Inside of the WASP’s nest: deep dive into PyPI-hosted malware
Photo by Matheus Queiroz on Unsplash In late 2022 we decided to start monitoring PyPI, arguably the most important Python repository, as there were a number of reports on it hosting malware. PyPI took exceptional relevance amongst all repositories as, historically, it was trusted by default by many software developers. Any security breach or abuse […] more…Spam and phishing in 2018
Numbers of the year The share of spam in mail traffic was 52.48%, which is 4.15 p.p. less than in 2017. The biggest source of spam this year was China (11.69%). 74.15% of spam emails were less than 2 KB in size. Malicious spam was detected most commonly with the Win32.CVE-2017-11882 verdict. The Anti-Phishing system […] more…More information
- 4 ways Cognizant customers can protect themselves amid corruption probe
- Stolen usernames and passwords still cause almost a quarter of all data breaches
- Train for your CompTIA Network+ and Linux+ for just $30
- SSCC 122 – Facebook hoax, Microsoft 0-day, Android hole and Firefox going forward [PODCAST]
- Sophos RED scoops “Protector Award” at this year’s AusCERT conference
- Unpatched Flaws in Python, Java Allow Firewall Bypass
- Code of App Security Tool Posted to GitHub
- Popular JWT cloud security library patches “remote” code execution hole
- If any phone can be hacked, should we give up on security? [VIDEO]
- Police dog sniffs out USB drive to snare school hacker