Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Living Off the Pipeline - Advanced Supply Chain Attacks in CI/CD Build Environments

NorthSec via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore advanced supply chain attack methodologies targeting CI/CD build pipelines in this 28-minute conference talk from NorthSec 2025. Discover how threat actors exploit legitimate build tools to execute sophisticated attacks similar to the XZ compression library compromise that targeted OpenSSH in 2024. Learn about an adapted MITRE ATT&CK framework specifically designed for CI/CD environments and understand how adversaries can "Live Off the Pipeline" by abusing build infrastructure. Examine real-world case studies including forensic analysis of the Kong Kubernetes Ingress Controller and Ultralytics YOLOv5 ML library compromises to understand how attackers exploit build pipelines, escalate privileges, and maintain persistence. Gain practical methods for predicting and identifying supply chain threats before they materialize by mapping build pipeline tactics to the adapted ATT&CK model. Develop proactive defense strategies to counter advanced supply chain attacks and protect against adversaries seeking to exploit CI/CD infrastructure as demonstrated in recent high-profile compromises.

Syllabus

NorthSec 2025 - Francois Proulx - Living Off the Pipeline

Taught by

NorthSec

Reviews

Start your review of Living Off the Pipeline - Advanced Supply Chain Attacks in CI/CD Build Environments

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.