Vandana Verma

Walking into the era of Supply Chain Risks

Your application is 90% open-source code, making it a prime target. See live hacks that exploit common dependencies and learn how to build a secure pipeline.

Walking into the era of Supply Chain Risks
#1about 4 minutes

Developers as an unintentional malware distribution vehicle

Recent incidents like the event-stream package compromise show how attackers can turn developers into a distribution channel for malware.

#2about 4 minutes

The hidden risks of open-source dependencies

Vulnerabilities in common dependencies, like Apache Struts which led to the Equifax breach, highlight the danger of unmanaged open-source code.

#3about 4 minutes

Defining the modern software supply chain

The software supply chain mirrors a manufacturing process, and attackers exploit its weakest links to create cascading failures.

#4about 4 minutes

Common attack vectors and the zero trust principle

Attacks like dependency confusion and prototype pollution, exemplified by the SolarWinds incident, necessitate a zero trust security model.

#5about 4 minutes

Building a foundation for pipeline security

Secure your development pipeline by using frameworks from OpenSSF, implementing SBOMs, and securing code, containers, and secrets.

#6about 4 minutes

Demo: Bypassing sanitization with prototype pollution

A practical demonstration shows how prototype pollution can bypass input validation in a Node.js application by passing an array instead of a string.

#7about 3 minutes

Demo: Exploiting the Log4Shell vulnerability

This live hacking demo shows how the Log4j (Log4Shell) vulnerability allows an attacker to achieve remote code execution on a vulnerable server.

#8about 2 minutes

Demo: Remote code execution via a Python dependency

A vulnerable version of the Python Celery library is exploited to achieve remote code execution and exfiltrate server information.

#9about 1 minute

Fostering a developer-first security culture

The key to better security is creating a developer-friendly environment and engaging with communities like OWASP to stay informed.

#10about 8 minutes

Q&A: Career advice for aspiring security professionals

The speaker shares her career journey, tips for students entering cybersecurity, and thoughts on social engineering and learning resources.

Related jobs
Jobs that call for the skills explored in this talk.

d

Saby Company
Delebio, Italy

Junior

test

Milly
Vienna, Austria

Intermediate

test

Milly
Vienna, Austria

Intermediate

Featured Partners

Related Articles

View all articles
BB
Benedikt Bischof
Walking Into The Era of Supply Chain Risks
Welcome to this issue of the WeAreDevelopers Live Talk series. This article recaps an interesting talk by Vandana Verma who introduced the audience interesting topic of supply chain risks.About the Speaker:Vandana is Security Solutions Architect at S...
Walking Into The Era of Supply Chain Risks
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?
CH
Chris Heilmann
Exploring AI: Opportunities and Risks for Developers
In today's rapidly evolving tech landscape, the integration of Artificial Intelligence (AI) in development presents both exciting opportunities and notable risks. This dynamic was the focus of a recent panel discussion featuring industry experts Kent...
Exploring AI: Opportunities and Risks for Developers

From learning to earning

Jobs that call for the skills explored in this talk.

DevSecOps

DevSecOps

Devsecops

40-60K
DevOps
Docker
Jenkins
Openshift
+3