Sunil Yadav retweetledi

We cover recon, developer compromise, dependency abuse, CI/CD compromise, malicious package injection, registry and artifact compromise, and container plus IaC poisoning, ending with a capstone kill chain and mitigation with TPRM.
Yes, Shai-Hulud 2.0 and variants are included.
Black Hat@BlackHatEvents
🚨 Ready to level up your cybersecurity skills? Join the "Attacking the Software Supply Chain" training at #BHASIA! 🌐 Dive into real-world attacks, hands-on exercises, and strategies to secure your supply chain. 📅 Learn more: bit.ly/4krgoHP
English






















