🧪 Experimental Feature

Focus Areas are an experimental feature that groups related content by tags. This page and its functionality may change as we refine the categorization system.

📦 Software Supply Chain Security

Security of software supply chains, including dependency management, SBOM, SCA, and third-party risk management

79
Contributors
30
Talks
21
Tool Demos
8
Panels

Top Contributors

Akhil Mahendra(7) Ajit Hatti(4) Akshansh Jaiswal(4) Hare Krishna Rai(4) Hritik Vijay(4)

Related Tags (14)

Show all 14 tags...

All Entries (59 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2026-03-01TalkNullcon When Your Package Manager Became a Weapon: Anatomy of the First Self-Replicating Supply Chain Worm Sudhanshu Dasgupta, Sahil Bansal#supply-chain-security#malicious-packages#package-security+1
2026-02-28PanelNullcon Supply Chain Chaos: Strengthening the Digital Ecosystem Beyond the Enterprise Mihirr P Thaker, Sumeet Khokhani, Ajit Hatti, Anant Shrivastava#supply-chain-security#third-party-risk#supply-chain-attack
2025-12-11Tool demoBlackhat DepConfuse: Shielding Your Packages from Dependency Confusion Attacks Source Code Akhil Mahendra, Harsh Varagiya, Sourav Kumar, Akshansh Jaiswal#supply-chain#dependency-management#package-security+2
2025-12-11Tool demoBlackhat SupplyShield: Protecting Your Software Supply Chain Source Code Rahul Sunder, Yadhu Krishna M, Hritik Vijay, Sourav Kumar#supply-chain#sbom#software-composition-analysis+3
2025-12-10Tool demoBlackhat SBOM Play Source Code Anant Shrivastava#sbom#supply-chain#vulnerability-assessment+1
2025-12-10Tool demoBlackhat Catch the Flow: Securing CI/CD Workflows with Flowlyt Source Code Hare Krishna Rai, K v Prashant, Nandan Gupta#ci-cd#supply-chain#devsecops+1
2025-12-10Tool demoBlackhat Securing Secrets from Dev Machine to Deployments Using SLV Source Code Shibly Meeran, Sriram Krishnan, Keshav Kandasamy#devsecops#cicd-security#supply-chain
2025-10-10TalkC0c0n Ghosts in Your GitHub Actions and AI’s Hunt for Hidden Exploits Source Code Suchith Narayan#supply-chain#supply-chain-attack#devsecops+1
2025-08-07Tool demoBlackhat Kubernetes Security Scanner Source Code Video Krishna Priya#kubernetes#cloud-workload-protection#container-security+4
2025-08-06TalkBlackhat When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach Presentation Whitepaper Video Varun Sharma, Ashish Kurmi#ci-cd#incident-management#devsecops+2
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Video Mohit Arora, Richard Tonry#secure-development#devsecops#risk-management+4
2025-04-03Tool demoBlackhat SupplyShield: Protecting your software supply chain Source Code Yadhu Krishna M, Akhil Mahendra, Hritik Vijay#supply-chain#sbom#sca+2
2025-04-03TalkBlackhat Determining Exploitability of Vulnerabilities with SBOM and VEX Presentation Anusha Penumacha, Srinija Kammari#sbom#supply-chain#sca+1
2025-04-03Tool demoBlackhat SCAGoat - Exploiting Damn Vulnerable and Compromised SCA Application Source Code Hare Krishna Rai, Gaurav Joshi, K v Prashant#supply-chain#supply-chain-attack#sca+1
2025-03-02TalkNullcon Securing the chains: Building defensive layers for software supply chains Video Yadhu Krishna M, Akhil Mahendra, Hritik Vijay#blueteam#container-security#sbom+3
2025-03-02PanelNullcon Enterprise Readiness for Supply Chain Attacks Sanjay Bahl, Cassie Crossley#supply-chain-security#supply-chain-attack#third-party-risk-management+4
