Supply Chain Attacks

3 videos across 3 channels

A growing threat for developers, supply chain attacks exploit dependencies and release workflows to breach systems. The coverage emphasizes a two-layer defense—limiting exposure and reducing damage—with practical config tips and tooling to harden supply chains. Cases like Axios’ malicious dependency in release branches, Laravel’s response to pin safe versions and disable script execution, and a major Python package breach that exfiltrated credentials illustrate the breadth of risk across open source, ecosystems, and AI tooling.

Protecting against supply chain attacks - full guide thumbnail

Protecting against supply chain attacks - full guide

The video explains why supply chain attacks are a growing threat for developers and presents concrete two layered defens

00:20:36
A bad day to use python thumbnail

A bad day to use python

A dramatic overview of a major security breach where a popular Python package was compromised, enabling attackers to exf

00:08:38