Vandana Verma

Walking into the era of Supply Chain Risks

Your application is 90% open-source code, making it a prime target. See live hacks that exploit common dependencies and learn how to build a secure pipeline.

Walking into the era of Supply Chain Risks
#1about 4 minutes

Developers as an unintentional malware distribution vehicle

Recent incidents like the event-stream package compromise show how attackers can turn developers into a distribution channel for malware.

#2about 4 minutes

The hidden risks of open-source dependencies

Vulnerabilities in common dependencies, like Apache Struts which led to the Equifax breach, highlight the danger of unmanaged open-source code.

#3about 4 minutes

Defining the modern software supply chain

The software supply chain mirrors a manufacturing process, and attackers exploit its weakest links to create cascading failures.

#4about 4 minutes

Common attack vectors and the zero trust principle

Attacks like dependency confusion and prototype pollution, exemplified by the SolarWinds incident, necessitate a zero trust security model.

#5about 4 minutes

Building a foundation for pipeline security

Secure your development pipeline by using frameworks from OpenSSF, implementing SBOMs, and securing code, containers, and secrets.

#6about 4 minutes

Demo: Bypassing sanitization with prototype pollution

A practical demonstration shows how prototype pollution can bypass input validation in a Node.js application by passing an array instead of a string.

#7about 3 minutes

Demo: Exploiting the Log4Shell vulnerability

This live hacking demo shows how the Log4j (Log4Shell) vulnerability allows an attacker to achieve remote code execution on a vulnerable server.

#8about 2 minutes

Demo: Remote code execution via a Python dependency

A vulnerable version of the Python Celery library is exploited to achieve remote code execution and exfiltrate server information.

#9about 1 minute

Fostering a developer-first security culture

The key to better security is creating a developer-friendly environment and engaging with communities like OWASP to stay informed.

#10about 8 minutes

Q&A: Career advice for aspiring security professionals

The speaker shares her career journey, tips for students entering cybersecurity, and thoughts on social engineering and learning resources.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

From learning to earning

Jobs that call for the skills explored in this talk.