| 2025-12-11 | Tool demo | Blackhat |
DepConfuse: Shielding Your Packages from Dependency Confusion Attacks
| Akhil Mahendra, Harsh Varagiya, Sourav Kumar, Akshansh Jaiswal | #supply-chain#dependency-management#package-security+2 |
| 2025-12-11 | Tool demo | Blackhat |
SupplyShield: Protecting Your Software Supply Chain
| Rahul Sunder, Yadhu Krishna M, Hritik Vijay, Sourav Kumar | #supply-chain#sbom#software-composition-analysis+3 |
| 2025-12-10 | Tool demo | Blackhat |
Catch the Flow: Securing CI/CD Workflows with Flowlyt
| Hare Krishna Rai, K v Prashant, Nandan Gupta | #ci-cd#supply-chain#devsecops+1 |
| 2025-12-10 | Tool demo | Blackhat |
SBOM Play
| Anant Shrivastava | #sbom#supply-chain#vulnerability-assessment+1 |
| 2025-12-10 | Tool demo | Blackhat |
Securing Secrets from Dev Machine to Deployments Using SLV
| Shibly Meeran, Sriram Krishnan, Keshav Kandasamy | #devsecops#cicd-security#supply-chain |
| 2025-10-10 | Talk | C0c0n |
Ghosts in Your GitHub Actions and AI’s Hunt for Hidden Exploits
| Suchith Narayan | #supply-chain#supply-chain-attack#devsecops+1 |
| 2025-08-06 | Talk | Blackhat |
When ‘Changed Files’ Changed Everything: Uncovering and Responding to the tj-actions Supply Chain Breach
| Varun Sharma, Ashish Kurmi | #ci-cd#incident-management#devsecops+2 |
| 2025-04-30 | Talk | Rsac |
Got Supply Pain? A Real-World Approach to Supply Chain SDL
| Mohit Arora, Richard Tonry | #secure-development#devsecops#risk-management+4 |
| 2025-04-03 | Talk | Blackhat |
Determining Exploitability of Vulnerabilities with SBOM and VEX
| Anusha Penumacha, Srinija Kammari | #sbom#supply-chain#sca+1 |
| 2025-04-03 | Tool demo | Blackhat |
SCAGoat - Exploiting Damn Vulnerable and Compromised SCA Application
| Hare Krishna Rai, Gaurav Joshi, K v Prashant | #supply-chain#supply-chain-attack#sca+1 |
| 2025-04-03 | Tool demo | Blackhat |
SupplyShield: Protecting your software supply chain
| Yadhu Krishna M, Akhil Mahendra, Hritik Vijay | #supply-chain#sbom#sca+2 |
| 2024-12-11 | Tool demo | Blackhat |
SCAGoat - Exploiting Damn Vulnerable SCA Application
| Hare Krishna Rai, Gaurav Joshi, K v Prashant | #supply-chain#sca#software-composition-analysis |
| 2024-11-16 | Talk | C0c0n |
We got the Shiny SBoM; what next?
| Anant Shrivastava | #sbom#supply-chain#supply-chain-security |
| 2024-11-15 | Talk | C0c0n |
[Yodha] SCAGoat - Software Composition Analysis (SCA) Vulnerability Exploration Tool
| Gaurav Joshi, Hare Krishna Rai | #supply-chain#sca#software-composition-analysis |
| 2023-12-06 | Tool demo | Blackhat |
SupplyShield: Protecting your software supply chain
| Akhil Mahendra, Hritik Vijay | #aws#supply-chain#sbom+2 |
| 2023-09-28 | Talk | Hackinparis |
How to have visibility and security OF CICD ecosystem
| Pramod Rana | #cicd-security#devsecops#architecture+4 |
| 2023-08-06 | Talk | C0c0n |
Taking a Closer Look at CI/CD Pipeline Logs: Extracting Security-Related Information with Build Inspector
| Anshu Kumar, Pavan Sorab | #devsecops#ci-cd#cicd-pipeline+2 |
| 2022-09-08 | Talk | Nullcon |
Hack the Source: Securing Open Source Software – One bug at a time
| Sandeep Singh, Laurie Mercer | #open-source-security#supply-chain#code-review+4 |
| 2022-09-07 | Talk | Nullcon |
Unearthing Malicious And Other “Risky” Open-Source Packages Using Packj
| Devdutt Patnaik, Ashish Bijlani | #open-source-security#supply-chain#supply-chain-attack+3 |
| 2022-05-12 | Tool demo | Blackhat |
Mitigating Open Source Software Supply Chain Attacks
| Ajinkya Rajput, Ashish Bijlani | #open-source-security#supply-chain#supply-chain-attack+3 |
| 2021-11-13 | Talk | C0c0n |
Third Party Risk Management
| Mahesh Kalyanaraman | #risk-management#compliance-governance#supply-chain+2 |
| 2021-11-12 | Talk | C0c0n |
2021 Supply Chain Attacks Analysis
| Ajit Hatti | #incident-management#risk-management#supply-chain+1 |
| 2018-08-10 | Talk | Defcon |
AN OSINT APPROACH TO THIRD PARTY CLOUD SERVICE PROVIDER EVALUATION
| Lokesh Pidawekar | #third-party-risk-management#supply-chain#vendor-security |