DiscoverData Security DecodedThe Hidden Risk in Your Stack
The Hidden Risk in Your Stack

The Hidden Risk in Your Stack

Update: 2025-12-16
Share

Description

In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and what modern threat actors are doing to exploit trust at scale. Caleb and Hayden dive deep into real-world attacks, emerging TTPs, AI-powered threat hunting, and what organizations must do today to keep pace. Listeners walk away with a clear picture of the problem—and a practical blueprint for reducing supply chain risk.



What You’ll Learn 




  • How modern attackers infiltrate open source ecosystems through fake accounts and counterfeit package contributions.




  • Why dependency chains dramatically amplify both exposure and attacker leverage.




  • How to use threat intelligence and threat hunting to proactively evaluate upstream packages before adoption.




  • Where AI-powered code analysis is changing the ability to discover hidden vulnerabilities and suspicious patterns.




  • Why dependency pinning, SBOM discipline, and continuous monitoring now define a strong supply chain posture.




    Episode Highlights


    00:00 — Welcome + Why Software Supply Chain Risk Matters


    02:00 — Hayden’s Non-Cyber Passion + Framing Today’s Topic


    03:00 — Why Open Source Powers Everything—and Why That Creates Exposure


    06:00 — The Real Attack Vector: Contribution as Initial Access


    08:00 — Inside the Indonesian “Fake Package” Campaign


    10:30 — How to Evaluate Code + Contributor Identity Together


    12:00 — Threat Hunting and AI-Enabled Code Interrogation


    15:00 — The Challenge of Undisclosed Vulnerabilities in Widely Used Components


    16:30 — How Recovery Works When Malware Is Already in Your Stack


    19:00 — Continuous Monitoring as the Foundation of Modern Supply Chain Security


    22:00 — Pinning, Maintainer Analysis, and Code Interrogation Best Practices


    24:00 — Where to Learn More About Hunted Labs




    Episode Resources




Comments 
loading
In Channel
loading
00:00
00:00
1.0x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

The Hidden Risk in Your Stack

The Hidden Risk in Your Stack

Rubrik