Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by the2030.cloud Podcast and The2030.cloud Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by the2030.cloud Podcast and The2030.cloud Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Supply Chain Security [Tech Ops]

17:17
 
Share
 

Manage episode 440939602 series 1558354
Content provided by the2030.cloud Podcast and The2030.cloud Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by the2030.cloud Podcast and The2030.cloud Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
In this episode, we dive deep into a recent and highly sophisticated SSH intrusion attack that was discovered in the Linux kernel. We'll discuss how the attackers were able to inject a backdoor into a critical compression library, leveraging social engineering tactics to become a trusted maintainer over several years. The attack was designed to bypass security checks and evade detection, even from advanced techniques like eBPF monitoring. We'll explore the technical details of how the backdoor was triggered, the potential impact on various Linux distributions, and the broader implications for software supply chain security. This incident highlights the challenges of maintaining trust in open-source projects and the need for robust security measures to protect critical infrastructure. Join us as we unpack this fascinating case and consider the lessons it holds for the future of secure software development.
  continue reading

505 episodes

Artwork

Supply Chain Security [Tech Ops]

cloud2030

28 subscribers

published

iconShare
 
Manage episode 440939602 series 1558354
Content provided by the2030.cloud Podcast and The2030.cloud Podcast. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by the2030.cloud Podcast and The2030.cloud Podcast or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
In this episode, we dive deep into a recent and highly sophisticated SSH intrusion attack that was discovered in the Linux kernel. We'll discuss how the attackers were able to inject a backdoor into a critical compression library, leveraging social engineering tactics to become a trusted maintainer over several years. The attack was designed to bypass security checks and evade detection, even from advanced techniques like eBPF monitoring. We'll explore the technical details of how the backdoor was triggered, the potential impact on various Linux distributions, and the broader implications for software supply chain security. This incident highlights the challenges of maintaining trust in open-source projects and the need for robust security measures to protect critical infrastructure. Join us as we unpack this fascinating case and consider the lessons it holds for the future of secure software development.
  continue reading

505 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Listen to this show while you explore
Play