Is This Your Pipe? Hijacking the Build Pipeline
As developers of the web, the presenters rely on tools to automate building code, run tests, and even deploy services. What happens when they're too trusting of CI/CD pipelines? Credentials get exposed, hijacked, and re-purposed.
Provided by: SecurityTube.net Topic: Security Date Added: Jan 2015 Format: Webcast