Generative Data Intelligence

Tag: Typosquatting

Rescoms rides waves of AceCryptor spam

Last year ESET published a blogpost about AceCryptor – one of the most popular and prevalent cryptors-as-a-service (CaaS) operating since 2016. For H1 2023...

Top News

A pernicious potpourri of Python packages in PyPI

ESET Research has discovered a cluster of malicious Python projects being distributed in PyPI, the official Python package repository. The threat targets both Windows...

Brands Beware: X’s New Badge System Is a Ripe Cyber-Target

Fraudsters are taking advantage of the new verification system implemented by X, formerly known as Twitter, in order to impersonate brands and steal personal...

‘Looney Tunables’ Linux Flaw Sees Snowballing Proof-of-Concept Exploits

Proof-of-concept (PoC) exploits for the security flaw CVE-2023-4911, dubbed Looney Tunables, have already been developed, following last week's disclosure of the critical buffer overflow...

PowerShell Gallery Prone to Typosquatting, Other Supply Chain Attacks

Microsoft's PowerShell Gallery presents a software supply chain risk because of its relatively weak protections against attackers who want to upload malicious packages to...

Flaky AI models can be made even worse through poisoning

French outfit Mithril Security has managed to poison a large language model (LLM) and make it available to developers – to prove a point...

S3 Ep141: What was Steve Jobs’s first job?

by Paul Ducklin PONG FOR ONE!? No audio player below? Listen directly on Soundcloud. With Doug Aamoth and Paul Ducklin. Intro and...

NPM Plagued with ‘Manifest Confusion’ Malware-Hiding Weakness

A weakness in Node Package Manager (npm) could allow anybody to hide malicious dependencies and scripts within their packages, a former GitHub employee claims.Npm...

Job Seekers, Look Out for Job Scams

The economic downturn is already a devastating blow to job seekers everywhere. Now scammers are taking advantage of the situation by ramping up their...

Cycode Launches CI/CD Pipeline Monitoring Solution (Cimon) to Prevent Supply Chain Attacks

SAN FRANCISCO, June 12, 2023 â€“ Cycode, the leading application security platform, today announced the launch of Cimon, a seamless solution that enhances the security of CI/CD...

Easily Exploitable Microsoft Visual Studio Bug Opens Developers to Takeover

Security researchers are warning about a bug in Microsoft Visual Studio installer that gives cyberattackers a way to create and distribute malicious extensions to...

ChatGPT Hallucinations Open Developers to Supply-Chain Malware Attacks

Attackers can exploit ChatGPT's penchant for returning false information to spread malicious code packages, researchers have found. This poses a significant risk for the software supply...

PyPI’s 2FA Requirements Don’t Go Far Enough, Researchers Say

The official open source code repository for the Python programming language, the Python Package Index (PyPI), will require all user accounts to enable two-factor...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?