Is This Your Pipe? Hijacking the Build Pipeline

Provided by: SecurityTube.net
Topic: Security
Format: Webcast
As developers of the web, the presenters rely on tools to automate building code, run tests, and even deploy services. What happens when they're too trusting of CI/CD pipelines? Credentials get exposed, hijacked, and re-purposed.

Find By Topic