SnowFROC 2026: Secure Defaults, Real Trust, and a Better Layer on Top
ATT&CK techniques detected
T1195.001Compromise Software Dependencies and Development Tools
98%
", and it does not always need the same kind of runtime path to do damage. malicious code does rely, though, on abusing trust. when trust is the vector, the usual instinct to stay on the latest version can become part of the problem. the heart of the session was account takeover (…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
84%
"before use, review open source with stronger technical oversight, pin safe packages, and introduce cooldown periods. we must adopt a posture in which we rotate keys aggressively, sever malicious command - and - control connections urgently, and embrace ai to scale analysis where …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
This year's Devner OWASP event showed why modern AppSec depends on secure defaults, stronger provenance, and security controls that appear where developers make decisions.