npm Supply Chain Attack: New Developments & Defender Takeaways

Binary Defense

ThreatTalk Series | Episode 7 | Part 2 of 2

In this two-part episode, John Dwyer, Deputy CTO & Head of ARC Labs, takes a closer look at the newest developments in the npm supply chain attack and what they mean for defenders. 

Watch part one, Trust Boundaries Under Attack: Lessons From npm and OAuth Supply Chain Attacks, where John Dwyer and JP Castellanos, Director of Threat Intelligence, examined how stronger defenses begin with lessons learned from incidents like npm and the Salesloft OAuth attacks. These breaches aren’t isolated—they highlight the fragility of our trust in open-source technologies, third-party vendors, and the enterprises that depend on them.


What is a ThreatTalk?


Powered by ARC Labs, ThreatTalks is a webinar series crafted to drive engagement and provide timely and relevant intelligence on the state of the threat landscape. Led by our seasoned experts, each session dives into our latest threat intelligence trends and effective threat-hunting strategies.

Register

Binary Defense needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.