🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Supply Chain

Focus Area: 📦 Software Supply Chain Security
23
Total Entries
30
Contributors

Top Contributors

Hare Krishna Rai(4) Akhil Mahendra(3) Gaurav Joshi(3) Hritik Vijay(3) K v Prashant(3)

All Entries (23 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-11Tool demoBlackhat DepConfuse: Shielding Your Packages from Dependency Confusion Attacks Source Code Akhil Mahendra, Harsh Varagiya, Sourav Kumar, Akshansh Jaiswal#supply-chain#dependency-management#package-security+2
2025-12-11Tool demoBlackhat SupplyShield: Protecting Your Software Supply Chain Source Code Rahul Sunder, Yadhu Krishna M, Hritik Vijay, Sourav Kumar#supply-chain#sbom#software-composition-analysis+3
2025-12-10Tool demoBlackhat Catch the Flow: Securing CI/CD Workflows with Flowlyt Source Code Hare Krishna Rai, K v Prashant, Nandan Gupta#ci-cd#supply-chain#devsecops+1
2025-12-10Tool demoBlackhat SBOM Play Source Code Anant Shrivastava#sbom#supply-chain#vulnerability-assessment+1
2025-12-10Tool demoBlackhat Securing Secrets from Dev Machine to Deployments Using SLV Source Code Shibly Meeran, Sriram Krishnan, Keshav Kandasamy#devsecops#cicd-security#supply-chain
2025-10-10TalkC0c0n Ghosts in Your GitHub Actions and AI’s Hunt for Hidden Exploits Source Code Suchith Narayan#supply-chain#supply-chain-attack#devsecops+1
2025-08-06TalkBlackhat When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach Presentation Whitepaper Video Varun Sharma, Ashish Kurmi#ci-cd#incident-management#devsecops+2
2025-04-30TalkRsac Got Supply Pain? A Real-World Approach to Supply Chain SDL Video Mohit Arora, Richard Tonry#secure-development#devsecops#risk-management+4
2025-04-03TalkBlackhat Determining Exploitability of Vulnerabilities with SBOM and VEX Presentation Anusha Penumacha, Srinija Kammari#sbom#supply-chain#sca+1
2025-04-03Tool demoBlackhat SCAGoat - Exploiting Damn Vulnerable and Compromised SCA Application Source Code Hare Krishna Rai, Gaurav Joshi, K v Prashant#supply-chain#supply-chain-attack#sca+1
2025-04-03Tool demoBlackhat SupplyShield: Protecting your software supply chain Source Code Yadhu Krishna M, Akhil Mahendra, Hritik Vijay#supply-chain#sbom#sca+2
2024-12-11Tool demoBlackhat SCAGoat - Exploiting Damn Vulnerable SCA Application Source Code Hare Krishna Rai, Gaurav Joshi, K v Prashant#supply-chain#sca#software-composition-analysis
2024-11-16TalkC0c0n We got the Shiny SBoM; what next? Presentation Anant Shrivastava#sbom#supply-chain#supply-chain-security
2024-11-15TalkC0c0n [Yodha] SCAGoat - Software Composition Analysis (SCA) Vulnerability Exploration Tool Source Code Gaurav Joshi, Hare Krishna Rai#supply-chain#sca#software-composition-analysis
2023-12-06Tool demoBlackhat SupplyShield: Protecting your software supply chain Source Code Akhil Mahendra, Hritik Vijay#aws#supply-chain#sbom+2
2023-09-28TalkHackinparis How to have visibility and security OF CICD ecosystem Pramod Rana#cicd-security#devsecops#architecture+4
2023-08-06TalkC0c0n Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector Video Anshu Kumar, Pavan Sorab#devsecops#ci-cd#cicd-pipeline+2
2022-09-08TalkNullcon Hack the Source: Securing Open Source Software – One bug at a time Video Sandeep Singh, Laurie Mercer#open-source-security#supply-chain#code-review+4
2022-09-07TalkNullcon Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj Presentation Video Devdutt Patnaik, Ashish Bijlani#open-source-security#supply-chain#supply-chain-attack+3
2022-05-12Tool demoBlackhat Mitigating Open Source Software Supply Chain Attacks Source Code Ajinkya Rajput, Ashish Bijlani#open-source-security#supply-chain#supply-chain-attack+3
2021-11-13TalkC0c0n Third Party Risk Management Mahesh Kalyanaraman#risk-management#compliance-governance#supply-chain+2
2021-11-12TalkC0c0n 2021 Supply Chain Attacks Analysis Ajit Hatti#incident-management#risk-management#supply-chain+1
2018-08-10TalkDefcon AN OSINT APPROACH TO THIRD PARTY CLOUD SERVICE PROVIDER EVALUATION Presentation Video Lokesh Pidawekar#third-party-risk-management#supply-chain#vendor-security