Vandana Verma Sehgal
Stranger Danger: Your Java Attack Surface Just Got Bigger
#1about 3 minutes
How developers can become malware distribution vehicles
The event-stream incident illustrates how attackers can inject malware into popular open source packages by gaining maintainer trust.
#2about 1 minute
Understanding your application's true composition
Applications are composed of 80-90% open source code, making dependency security a critical concern for developers.
#3about 1 minute
When attackers target the developer's own tools
A command injection flaw in a popular VS Code repository shows how CI/CD pipelines and development tools can become attack vectors.
#4about 4 minutes
The challenge of unfixed vulnerabilities in open source
A cross-site scripting (XSS) vulnerability in a popular markdown parser remained unpatched for a year, highlighting the risks of relying on unmaintained packages.
#5about 6 minutes
Human factors in open source supply chain risk
Weak credentials on maintainer accounts, long-hidden bugs like the sudo vulnerability, and maintainers unpublishing their own packages (colors.js, faker.js) create significant ecosystem risks.
#6about 8 minutes
Anatomy of the Log4Shell (Log4j) vulnerability
Log4Shell allows remote code execution (RCE) by manipulating log messages, demonstrating how a ubiquitous logging library can become a critical security failure.
#7about 13 minutes
Live hack: Bypassing sanitization with type confusion
This demo shows how an Express.js application's XSS sanitization can be bypassed by passing an array instead of a string, causing a type confusion vulnerability.
#8about 11 minutes
Live hack: Recreating the Apache Struts vulnerability
A demonstration of a remote code execution (RCE) vulnerability in an older version of Apache Struts, similar to the one that led to the Equifax breach.
#9about 30 minutes
Hands-on lab: Executing a Log4Shell exploit
A step-by-step walkthrough of exploiting the Log4Shell vulnerability by setting up a malicious server and a vulnerable client to achieve remote code execution.
#10about 8 minutes
How to shift left with a security champions program
To manage modern security risks, organizations should adopt a 'shift left' mindset and empower developers through a structured security champions program.
#11about 27 minutes
Q&A on social engineering and a career in security
The speaker answers audience questions about social engineering, the role of QA in security, and her personal career path from developer to cybersecurity leader.
Related jobs
Jobs that call for the skills explored in this talk.
VECTOR Informatik
Stuttgart, Germany
Senior
Kubernetes
Terraform
+1
ROSEN Technology and Research Center GmbH
Osnabrück, Germany
Senior
TypeScript
React
+3
Matching moments
01:06 MIN
Malware campaigns, cloud latency, and government IT theft
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
03:45 MIN
Preventing exposed API keys in AI-assisted development
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
05:01 MIN
Comparing the security models of browsers and native apps
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
05:55 MIN
The security risks of AI-generated code and slopsquatting
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
05:32 MIN
Getting hired by contributing to open source projects
Devs vs. Marketers, COBOL and Copilot, Make Live Coding Easy and more - The Best of LIVE 2025 - Part 3
07:39 MIN
Prompt injection as an unsolved AI security problem
AI in the Open and in Browsers - Tarek Ziadé
03:31 MIN
The value of progressive enhancement and semantic HTML
WeAreDevelopers LIVE – You Don’t Need JavaScript, Modern CSS and More
02:49 MIN
Using AI to overcome challenges in systems programming
AI in the Open and in Browsers - Tarek Ziadé
Featured Partners
Related Videos
Walking into the era of Supply Chain Risks
Vandana Verma
The attacker's footprint
Antonio de Mello & Amine Abed
Hack-Proof The Node.js runtime: The Mechanics and Defense of Path Traversal Attacks
Sonya Moisset
Vulnerable VS Code extensions are now at your front door
Raul Onitza-Klugman & Kirill Efimov
Typed Security: Preventing Vulnerabilities By Design
Michael Koppmann
What The Hack is Web App Sec?
Jackie
You click, you lose: a practical look at VSCode's security
Thomas Chauchefoin & Paul Gerste
101 Typical Security Pitfalls
Alexander Pirker
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.



Behavox Limited
Senior
Java
Azure
HBase
MySQL
NoSQL
+10

Behavox Limited
Senior
Java
Azure
HBase
MySQL
NoSQL
+10

SAP AG
Sankt Leon-Rot, Germany
Junior
Go
Azure
DevOps
Puppet
Docker
+6


Stealth It
Woking, United Kingdom
£104K
Java
Linux
Node.js
JavaScript
+1


Stealth It
Charing Cross, United Kingdom
£104K
Java
Linux
Node.js
JavaScript
+1