<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Videos on</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/software-security/videos/</link><description>Recent content in Videos on</description><generator>Hugo -- gohugo.io</generator><language>en-US</language><lastBuildDate>Mon, 05 Sep 2022 08:49:15 +0000</lastBuildDate><atom:link href="https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/software-security/videos/index.xml" rel="self" type="application/rss+xml"/><item><title>WTF happened with the PyPI phishing attack?</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/software-security/videos/pypi/</link><pubDate>Mon, 01 Aug 2022 15:21:01 +0200</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/software-security/videos/pypi/</guid><description>On 8/24/22, PyPI, an open source repository of software for the Python programming language, announced an active phishing campaign targeting PyPI users. How did it happen and how can we prevent future attacks? Let’s recap: Before we cover the phishing attack, it’s worthwhile to mention that on July eighth, PyPI announced it would require the implementation of two-factor authentication (2FA) for projects deemed critical — that is, any project in the top 1% of downloads of the past 6 months.</description></item><item><title>WTF is a distroless container?</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/software-security/videos/distroless/</link><pubDate>Mon, 01 Aug 2022 15:21:01 +0200</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/software-security/videos/distroless/</guid><description>Have you heard of distroless container images? This video is going to break down what they are, how they work, and why they&amp;rsquo;re better.
The easiest way to explain what a distroless container image is and how it differs from a traditional fat container image is by starting with the fat container image, then we&amp;rsquo;ll point out the parts that aren&amp;rsquo;t necessary and how distroless images let you build smaller, leaner, more secure container images.</description></item><item><title>WTF is a Typo Squatting Attack?</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/software-security/videos/github-typosquatting/</link><pubDate>Mon, 01 Aug 2022 15:21:01 +0200</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/software-security/videos/github-typosquatting/</guid><description>Hi, I’m Dan Lorenc, CEO &amp; Co-founder of Chainguard and I’ve been working in the open source software supply chain security space for a long time. Today, we’re going to recap the massive typo squatting attack that was carried out against a bunch of open source projects on GitHub on August 3, 2022.
Typosquatting is a type of attack where an attacker changes the name of a real project subtly to make it look like that project but it&amp;rsquo;s not actually the same repository or package and it is really hard to detect because there are a lot of subtle ways to do it.</description></item><item><title>WTF is Sigstore?</title><link>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/software-security/videos/sigstore/</link><pubDate>Mon, 01 Aug 2022 15:21:01 +0200</pubDate><guid>https://deploy-preview-3155--ornate-narwhal-088216.netlify.app/software-security/videos/sigstore/</guid><description>Let’s talk about software supply chain security.
Vulnerabilities and attacks in software have been increasing in recent years, and the U.S. government recently passed a Bill in the House that would forbid the Department of Defense (DoD) from procuring any software applications that contain a single security vulnerability or CVE (short for common vulnerability or exposure). Attacks and other security issues can exist all across the software supply chain, from the dependencies or packages you leverage in your code, to the code you write, to your deployment and integration strategy, to your packaging.</description></item></channel></rss>