{"id":250,"date":"2021-07-13T02:36:51","date_gmt":"2021-07-13T02:36:51","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=250"},"modified":"2021-07-13T02:36:51","modified_gmt":"2021-07-13T02:36:51","slug":"speaking-appsec_village-defcon-29","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=250","title":{"rendered":"Speaking @Appsec_Village @DEFCON 29"},"content":{"rendered":"<p>Our talk titled \u201cThe Poisoned Diary: Supply Chain Attacks on Install Scripts\u201d was accepted at this year\u2019s @Appsec_Village @DEFCON 29.<\/p>\n<p><strong><span>UPDATE:<\/span><\/strong> It will take place on Sunday, August 8th, at 9:05 AM PST \/ 12:05 PM EDT. <a href=\"https:\/\/www.appsecvillage.com\/events\/dc-2021\/the-poisoned-diary-supply-chain-attacks-on-install-scripts\">Details can be found here<\/a> \u2013 Q&amp;A will take place on DEFCON\u2019s Discord server.<\/p>\n<p><a href=\"https:\/\/wwws.nightwatchcybersecurity.com\/wp-content\/uploads\/2021\/08\/appsec_village_defcon.pdf\">Slides (PDF)<\/a><a href=\"https:\/\/youtu.be\/K8PAITvlJng\">Video recording (Youtube)<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Our talk titled \u201cThe Poisoned Diary: Supply Chain Attacks on Install Scripts\u201d was accepted at this year\u2019s @Appsec_Village @DEFCON 29. UPDATE: It will take place on Sunday, August 8th, at 9:05 AM PST \/ 12:05 PM EDT. Details can be found here \u2013 Q&amp;A will take place on DEFCON\u2019s Discord server. Slides (PDF)Video recording (Youtube)<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-250","post","type-post","status-publish","format-standard","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/250"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=250"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/250\/revisions"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}