Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Dependency Hijacking Vulnerability in Microsoft Teams - Supply Chain Security Gaps

Linux Foundation via YouTube

Overview

Explore a real-life example of dependency hijacking in Microsoft Teams in this 56-minute Linux Foundation talk sponsored by Contrast Security. Delve into the intricacies of supply chain vulnerabilities as Contrast Security's Director of Security Research, Matt Austin, and Director of Enterprise Security, Adam Schaal, guide you through the process. Learn about various types of supply chain attacks, including hardware, software, and side-channel attacks, and understand their potential impact. Discover how supply chain vulnerabilities can be introduced and gain insights into protecting your infrastructure, SDLC, and code. Examine the broader implications of supply chain security and stay informed about recent developments in this critical area of cybersecurity.

Syllabus

Intro
WHAT IS A SUPPLY CHAIN?
DEVASTATING FOOD SHORTAGES
HOW DOES IT RELATE TO YOU?
FAMOUS HARDWARE SUPPLY CHAIN ATTACKS
FAMOUS SOFTWARE SUPPLY CHAIN ATTACKS
FAMOUS SIDE CHANNEL SUPPLY CHAIN ATTACKS
SCOPE TOO LARGE
HOW CAN SUPPLY CHAIN VULNS BE INTRODUCED...
HIJACKING DEPENDENCIES TO EXPLOIT MICROSOFT TEAMS
PROTECT YOUR INFRASTRUCTURE
PROTECT YOUR SDLC
PROTECT YOUR CODE
MOVEMENT IN THIS SPACE

Taught by

Linux Foundation

Reviews

Start your review of Dependency Hijacking Vulnerability in Microsoft Teams - Supply Chain Security Gaps

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.