Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

How Malicious Packages on npm Bypass Existing Security Tools

DEFCONConference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how threat actors exploit npm, the world's largest software registry owned by Microsoft, to distribute malware that bypasses conventional security measures in this technical deep-dive conference talk. Discover why npm's open and accessible nature makes it an attractive target for malicious actors, with recent studies showing that 98.5% of malicious software packages are hosted and delivered through the platform that processes 4.5 trillion package requests annually. Explore the specific techniques threat actors use to leverage npm's infrastructure and understand why traditional security tools including Software Composition Analysis (SCA), Static Application Security Testing (SAST), Endpoint Detection and Response (EDR), and antivirus solutions fail to protect against npm-based malware attacks.

Syllabus

DEF CON 33 - How malicious packages on npm bypass existing security tools - Paul McCarty

Taught by

DEFCONConference

Reviews

Start your review of How Malicious Packages on npm Bypass Existing Security Tools

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.