116 Malware Packages Found on PyPI Repository Infecting Windows and Linux Systems
Dec 14, 2023NewsroomMalware / Supply Chain Attack Cybersecurity researchers have identified a set of 116 malicious packages on the Python...
Dec 14, 2023NewsroomMalware / Supply Chain Attack Cybersecurity researchers have identified a set of 116 malicious packages on the Python...
A malicious hacking group, thought to have been operating since at least 2013, may have suffered a significant blow after...
New Windows/Linux Firmware Attack Interesting attack based on malicious pre-OS logo images: LogoFAIL is a constellation of two dozen newly...
Dec 11, 2023NewsroomData Security / Mobile Security Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google...
Around 60% of human-operated ransomware attacks now involve malicious remote encryption. Read on to learn about this prevalent ransomware attack...
Dec 05, 2023NewsroomMobile Security / Spyware A new "post-exploitation tampering technique" can be abused by malicious actors to visually deceive...
Nov 24, 2023NewsroomThreat Analysis / Dark Web More details have emerged about a malicious Telegram bot called Telekopye that's used...
Our investigations on potential security threats uncovered a malicious Google Chrome extension that we named “ParaSiteSnatcher.” The ParaSiteSnatcher framework allows...
New research by Checkmarx has unveiled a threat actor who has been injecting malicious Python packages into the open-source repository...
Cybersecurity firm Kaspersky has uncovered a malicious WhatsApp modification, or mod, now spreading through Telegram. These popular messaging apps often...
Nov 08, 2023NewsroomSupply Chain / Software Security A new set of malicious Python packages has slithered their way to the...
Nov 03, 2023NewsroomSoftware Security / Malware A new set of 48 malicious npm packages have been discovered in the npm...
The top-level domain for the United States — .US — is home to thousands of newly-registered domains tied to a...
Oct 31, 2023NewsroomSoftware Security / Malware Cybersecurity researchers have uncovered a new set of malicious packages published to the NuGet...
Organizations rely on threat hunting to identify malicious activity, improve security and mitigate risk. The PEAK Threat Hunting Framework —...