Inside of the WASP’s nest: deep dive into PyPI-hosted malware
Photo by Matheus Queiroz on Unsplash In late 2022 we decided to start monitoring PyPI, arguably the most important Python repository, as there were a number of reports on it hosting malware. PyPI took exceptional relevance amongst all repositories as, historically, it was trusted by default by many software developers. Any security breach or abuse […] more…IT threat evolution in Q2 2021. Mobile statistics
These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. Quarterly figures In Q2 2021, according to data from Kaspersky Security Network: 14,465,672 malware, adware and riskware attacks were prevented. The largest share of all detected threats accrued to RiskTool programs — 38.48%. 886,105 malicious installation […] more…Malicious Optimizer and Utility Android Apps on Google Play Communicate with Trojans that Install Malware, Perform Mobile Ad Fraud
By Lorin Wu (Mobile Threats Analyst) We recently discovered several malicious optimizer, booster, and utility apps (detected by Trend Micro as AndroidOS_BadBooster.HRX) on Google Play that are capable of accessing remote ad configuration servers that can be used for malicious purposes, perform mobile ad fraud, and download as many as 3,000 malware variants or malicious […] more…Kaspersky Security Bulletin 2018. Top security stories
Introduction The internet is now woven into the fabric of our lives. Many people routinely bank, shop and socialize online and the internet is the lifeblood of commercial organizations. The dependence on technology of governments, businesses and consumers provides a broad attack surface for attackers with all kinds of motives – financial theft, theft of […] more…More information
- Microsoft Windows COM CVE-2019-0552 Local Privilege Escalation Vulnerability
- Magento Malware Hides Stolen Card Data in Image Files
- How to Fix the specialadves WordPress Redirect Hack
- After Apple’s iPhone 14 launch event, a few things to consider
- The power of two – All you need to know about two-factor authentication
- Microsoft Internet Explorer CVE-2018-8371 Remote Memory Corruption Vulnerability
- June 2012 Patch Tuesday Includes Flagging for Untrusted Certificates
- Atlassian Patches High-Severity Vulnerabilities in Confluence, Crucible, Jira
- Exploits, malverts, ransomware, iOS – and Star Wars! [Chet Chat Podcast 228]
- Serious Vulnerabilities in F5’s BIG-IP Allow Full System Compromise