YoVDO

Dependency Hijacking Vulnerability in Microsoft Teams - Supply Chain Security Gaps

Offered By: Linux Foundation via YouTube

Tags

Software Supply Chain Security Courses Cybersecurity Courses Microsoft Teams Courses Side Channel Attacks Courses Secure Software Development Courses Vulnerability Analysis Courses Supply Chain Attacks Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a real-life example of dependency hijacking in Microsoft Teams in this 56-minute Linux Foundation talk sponsored by Contrast Security. Delve into the intricacies of supply chain vulnerabilities as Contrast Security's Director of Security Research, Matt Austin, and Director of Enterprise Security, Adam Schaal, guide you through the process. Learn about various types of supply chain attacks, including hardware, software, and side-channel attacks, and understand their potential impact. Discover how supply chain vulnerabilities can be introduced and gain insights into protecting your infrastructure, SDLC, and code. Examine the broader implications of supply chain security and stay informed about recent developments in this critical area of cybersecurity.

Syllabus

Intro
WHAT IS A SUPPLY CHAIN?
DEVASTATING FOOD SHORTAGES
HOW DOES IT RELATE TO YOU?
FAMOUS HARDWARE SUPPLY CHAIN ATTACKS
FAMOUS SOFTWARE SUPPLY CHAIN ATTACKS
FAMOUS SIDE CHANNEL SUPPLY CHAIN ATTACKS
SCOPE TOO LARGE
HOW CAN SUPPLY CHAIN VULNS BE INTRODUCED...
HIJACKING DEPENDENCIES TO EXPLOIT MICROSOFT TEAMS
PROTECT YOUR INFRASTRUCTURE
PROTECT YOUR SDLC
PROTECT YOUR CODE
MOVEMENT IN THIS SPACE


Taught by

Linux Foundation

Tags

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera