Главная
Study mode:
on
1
Intro
2
WHAT IS A SUPPLY CHAIN?
3
DEVASTATING FOOD SHORTAGES
4
HOW DOES IT RELATE TO YOU?
5
FAMOUS HARDWARE SUPPLY CHAIN ATTACKS
6
FAMOUS SOFTWARE SUPPLY CHAIN ATTACKS
7
FAMOUS SIDE CHANNEL SUPPLY CHAIN ATTACKS
8
SCOPE TOO LARGE
9
HOW CAN SUPPLY CHAIN VULNS BE INTRODUCED...
10
HIJACKING DEPENDENCIES TO EXPLOIT MICROSOFT TEAMS
11
PROTECT YOUR INFRASTRUCTURE
12
PROTECT YOUR SDLC
13
PROTECT YOUR CODE
14
MOVEMENT IN THIS SPACE
Description:
Explore a real-life example of dependency hijacking in Microsoft Teams in this 56-minute Linux Foundation talk sponsored by Contrast Security. Delve into the intricacies of supply chain vulnerabilities as Contrast Security's Director of Security Research, Matt Austin, and Director of Enterprise Security, Adam Schaal, guide you through the process. Learn about various types of supply chain attacks, including hardware, software, and side-channel attacks, and understand their potential impact. Discover how supply chain vulnerabilities can be introduced and gain insights into protecting your infrastructure, SDLC, and code. Examine the broader implications of supply chain security and stay informed about recent developments in this critical area of cybersecurity.

Dependency Hijacking Vulnerability in Microsoft Teams - Supply Chain Security Gaps

Linux Foundation
Add to list
0:00 / 0:00