<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1076912843267184&amp;ev=PageView&amp;noscript=1">

What You Need to Know: How to Combat the IconBurst Software Supply Chain Attack

How to vet open source packages for malicious intent

IconBurst Deminar On-Demand

ReversingLabs recently uncovered a major software supply chain attack, distributed by NPM, that has resulted in malicious code being planted in mobile applications, websites and desktop applications that may number in the hundreds or even thousands. In this live demonstration, ReversingLabs Chief Software Architect and Co-Founder Tomislav Pericin gave a detailed overview of the IconBurst attack.

In this deminar, you’ll learn:
The nature and virility of the threat
Business and technical implications for development organizations
How to determine if you are using a compromised package and what to do about it
How to prevent similar attacks in the future

Watch the Deminar