Inside of the WASP’s nest: deep dive into PyPI-hosted malware
Photo by Matheus Queiroz on Unsplash In late 2022 we decided to start monitoring PyPI, arguably the most important Python repository, as there were a number of reports on it hosting malware. PyPI took exceptional relevance amongst all repositories as, historically, it was trusted by default by many software developers. Any security breach or abuse […] more…More information
- CloudFlare crypto gets faster on old mobes
- Show me the money – Financial Services Need to Rethink Security
- Microsoft Skype for Business and Lync CVE-2018-8238 Security Bypass Vulnerability
- What’s the key to surviving as a cyber-security start-up?
- Review: AVG Anti-Virus Free Edition
- Microsoft Windows Journal CVE-2015-2530 Remote Code Execution Vulnerability
- A New Tool Detects Counterfeit Whiskey—Without Wasting a Drop
- 4 up-and-coming employee mobile apps
- Romancing development: How to avoid feeling vulnerable with open source
- Microsoft Internet Explorer CVE-2014-8967 Use After Free Remote Code Execution Vulnerability