Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Will We Survive the Transitive Vulnerability Locusts?

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This Black Hat conference talk explores the critical issue of transitive vulnerabilities in software development. Discover research findings that quantify the risk of known vulnerabilities in modern applications and examine the prevalence of exploitable transitive dependencies in real-world scenarios. While individual vulnerabilities may pose minimal exploitation risk, learn how the cumulative effect of numerous transitive dependencies significantly amplifies security threats. Watch as the presenters demonstrate a proof-of-concept exploit for a real-world transitive dependency vulnerability, showing how attackers can compromise applications through these often-overlooked security gaps. Gain practical strategies for mitigating transitive dependency risks and effectively prioritizing them within your threat model. Presented by Eyal Paz, VP of Research at OX Security, and Liad Cohen, Data Scientist and Security Researcher at OX Security, this 29-minute presentation offers valuable insights for developers and security professionals concerned with the "most hated type of security issue."

Syllabus

Will We Survive the Transitive Vulnerability Locusts?

Taught by

Black Hat

Reviews

Start your review of Will We Survive the Transitive Vulnerability Locusts?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.