Inside of the WASP’s nest: deep dive into PyPI-hosted malware
Photo by Matheus Queiroz on Unsplash In late 2022 we decided to start monitoring PyPI, arguably the most important Python repository, as there were a number of reports on it hosting malware. PyPI took exceptional relevance amongst all repositories as, historically, it was trusted by default by many software developers. Any security breach or abuse […] more…APT review: what the world’s threat actors got up to in 2019
What were the most interesting developments in terms of APT activity during the year and what can we learn from them? This is not an easy question to answer, because researchers have only partial visibility and it´s impossible to fully understand the motivation for some attacks or the developments behind them. However, let´s try to […] more…Spam and phishing in Q1 2018
Quarterly highlights Data leaks Early 2018 will be remembered for a series of data leak scandals. The most high-profile saw Facebook CEO Mark Zuckerberg grilled by US Congress, with many public figures supporting the Delete Facebook campaign. As a result, Zuckerberg promised to get tough and make it more difficult to harvest data from third-party […] more…More information
- How to Protect Yourself From Malicious Apps
- Download Symlink Based cPanel Cracker & wordpress/Joomla Vulnerable extension scanner [PHP]
- OS showdown: Windows 10 vs Linux
- News in brief: Twitter pays $7,500 bounty; China gets ‘tweaked’ Windows; how to hide passwords
- What will be hot for Cisco in 2019?
- Mobile device security in the US military comes under fire
- If Friday’s an 0-day, what about the weekend? [Chet Chat Podcast 260]
- Patch now to address a Windows zero-day
- Threat to US Elections Not Limited to Russia in 2020
- "Dear ATM, kindly dispense 30 banknotes as a test" – 60 Sec Security [VIDEO]