Threat Vector | Hunting Threats in Developer Environments

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
L4 Transporter
No ratings

Threat Vector Template (7).jpg

 

Cyber attackers are increasingly targeting the very tools developers trust—integrated development environments (IDEs), low-code platforms, and public code repositories. In this episode of Threat Vector, host David Moulton speaks with Daniel Frank and Tom Fakterman from Palo Alto Networks Threat Research Team. They uncover how nation-state actors and cybercriminals are using trusted development tools like Visual Studio Code to run malware, exfiltrate data, and stay undetected.

 

What You'll Learn

Listeners will learn about real-world APT campaigns, why dev tools are high-value targets, and how organizations can secure their software supply chain without slowing down developers.

 

Join the conversation on our social media channels:

Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠

Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠

Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠

LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠

YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠

Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠

 

 

Rate this article:
  • 78 Views
  • 0 comments
  • 0 Likes
Register or Sign-in
Contributors
Labels
Article Dashboard
Version history
Last Updated:
‎07-03-2025 11:07 AM
Updated by: