Threat Actor Phishing PyPI Users Identified
September 1 2022"JuiceLedger" has escalated a campaign to distribute its information stealer by now going after developers who published code on the widely used Python code repository.
Read more"JuiceLedger" has escalated a campaign to distribute its information stealer by now going after developers who published code on the widely used Python code repository.
Read moreThe expanding Internet of Things ecosystem is seeing a startling rate of vulnerability disclosures, leaving companies with a greater need for visibility into and patching of IoT devices.
Read moreThe proposed AMTSO guidelines offer a roadmap for comprehensive testing of IoT security products.
Read moreThe proposed AMTSO guidelines offer a roadmap for comprehensive testing of IoT security products.
Read moreLatest episode - listen now!
Read moreThe insecurities exist in CI/CD pipelines and can be used by attackers to subvert modern development and roll out malicious code at deployment.
Read moreApple continues a staged update process to address a WebKit vulnerability that allows attackers to craft malicious Web content to load malware on affected devices.
Read moreAfter a rigorous pilot program, the association's newest certification is officially operational. More than 1,500 pilot participants who passed the exam are on the path to full certification.
Read moreCloud breaches are inevitable — and so is cloud ransomware. (Second of two parts.)
Read moreBrian Krebs is reporting on a clever PayPal phishing scam that uses legitimate PayPal messaging. Basically, the scammers use the PayPal invoicing system to send the email. The email lists...
Read more
Recent Comments