У нас вы можете посмотреть бесплатно “Trusted” Is a Lie — Here’s How It Gets You Breached или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
What if the software you rely on every single day, the tools you consider "trusted" and safe to use, are actually just a cleverly crafted facade, hiding a much more sinister truth? In this brand new episode, we are going to pull back the curtain and expose the absolutely chilling reality of modern supply chain attacks. These are the kinds of attacks that are designed to sneak right past all of your defenses, the ones you thought were impenetrable, and get into your systems unnoticed. We're not just scratching the surface here; we're diving deep, going into every intricate detail of how these attacks are launched. We'll explore how compromised dependencies, which are essentially pieces of code from other sources that your software relies on, can be secretly tampered with. We'll also shed light on the insidious role of lockfiles, which are meant to ensure consistency but can be manipulated. Furthermore, we'll uncover the deceptive tactics behind sneaky updates that deliver malicious payloads instead of legitimate fixes, and how stolen credentials are a gateway for attackers to impersonate legitimate users and systems. These sophisticated attacks are designed to look like the real deal, making them incredibly difficult to detect and even harder to defend against, and we're here to break it all down for you. #CyberSecurity #SupplyChainAttack #SoftwareSecurity #AppSec #DevSecOps #Malware #CredentialStealer #DependencyScanning #RuntimeSecurity #ZeroTrust #Infosec #SecureCoding #RedTeam #BlueTeam #CyberPodcast