The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
All content for CyberWire Daily is the property of N2K Networks and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
The Hidden Risk in Your Stack [Data Security Decoded]
CyberWire Daily
27 minutes
1 week ago
The Hidden Risk in Your Stack [Data Security Decoded]
While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik.
In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and what modern threat actors are doing to exploit trust at scale. Caleb and Hayden dive deep into real-world attacks, emerging TTPs, AI-powered threat hunting, and what organizations must do today to keep pace. Listeners walk away with a clear picture of the problem—and a practical blueprint for reducing supply chain risk.
What You’ll Learn
How modern attackers infiltrate open source ecosystems through fake accounts and counterfeit package contributions.
Why dependency chains dramatically amplify both exposure and attacker leverage.
How to use threat intelligence and threat hunting to proactively evaluate upstream packages before adoption.
Where AI-powered code analysis is changing the ability to discover hidden vulnerabilities and suspicious patterns.
Why dependency pinning, SBOM discipline, and continuous monitoring now define a strong supply chain posture.
Episode Highlights
00:00 — Welcome + Why Software Supply Chain Risk Matters
02:00 — Hayden’s Non-Cyber Passion + Framing Today’s Topic
03:00 — Why Open Source Powers Everything—and Why That Creates Exposure
06:00 — The Real Attack Vector: Contribution as Initial Access
08:00 — Inside the Indonesian “Fake Package” Campaign
10:30 — How to Evaluate Code + Contributor Identity Together
12:00 — Threat Hunting and AI-Enabled Code Interrogation
15:00 — The Challenge of Undisclosed Vulnerabilities in Widely Used Components
16:30 — How Recovery Works When Malware Is Already in Your Stack
19:00 — Continuous Monitoring as the Foundation of Modern Supply Chain Security
22:00 — Pinning, Maintainer Analysis, and Code Interrogation Best Practices
24:00 — Where to Learn More About Hunted Labs
Episode Resources
Hunted Labs — https://huntedlabs.com
Hunted Labs Entercept
Hunted Labs “Hunting Ground” research blog
Open Source Malware (Paul McCarty)
Learn more about your ad choices. Visit megaphone.fm/adchoices
CyberWire Daily
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.