Inside of the WASP’s nest: deep dive into PyPI-hosted malware
Photo by Matheus Queiroz on Unsplash In late 2022 we decided to start monitoring PyPI, arguably the most important Python repository, as there were a number of reports on it hosting malware. PyPI took exceptional relevance amongst all repositories as, historically, it was trusted by default by many software developers. Any security breach or abuse […] more…Spam and phishing in 2018
Numbers of the year The share of spam in mail traffic was 52.48%, which is 4.15 p.p. less than in 2017. The biggest source of spam this year was China (11.69%). 74.15% of spam emails were less than 2 KB in size. Malicious spam was detected most commonly with the Win32.CVE-2017-11882 verdict. The Anti-Phishing system […] more…More information
- Resolved: VMHosting Network outage
- Microsoft Internet Explorer CVE-2014-2826 Remote Memory Corruption Vulnerability
- Java Patch Didn’t Fix Everything, New Exploit On Sale For $5,000
- Emergency Maintenance On Critical IT Infrastructure
- Bug Allowed Theft of Over $400,000 in Zcoins
- 5 Year Anniversary of the SoakSoak Malware Tsunami
- Microsoft Excel CVE-2018-8429 Information Disclosure Vulnerability
- Microsoft lets Windows 11 loose on the world
- After a breach, users rarely change their passwords, study finds
- Crypto prof asked to remove NSA-related blog post