2025-03-02PanelNullcon Modernizing Security Architecture: Platforms or Best-of-Breed, What Works Best? Ketan Vyas, Prajal Kulkarni, Satyavathi Divadari, Srihari Kotni#security-strategy#threat-modeling#zero-trust+3
2025-03-02TalkNullcon Satellite Communications: Analyzing and Protecting Space-Based Assets Video Drishti Jain#network-pentesting#ics-security#encryption+4
2024-12-11Tool demoBlackhat SCAGoat - Exploiting Damn Vulnerable SCA Application Source Code Hare Krishna Rai, Gaurav Joshi, K v Prashant#supply-chain#sca#software-composition-analysis
2024-11-16TalkC0c0n We got the Shiny SBoM; what next? Presentation Anant Shrivastava#sbom#supply-chain#supply-chain-security
2024-11-16TalkC0c0n Access for Sale: Inside the World of Ransomware Affiliates and Initial Access Brokers Nihar Sawant, Jaydev Joshi#ransomware#phishing#supply-chain-security
2024-11-15TalkC0c0n [Yodha] SCAGoat - Software Composition Analysis (SCA) Vulnerability Exploration Tool Source Code Gaurav Joshi, Hare Krishna Rai#supply-chain#sca#software-composition-analysis
2024-10-02TalkVirusbulletin From code to crime: exploring threats in GitHub Codespaces Presentation Whitepaper Video Nitesh Surana, Jaromir Horejsi#cloud-pentesting#supply-chain-security#exploitation
2024-08-07Tool demoBlackhat TrafficWardenX: OpenWRT Security & Monitoring Sampad Adhikary, Tripti Sharma#openwrt#network-monitoring#security-tools+3
2024-04-19Tool demoBlackhat vet: Policy Driven vetting of Open Source Software Components Source Code Abhisek Datta#supply-chain-security#open-source-security#dependency-management+1
2023-12-06Tool demoBlackhat SupplyShield: Protecting your software supply chain Source Code Akhil Mahendra, Hritik Vijay#aws#supply-chain#sbom+2
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Rana#cicd-security#devsecops#architecture+4
2023-08-10TalkDefcon Attacking Vehicle Fleet Management Systems Presentation Video Yashin Mehaboobe#automotive-cybersecurity#ics-security#embedded-systems+4
2023-08-09Tool demoBlackhat CASPR - Code Trust Auditing Framework Source Code Ajit Hatti#secure-coding#code-review#secure-development+1
2023-08-07PanelC0c0n CII Protection: How can the c0c0n community contribute ? Navin Kumar Singh#security-strategy#open-source-security#threat-modeling
2023-08-06TalkC0c0n Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector Video Anshu Kumar, Pavan Sorab#devsecops#ci-cd#cicd-pipeline+2
2023-08-06TalkC0c0n Securing the Future: Addressing Cybersecurity Challenges in the Age of 5G Video Altaf Shaik#zero-trust#supply-chain-security#attack-surface+4
2023-03-23TalkInsomnihack How to have visibility and security OF CICD ecosystem Video Pramod Rana#ci-cd#devsecops#supply-chain-security+3
2022-12-07Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#asset-inventory+1
2022-09-08TalkNullcon Hack the Source: Securing Open Source Software – One bug at a time Video Sandeep Singh, Laurie Mercer#open-source-security#supply-chain#code-review+4
2022-09-07TalkNullcon Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj Presentation Video Devdutt Patnaik, Ashish Bijlani#open-source-security#supply-chain#supply-chain-attack+3
2022-09-06PanelNullcon IoT Supply Chain Blues and the way forward Video Aseem Jakhar, Kedar Sovani, Anantharaman Iyer, Suvabrata Sinha, Sudarshan Rajagopal, Sachin Jain#iot-device-management#iot-pentesting#supply-chain-security+3
