Malware in the Supply Chain
0 seconds of 0 secondsVolume 90%
Press shift question mark to access a list of keyboard shortcuts
Keyboard Shortcuts
Shortcuts Open/Close/ or ?
Play/PauseSPACE
Increase Volume↑
Decrease Volume↓
Seek Forward→
Seek Backward←
Captions On/Offc
Fullscreen/Exit Fullscreenf
Mute/Unmutem
Decrease Caption Size-
Increase Caption Size+ or =
Seek %0-9

Jul 19th 2019
Tech Break 5821
Malware in the Supply Chain
Hosted by
Curtis Franklin,
Brian Chee
The importance of verifying code from code repositories.
This feed has been discontinued, but you can find the clips in our archives.
Researchers have found an attack that uses a backdoor in PyPI that was thought to have been fixed in the past.
For the full episode, visit twit.tv/twiet/351
You can find more about TWiT and subscribe to our full shows at https://twit.tv/shows/