The Hidden Danger: Inside Software Supply Chain Attacks

Описание к видео The Hidden Danger: Inside Software Supply Chain Attacks

I had a fascinating conversation with Paul McCarty about the rising trend of New Cyber Weapons and their dangerous impact on global attacks targeting the Software Supply Chain. #supplychain #cybersecurity #hacker

We also discussed effective defense strategies and key cybersecurity concepts that can help protect against these threats.

In this video we learn valuable insights into safeguarding your systems and staying ahead in the evolving world of cyber warfare.

Paul McCarty:

DevSecOps Playbook: https://github.com/6mile/DevSecOps-Pl...
Threat Modelling for Software Supply Chains:
https://github.com/6mile/TVPO

Software Supply Chain Security Training: https://sourcecodered.com

Gitloker: sourcecodered.com/gitloker-attack

OWASP: https://owasp.org/www-chapter-singapore/

Chapters:

0:00-00:44 What we'll cover today.
00:44-01:28 The guest Paul McCarty!!
01:28-02:34 His experience
02:34-03:51 Software Supply Chain Attacks...
03:51-05:08 DevSecOps Playbook
05:08-07:17 Important projects
07:17-08:05 GitHub and its large number of repositories
08:05-10:15 Who are The Threat Actors?
10:15-13:46 Why are Software Supply Chain Attacks on The Rise?.
13:46-20:50 The Evolution of Software Supply Chain Threats
20:50-22:47 Gitloker
22:47-25:28 The controversy of GitHub
25:28-32:34 Code Puppets
32:34-36:41 Paul McCarty Training
36:41-38:01 Summary and Conclusion

Watch more cyber security fundamental videos
1. Radio Signal Jamming -    • Radio Signal Jamming  
2. The world's most powerful cyber armies -    • The World's Most Powerful Cyber Armies  
3. Hacking IoT devices -    • Hacking IoT devices with OTW (Easy an...  
4. HTTP/2 Rapid Reset attack explained -    • The New DDoS Attack: HTTP/2 Rapid by ...  
5. The world smallest Hacking lab -    • The World Smallest Hacking Lab ZimaBo...  
6. Hacking wifi networks -    • Hacking WiFi networks in seconds With...  
7. Hacking IP camera's -    • Hacking IP Cameras with master hacker...  
8. How to become a master hacker (With OTW) -    • how to become a master hacker  

Yaniv Hoffman

Комментарии

Информация по комментариям в разработке