RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
AppSec & Supply Chain SecurityJuly 31, 2024

8 supply chain security talks you don't want to miss at Black Hat

Software supply chain attacks have been increasing — and more difficult to catch. These talks at Black Hat 2024 will help your team stay ahead of threats.

Kate Tenerowicz black white headshot
Kate TenerowiczKate Tenerowicz
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
scrabble letters spelling out threat

Numerous reports have highlighted the increased number of software supply chain attacks in recent years. The Verizon Business Data Breach and Investigation Report (DBIR) 2024 concluded that breaches stemming from third-party software development organizations played a role in 15% of the more than 10,000 data breaches that Verizon documented, a 68% jump from last year. Additionally, ReversingLabs' The "State of Software Supply Chain Security 2024" noted that incidents of malicious packages found on popular open-source package managers have increased by 1,300% over the past three years (2020–2023).

It is no surprise, then, that many of the talks to be presented at Black Hat USA 2024 will discuss this growing attack surface. Here are eight handpicked software supply chain security talks happening in Las Vegas next month that security leaders should not miss. They feature the ways in which AI can help or hinder software security, threats to CI/CD processes, the impact of stolen software credentials, and more.

Come visit the team and learn more about what we have planned: RL at Black Hat 2024

We R in a Right Pickle with All These Insecure Serialization Formats

Wednesday, August 7, 2024, 11:20 am–12:00 pm

Presented by Kasimir Schulz, principal security researcher at HiddenLayer, and the company's vice president of research, Tom Bonner, this talk will focus on Python, namely the pickle module, a sterilization format in the Python ecosystem, which has become synonymous with insecurity. However, this talk deviates from normal discourse around pickle, focusing not on the format itself, but on the main root of the problem: the use of bytecode-driven serialization formats. Attend this talk to hear why these formats cause such insecurity via a deep-dive into RDS, R’s sterilization format, including a look at a critical code execution vulnerability found within that could lead to a wide-scale software supply chain attack.

15 Ways to Break Your Copilot

Wednesday, August 7, 2024, 11:20 am–12:00 pm

Microsoft Copilot Studio is the technology that powers Microsoft's copilots (AI assistants), and the platform behind custom copilots built in the enterprise. The promise behind this technology is that every copilot build is secure, which results in the assumption that every bot will be secure by default. This talk, by Michael Bargury, will answer the question: Does this promise and inherent assumption hold up under scrutiny? Spoiler: It does not. Attend this talk to find out why and how to build copilots that mitigate such failures.

From HAL to HALT: Thwarting Skynet's Siblings in the GenAI Coding Era

Wednesday, August 7, 2024, 1:30 pm–2:10 pm

Chris Wysopal, CTO and co-founder of Veracode, will explore the impact of GenAI on software development and its implications for cybersecurity in this Black Hat session. With GenAI, developers are shifting from doing traditional code reuse to generating new code snippets by GenAI prompt, signifying a huge change in software development dynamics. This change also means new AppSec challenges. Come to this talk to learn more about what these challenges are, why they exist, and how to address them.

Self-Hosted GitHub CI/CD Runners: Continuous Integration, Continuous Destruction

Wednesday, August 7, 2024, 1:30 pm–2:10 pm

There is currently a systemic lack of awareness around self-hosted CI/CD agent security. Organizations can speed up the development lifecycle by using CI/CD systems, but they make fundamental configuration errors, especially when using self-hosted build agents. These errors expose organizations, and any dependents, to potentially high-impact supply chain attacks. Two security researchers, Adnan Khan and John Stawinski, will address this insecurity in their talk and answer the questions: How can attackers exploit your organization's CI/CD pipelines? And how can you defend against these attacks?

PyLingual: A Python Decompilation Framework for Evolving Python Versions

Wednesday, August 7, 2024, 2:30 pm–3:00 pm

Python is a popular choice for creating malware, so much so that Python temporarily stopped the registration of new users in March 2024. However, what makes it a great choice for malicious campaigns (ease of development, wide user base, prebuilt modules, and multiplatform compatibility) also makes it popular within the cyber-community. Such popularity increases the demand for Python decompilers, but efforts to maintain these types of tools are hindered by Python's unstable bytecode specification, leaving the demand unmet. This presentation from nine researchers will attempt to address this issue by integrating natural language processing (NLP) techniques with classical programming language (PL) theory to create a Python decompiler that can function on Python with minimal human maintenance effort.

Isolation or Hallucination? Hacking AI Infrastructure Providers for Fun and Weights

Wednesday, August 7, 2024, 4:20 pm–5:00 pm

Hillai Ben-Sasson and Sagi Tzadik, two security researchers from Wiz, will present the result of their attempts to answer the question: How susceptible are AI-as-a-service systems to attacks that could compromise their security and expose sensitive customer data? The result takes the form of a novel technique that gives cross-tenant access to customers' private data, including private models, weights, datasets, and even user prompts. The attack also can achieve global write privileges, allowing for the deployment of a backdoor to launch software supply chain attacks. This talk is a must in the growing age of AI.

Flipping Bits: Your Credentials Are Certainly Mine

Thursday, August 8, 2024, 11:20 am–12:00 pm

This talk introduces Certainly, a pioneering offensive/defensive tool. Security researchers STÖK and Joona Hoikkala designed it to simplify long-term passive credential harvesting and payload deployment of bitflip-typosquatting domains. Bit flipping is the process of changing a single bit from 1 to 0 or 0 to 1, which results in a valid domain that is off by one character. For example: Google could become “woogle,” if bit-flipped. The speakers will revisit and expand on previously published bit-flip research before showcasing how Certainly can be used in your next red-team engagement.

Mainstage: Let Me Tell You a Story: Technology and the 4 Vs

Thursday, August 8, 2024, 12:15 pm–12:40 pm

Join the director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA), Jen Easterly, for a quick 25-minute talk about technology and its future, one that’s focused on the betterment of cybersecurity, both within and outside critical infrastructure areas. The CISA has already taken some steps toward this future through its software supply chain security policies, such as Secure by Design. Find out what else is in the works by attending the talk.

Looking for something to do between talks? Come see RL at Booth #2660

Security leaders can stop by ReversingLabs' booth on the exhibition floor to chat with our experts about our powerful software supply chain security solution, RL Spectra Assure. Plus, we’ll have cookies (the good kind!).

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:AppSec & Supply Chain Security

More Blog Posts

AI coding racing

Can AppSec keep pace with AI coding?

AI lets software teams generate code at a rate faster than security can validate it. One way to win the race: more AI.

Learn More about Can AppSec keep pace with AI coding?
Can AppSec keep pace with AI coding?
Finger on map

LLMmap puts its finger on ML attacks

Researchers show how LLM fingerprinting can be used to automate generation of customized attacks.

Learn More about LLMmap puts its finger on ML attacks
LLMmap puts its finger on ML attacks
Vibeware bad vibes

Vibeware: More than bad vibes for AppSec

Threat actors are leveraging the freewheeling vibe-coding trend to deliver malicious software at scale.

Learn More about Vibeware: More than bad vibes for AppSec
Vibeware: More than bad vibes for AppSec
CRA accelerates advantage

The CRA is coming: Are you ready?

Here's how the EU's Cyber Resilience Act will reshape the software industry — and how that accelerates advantages.

Learn More about The CRA is coming: Are you ready?
The CRA is coming: Are you ready?

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top