Inside of the WASP’s nest: deep dive into PyPI-hosted malware
Photo by Matheus Queiroz on Unsplash In late 2022 we decided to start monitoring PyPI, arguably the most important Python repository, as there were a number of reports on it hosting malware. PyPI took exceptional relevance amongst all repositories as, historically, it was trusted by default by many software developers. Any security breach or abuse […] more…APT review: what the world’s threat actors got up to in 2019
What were the most interesting developments in terms of APT activity during the year and what can we learn from them? This is not an easy question to answer, because researchers have only partial visibility and it´s impossible to fully understand the motivation for some attacks or the developments behind them. However, let´s try to […] more…Spam and phishing in Q1 2018
Quarterly highlights Data leaks Early 2018 will be remembered for a series of data leak scandals. The most high-profile saw Facebook CEO Mark Zuckerberg grilled by US Congress, with many public figures supporting the Delete Facebook campaign. As a result, Zuckerberg promised to get tough and make it more difficult to harvest data from third-party […] more…More information
- Resolved: Document Imaging v10 is currently experiencing problems
- StartCom CA to Shut Down After Ban by Browser Vendors
- Researchers discover security flaws in Telegram encryption protocol
- Intel Security Innovation Alliance Partners Continue to Expand Our Open, Integrated Security Ecosystem
- Perimeter vs Persistent Security: Five Steps to Ensure Network Security
- Dell Patches Vulnerability in Pre-installed SupportAssist Utility
- Could the Bitcoin network be used as an ultrasecure notary service?
- How to read the minds of strangers.. just by using Facebook [VIDEO]
- Critics are wrong to slam iPhone X’s new face tech
- Google Glass Explorer program waiting list quietly goes live