called Dependency Confusion, and here's a tiny slice of what you'll be learning in my course at Black Hat Asia on April 16-17, 2024.
This is a 2-day, purely attack-based course designed to help you understand every step of your software supply chain and how to secure it.
What you'll learn:
- Client-side Supply Chain attacks
- Server-side dependency attacks
- Trojanizing Containers
- Attacks against CI Services
- Attacking Kubernetes clusters through malicious Operators
...and so much more. There's less than 2 weeks left, don't miss out!
Grab your seat today: www.blackhat.com/asia-24/trai...

Пікірлер: 2
@Mr_Yeah
@Mr_Yeah 4 ай бұрын
How does using the latest version of your dependencies lead to INsecurities, assuming that hackers didn't compromise the supply chain?
@AppSecEngineer
@AppSecEngineer 4 ай бұрын
It’s usually best to use the latest version of a software/library that’s been tested and is known to be secure. Assuming there’s an even more recent patch, it may be that that version has insecurities not yet discovered. As for what an attacker can do, they can release a software to the public registry with the same name but a higher version number, and that tricks the pkg manager to install that version.
Why VPNs are a WASTE of Your Money (usually…)
14:40
Cyberspatial
Рет қаралды 1,4 МЛН
Pool Bed Prank By My Grandpa 😂 #funny
00:47
SKITS
Рет қаралды 7 МЛН
Советы на всё лето 4 @postworkllc
00:23
История одного вокалиста
Рет қаралды 4,9 МЛН
Ichthyology: Phishing as a Science
24:28
Black Hat
Рет қаралды 36 М.
Don't Contribute to Open Source
9:55
Theo - t3․gg
Рет қаралды 228 М.
1 Year of Coding in 5 Minutes.(My Journey as a Programmer)
5:30
Programming with Yera
Рет қаралды 1,4 М.
Webinar: Secure by Design - Across the stack
55:51
AppSecEngineer
Рет қаралды 82
What Is a Prompt Injection Attack?
10:57
IBM Technology
Рет қаралды 175 М.
I wish every AI Engineer could watch this.
33:49
1littlecoder
Рет қаралды 78 М.
How I got a High Paying Remote Job through Open Source Contribution
15:56
What You Should Learn Before Cyber Security | Skills You Need
15:34