Inside of the WASP’s nest: deep dive into PyPI-hosted malware
Photo by Matheus Queiroz on Unsplash In late 2022 we decided to start monitoring PyPI, arguably the most important Python repository, as there were a number of reports on it hosting malware. PyPI took exceptional relevance amongst all repositories as, historically, it was trusted by default by many software developers. Any security breach or abuse […] more…APT review: what the world’s threat actors got up to in 2019
What were the most interesting developments in terms of APT activity during the year and what can we learn from them? This is not an easy question to answer, because researchers have only partial visibility and it´s impossible to fully understand the motivation for some attacks or the developments behind them. However, let´s try to […] more…Spam and phishing in Q1 2018
Quarterly highlights Data leaks Early 2018 will be remembered for a series of data leak scandals. The most high-profile saw Facebook CEO Mark Zuckerberg grilled by US Congress, with many public figures supporting the Delete Facebook campaign. As a result, Zuckerberg promised to get tough and make it more difficult to harvest data from third-party […] more…More information
- Facebook Paid Out $4.3 Million in Bounties Since 2011
- Improve your information security by giving employees more options
- Microsoft Windows JET Database Engine CVE-2019-0583 Remote Code Execution Vulnerability
- Why It’s Never Been More Important to Pick Your Mobile Platform Wisely
- Hackers steal $480,000 worth of NULS cryptocurrency from its dev team
- BlackBerry messaging service rolls out to Android and iPhone this weekend
- Watch on Demand: Threat Detection and Incident Response (TDIR) Summit
- European Police Shut Criminal Phone Network Used to Plan Murders
- The FBI Says Its Malware Isn’t Malware Because the FBI Is Good
- Supreme Court seeks a way around ‘perpetual copyright’ on foreign goods