Generative Data Intelligence

Tag: Typosquatting

S3 Ep136: Navigating a manic malware maelstrom

by Paul Ducklin A PYTHON PERSPECTIVE VORTEX No audio player below? Listen directly on Soundcloud. With Doug Aamoth and Paul Ducklin. Intro...

PyPI open-source code repository deals with manic malware maelstrom

by Paul Ducklin Public source code repositories, from Sourceforge to GitHub, from the Linux Kernel Archives to ReactOS.org, from PHP...

Once Again, Malware Discovered Hidden in npm

Two code packages named "nodejs-encrypt-agent" in the popular npm JavaScript library and registry recently were discovered containing the open source information-stealing TurkoRat malware.Researchers from...

Attackers Target macOS With ‘Geacon’ Cobalt Strike Tool

Heads up: threat actors are now deploying a Go-language implementation of Cobalt Strike called Geacon that first surfaced on GitHub four years ago and...

You may not care where you download software from, but malware does

One of the pieces of advice that security practitioners have been giving out for the past couple of decades, if not longer, is that...

You may not care where you download software from, but malware does | WeLiveSecurity

Why do people still download files from sketchy places and get compromised as a result? One of the pieces of advice...

Anatomy of a Malicious Package Attack

Last January, thousands of users of two popular open source libraries, "faker" and "colors," were shocked to see their applications breaking and showing gibberish...

What CISOs Can Do to Build Trust & Fight Fraud in the Metaverse

The online gaming industry has seen rapid growth since the COVID-19 lockdowns began. However, with more and more players and new platforms entering the...

Pig butchering scams: The anatomy of a fast-growing threat

Scams How fraudsters groom their marks and move in for the kill using tricks from the playbooks of romance and investment scammers Márk...

Pig butchering scams: The anatomy of a fast‑growing threat

How fraudsters groom their marks and move in for the kill using tricks from the playbooks of romance and investment scammers ...

.NET Devs Targeted With Malicious NuGet Packages

A baker's dozen of packages hosted on the NuGet repository for .NET software developers are actually malicious Trojan components that will compromise the installation...

Beware rogue 2FA apps in App Store and Google Play – don’t get hacked!

by Paul Ducklin Thanks to Tommy Mysk and Talal Haj Bakry of @mysk_co for the impetus and information behind this...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?