8min chapter

Security Conversations cover image

Inside the Turla Playbook: Hijacking APTs and fourth-party espionage

Security Conversations

CHAPTER

Navigating Supply Chain Vulnerabilities in Web3

This chapter explores a supply chain attack on Solana's web3.js library, shedding light on the risks of using compromised external libraries in blockchain development. It highlights the complexities of protecting developers and users from threats in the cryptocurrency space, while emphasizing the distinction between technological innovation and market speculation.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode