Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Certified: The CompTIA Security+ Audio Course

Episode 48: Supply Chain and Cryptographic Vulnerabilities (Domain 2)

15 Jun 2025

Description

Modern cybersecurity is deeply interconnected, and vulnerabilities in your vendors, partners, or third-party software can easily become vulnerabilities in your own environment. In this episode, we explore supply chain attacks—like trojanized software updates, compromised developer tools, or backdoors inserted at the firmware level—that undermine trust and introduce malicious code before it even reaches your network. We also discuss cryptographic weaknesses such as outdated algorithms, poorly implemented encryption libraries, weak key management, and misuse of random number generators that can expose sensitive data to brute-force or collision attacks. These weaknesses often hide in plain sight, undetected for months or even years, as was seen in high-profile attacks like SolarWinds and compromised SSL libraries. Defending against them requires strong vendor management, secure development pipelines, cryptographic agility, and vigilant dependency tracking. Trust is not a static decision—it must be evaluated, monitored, and re-evaluated continuously across every link in the chain.

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.