Founder of SecureStack. DevSecOps evangelist, startup lover and failed professional snowboarder.
Don't let Paul's baby face fool you, he has been working with engineering teams for 30 years. Paul's specialty is helping organizations build secure applications at scale. He's done that for large organizations like NASA, John Deere, Blue Cross/Blue Shield, US Army, and the Australian government. He's also built or worked for several startups along the way helping them do the same thing. Paul spent most of his career in Utah but now lives in Australia with his wife and 3 kids.
Saturday | Aug
9th2025
DEF CON Creator Stage 4 (Room 228) | Las Vegas Convention Center
Adversary
Automation
npm is owned by Microsoft and is the world’s largest software registry. It hosts nearly 5 million packages and 4.5 trillion requests for packages were made to npm in 2024. The open and accessible nature of npm is one of its main features, but its also one of the reasons that threat actors are attracted to it. A recent study by Sonatype found that 98.5% of malicious software packages are hosted and delivered via npm.
This technical deep-dive will explain why npm is so good at delivering malware; expose how threat actors are using npm; and why existing security tools like SCA, SAST, EDR and anti-virus solutions will not protect you from npm based malware.
Key Topics:
Target Audience:
This talk is aimed at security researchers, threat hunters, and defenders responsible for securing the software supply chain. Attendees will gain practical insights into detecting and defending against package-based malware that evades conventional security controls.
Why This Talk?
While binary malware analysis is well understood, package-based malware presents unique challenges. This talk fills a critical knowledge gap by providing detailed technical analysis of real-world attacks and practical defensive strategies for an increasingly important threat vector.
Access Everywhere.
Join Adversary Village official Discord server to connect with our amazing community of adversary simulation experts and offensive security researchers!