Inside of the WASP’s nest: deep dive into PyPI-hosted malware
Photo by Matheus Queiroz on Unsplash In late 2022 we decided to start monitoring PyPI, arguably the most important Python repository, as there were a number of reports on it hosting malware. PyPI took exceptional relevance amongst all repositories as, historically, it was trusted by default by many software developers. Any security breach or abuse […] more…Spam and phishing in 2018
Numbers of the year The share of spam in mail traffic was 52.48%, which is 4.15 p.p. less than in 2017. The biggest source of spam this year was China (11.69%). 74.15% of spam emails were less than 2 KB in size. Malicious spam was detected most commonly with the Win32.CVE-2017-11882 verdict. The Anti-Phishing system […] more…More information
- Supply chain disruption, Apple, and the importance of ops
- Microsoft Internet Explorer CVE-2015-1733 Remote Memory Corruption Vulnerability
- Guide to the top college and university cyber security degree programs
- Linux kernel patches “performance can be harmful” bug in video driver
- Facebook ‘Most Used Words’ game accused of stealing and selling user data
- Swimlane Raises $40 Million to Expand SOAR Business
- Better than CAPTCHA: Improved method to let computers know you are human
- Philips Tasy EMR CVE-2019-6562 Cross Site Scripting Vulnerability
- Resolved: Password reset option of accounts.psu.edu is unavailable
- Schneider Electric Patches Flaws in Modicon, Wonderware Products