Vandana Verma Sehgal

Stranger Danger: Your Java Attack Surface Just Got Bigger

The biggest threat to your Java app isn't your code; it's your dependencies. See live hacks exploiting vulnerabilities like Log4Shell before they hit you.

Stranger Danger: Your Java Attack Surface Just Got Bigger
#1about 3 minutes

How developers can become malware distribution vehicles

The event-stream incident illustrates how attackers can inject malware into popular open source packages by gaining maintainer trust.

#2about 1 minute

Understanding your application's true composition

Applications are composed of 80-90% open source code, making dependency security a critical concern for developers.

#3about 1 minute

When attackers target the developer's own tools

A command injection flaw in a popular VS Code repository shows how CI/CD pipelines and development tools can become attack vectors.

#4about 4 minutes

The challenge of unfixed vulnerabilities in open source

A cross-site scripting (XSS) vulnerability in a popular markdown parser remained unpatched for a year, highlighting the risks of relying on unmaintained packages.

#5about 6 minutes

Human factors in open source supply chain risk

Weak credentials on maintainer accounts, long-hidden bugs like the sudo vulnerability, and maintainers unpublishing their own packages (colors.js, faker.js) create significant ecosystem risks.

#6about 8 minutes

Anatomy of the Log4Shell (Log4j) vulnerability

Log4Shell allows remote code execution (RCE) by manipulating log messages, demonstrating how a ubiquitous logging library can become a critical security failure.

#7about 13 minutes

Live hack: Bypassing sanitization with type confusion

This demo shows how an Express.js application's XSS sanitization can be bypassed by passing an array instead of a string, causing a type confusion vulnerability.

#8about 11 minutes

Live hack: Recreating the Apache Struts vulnerability

A demonstration of a remote code execution (RCE) vulnerability in an older version of Apache Struts, similar to the one that led to the Equifax breach.

#9about 30 minutes

Hands-on lab: Executing a Log4Shell exploit

A step-by-step walkthrough of exploiting the Log4Shell vulnerability by setting up a malicious server and a vulnerable client to achieve remote code execution.

#10about 8 minutes

How to shift left with a security champions program

To manage modern security risks, organizations should adopt a 'shift left' mindset and empower developers through a structured security champions program.

#11about 27 minutes

Q&A on social engineering and a career in security

The speaker answers audience questions about social engineering, the role of QA in security, and her personal career path from developer to cybersecurity leader.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
AG
Andre Braun, GitLab
Now is the time for industrialized software development
Now is the time for industrialized software development Recently, I received a letter from my car’s manufacturer alerting me to a recall. They had discovered a defective part and wanted to replace it. It was easily fixed, and I might have forgotten a...
Now is the time for industrialized software development
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?
DC
Daniel Cranney
Dev Digest 194: AI vs. Version Control, Password Louvre & Cursed Webdev
Inside last week’s Dev Digest 194 . 🧠 Learn how to become an AI-native software engineer 🤷‍♂️ How can you stand out when anyone can build anything? 👂 Whisper Leak allows listening to encrypted chats 🐝 What’s new the OWASP2025 Top Ten List 🙅‍♀️ Curse...
Dev Digest 194: AI vs. Version Control, Password Louvre & Cursed Webdev

From learning to earning

Jobs that call for the skills explored in this talk.

DevSecOps Engineer

DevSecOps Engineer

Accenture
Municipality of Madrid, Spain

API
Scrum
DevOps
Docker
Kubernetes
+1
DevSecOps Engineer

DevSecOps Engineer

Accenture
Municipality of Bilbao, Spain

API
Scrum
DevOps
Docker
Kubernetes
+1
Platform Engineer

Platform Engineer

Dedge Security
Boiro, Spain

Bash
DevOps
MongoDB
Terraform
PostgreSQL
+5
DevOps

DevOps

UnderDefense

Remote
Bash
Azure
React
Kafka
+16
Java Cloud DevOps

Java Cloud DevOps

DEVK Deutsche Eisenbahn Versicherung Sach- und HUK-Versicherungsverein AG
Köln, Germany

Remote
Java
JUnit
DevOps
Spring
+2