2022-08-11Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#asset-inventory+4
2022-08-10Tool demoBlackhat CASPR - Code Trust Audit Framework Source Code Ajit Hatti#secure-coding#secure-development#security-tools+3
2022-05-12Tool demoBlackhat Mitigating Open Source Software Supply Chain Attacks Source Code Ajinkya Rajput, Ashish Bijlani#open-source-security#supply-chain#supply-chain-attack+3
2022-05-12Tool demoBlackhat Patronus: Swiss Army Knife SAST Toolkit Source Code Akhil Mahendra, Akshansh Jaiswal, Ashwin Shenoi#sast#software-composition-analysis#secure-development+1
2021-11-13TalkC0c0n Third Party Risk Management Mahesh Kalyanaraman#risk-management#compliance-governance#supply-chain+2
2021-11-12TalkC0c0n 2021 Supply Chain Attacks Analysis Ajit Hatti#incident-management#risk-management#supply-chain+1
2020-12-10TalkBlackhat Effective Vulnerability Discovery with Machine Learning Presentation Video Asankhaya Sharma, Ming Yi Ang#security-assessment#machine-learning#software-composition-analysis+4
2020-10-02Tool demoBlackhat Phishing Simulation Assessment Source Code Jyoti Raval#phishing#blueteam#social-engineering+3
2020-03-07PanelNullcon Supply Chain Security In Critical Infrastructure Systems Video Manish Tiwari, Suchit Mishra, Faruk Kazi, Cristofaro Mune#supply-chain-attack#supply-chain-security#critical-infrastructure+3
2019-08-10Tool demoDefcon Local Sheriff Source Code Konark Modi#reconnaissance#blueteam#data-leak+3
2018-09-27TalkRootcon Bug Bounty Hunting on Steroids Presentation Video Anshuman Bhartiya#bug-hunting#bug-bounty#security-tools+3
2018-08-11Tool demoDefcon HealthyPi—Connected Health Source Code Ashwin Whitchurch#raspberry-pi#hardware-embedded#embedded-systems+4
2018-08-10TalkDefcon Building visualisation platforms for OSINT data using open source solutions Video Bharath Kumar, Madhu Akula#security-analytics#threat-hunting#osint+3
2018-08-10TalkDefcon AN OSINT APPROACH TO THIRD PARTY CLOUD SERVICE PROVIDER EVALUATION Presentation Video Lokesh Pidawekar#third-party-risk-management#supply-chain#vendor-security
2018-03-03PanelNullcon Forensic Challenges and Road Ahead Video Manu Zacharia, Brijesh Singh, Sanjay Bahl, Vladimir Katalov#data-leak#data-protection#forensics+4
2018-03-01TalkNullcon Software Supply Chain Cyberattack Presentation Samiran Ghatak#red-teaming#cyberattack#supply-chain-attack+1
2015-09-24TalkAppsecusa QARK: Android App Exploit and SCA Tool Video Tushar Dalvi, Tony Trummer#android-security#sca#software-composition-analysis
2015-02-07PanelNullcon Startup panel – Make in India Aseem Jakhar, Radha Shelat, Sumit D Chowdhury, Shomiron Das Gupta, Sastry Tumuluri, Shiju Sathyadevan#security-strategy#cybersecurity-framework#business-resilience+4
2013-08-16TalkUsenix Building Securable Infrastructure: Open-Source Private Clouds Video Pravir Chandra#cloud-pentesting#architecture#open-source-security
2012-02-15TalkNullcon Open source revolution :Need Hardware - Software marriage Venkatesh#embedded-systems#hardware-embedded#open-source-security
2010-12-04TalkClubhack Ultimate Pen Test – Compromising a highly secure environment Presentation Nikhil Mittal#security-assessment#social-engineering#application-pentesting+4
2009-12-05TalkClubhack Indian IT Act 2000 vs 2009 Presentation Rohas Nagpal#cyber-law#embedded-systems#firmware-analysis+4