spaceship-evocative cluster of black and red cubes

What You Need to Know: How to Combat the IconBurst Software Supply Chain Attack

How to vet open source packages for malicious intent

deminar title on laptop

ReversingLabs recently uncovered a major software supply chain attack, distributed by NPM, that has resulted in malicious code being planted in mobile applications, websites and desktop applications that may number in the hundreds or even thousands. In this live demonstration, ReversingLabs Chief Software Architect and Co-Founder Tomislav Pericin gave a detailed overview of the IconBurst attack.

In this deminar, you’ll learn:
• The nature and virility of the threat
• Business and technical implications for development organizations
• How to determine if you are using a compromised package and what to do about it
• How to prevent similar attacks in the future

WATCH THE DEMINAR
Back to Top