Logo video2dn
  • Сохранить видео с ютуба
  • Категории
    • Музыка
    • Кино и Анимация
    • Автомобили
    • Животные
    • Спорт
    • Путешествия
    • Игры
    • Люди и Блоги
    • Юмор
    • Развлечения
    • Новости и Политика
    • Howto и Стиль
    • Diy своими руками
    • Образование
    • Наука и Технологии
    • Некоммерческие Организации
  • О сайте

Скачать или смотреть VS CodeSupply Chain Attack: How RL Discovered a Supply Chain Compromise That Humans & AI Missed

  • ReversingLabs
  • 2025-07-23
  • 28
VS CodeSupply Chain Attack: How RL Discovered a Supply Chain Compromise That Humans & AI Missed
cybersecuritysoftware supply chain securitysoftware supply chain attackapplication securitysecure development lifecyclesoftware composition analysismalware analysisthreat intelligencethreat intelthreat huntingmalwaremalware detectionthreat intelligence solutionsreversinglabsyara rulessbomsoftware bill of materialstitanium platformsandboxincident responseendpoint detection and responsedeveloperSOC
  • ok logo

Скачать VS CodeSupply Chain Attack: How RL Discovered a Supply Chain Compromise That Humans & AI Missed бесплатно в качестве 4к (2к / 1080p)

У нас вы можете скачать бесплатно VS CodeSupply Chain Attack: How RL Discovered a Supply Chain Compromise That Humans & AI Missed или посмотреть видео с ютуба в максимальном доступном качестве.

Для скачивания выберите вариант из формы ниже:

  • Информация по загрузке:

Cкачать музыку VS CodeSupply Chain Attack: How RL Discovered a Supply Chain Compromise That Humans & AI Missed бесплатно в формате MP3:

Если иконки загрузки не отобразились, ПОЖАЛУЙСТА, НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если у вас возникли трудности с загрузкой, пожалуйста, свяжитесь с нами по контактам, указанным в нижней части страницы.
Спасибо за использование сервиса video2dn.com

Описание к видео VS CodeSupply Chain Attack: How RL Discovered a Supply Chain Compromise That Humans & AI Missed

Explore one of the most compelling recent software supply chain attacks targeting the popular VS Code platform. This webinar will dissect the compromise of ETHcode, a trusted Visual Studio Code extension for Ethereum smart contract development with nearly 6,000 installs.

Hijacked through a GitHub pull request introducing just two lines of malicious code, ETHcode demonstrates how minimal changes can have devastating impacts.

ReversingLabs experts unpack how automated detection flagged these suspicious changes — missed by human reviewers — and reveal lessons for defending against similar threats.

Learn how modern development workflows, reliant on community-driven extensions and auto-updating ecosystems, are becoming high-value targets—and what proactive strategies can help protect your organization.

Among other things, the webinar will explore:
How the attacker used a fake GitHub account to deliver the payload.
Why the malicious changes escaped the notice of human code reviewers.
What the obfuscated “keythereum-utils” dependency did, and how it nearly went unnoticed.
Best practices for detecting and mitigating similar threats in your CI/CD pipeline.

About RL
ReversingLabs is the trusted name in file and software security, to verify and deliver safe binaries. With the largest Threat Repository in the industry with over 40 billion searchable files, the Fortune 500 trusts their software supply chain security and malware analysis with ReversingLabs. Learn more: https://www.reversinglabs.com/

RL - Trust Delivered.

Be sure to subscribe to RL and follow us on social media →
  / reversinglabs  
  / reversinglabs  
  / reversinglabs  
  / reversinglabs  

Комментарии

Информация по комментариям в разработке

Похожие видео

  • RL Live: Nathan Hamiel, Kudelski on risks in AI-Generated Black Box Code #aicoding #securityanalysis
    RL Live: Nathan Hamiel, Kudelski on risks in AI-Generated Black Box Code #aicoding #securityanalysis
    1 месяц назад
  • О нас
  • Контакты
  • Отказ от ответственности - Disclaimer
  • Условия использования сайта - TOS
  • Политика конфиденциальности

video2dn Copyright © 2023 - 2025

Контакты для правообладателей [email protected]