When Your Security Scanner Becomes the Trojan Horse: The CERT-EU Supply Chain Breach
カートのアイテムが多すぎます
カートに追加できませんでした。
ウィッシュリストに追加できませんでした。
ほしい物リストの削除に失敗しました。
ポッドキャストのフォローに失敗しました
ポッドキャストのフォロー解除に失敗しました
-
ナレーター:
-
著者:
概要
What happens when the tool you download to find vulnerabilities becomes the vulnerability itself? We dissect the European Commission breach where attackers exfiltrated 91.7GB of sensitive data through Trivy, a trusted open-source security scanner. We walk through the anatomy of a supply chain poisoning and the three concrete controls that would have contained the blast radius..
In this episode of Cybersecurity Under Pressure, we break down the technical details behind this incident and translate them into actionable lessons for security teams, engineers, and business leaders.
Topics covered: supply chain attack, CERT-EU, Supply Chain Attack, Trivy, Open Source Security. Subscribe for weekly analysis of real cybersecurity incidents affecting OT, ICS, and critical infrastructure environments.
Keywords: supply chain attack, CERT-EU, Supply Chain Attack, Trivy, Open Source Security, Artifact Provenance, CI/CD Security, European Commission Breach, security, supply, chain, breach