Sonatype researchers have discovered Python packages that contain malicious code that peek into and expose secret AWS credentials, network interface information, and environment variables. All those credentials and metadata then get uploaded to one or …
Tag: Python
Europe, Global Security News, North America, Vulnerabilities
This Week in Malware—npm malware exfiltrates Windows SAM, Amazon EC2 credentials
by Ax Sharma •
This Week in Malware, we continue to see an uptick in outright malicious and dependency confusion packages employing novel tactics. A list of some of the packages caught by Sonatype’s automated malware detection systems is given below and more an…
Global Security News, North America
Hijacking of popular ctx and phpass packages reveals open source security gaps
by Help Net Security •
The Python module “ctx” and a fork of the PHP library “phpass” have recently been modified by an unknown attacker to grab AWS credentials/keys and send them to a Heroku app. But what at first seemed like the work of a malicious …
Security Vendor News
Poisoned Python and PHP packages purloin passwords for AWS access
by Paul Ducklin •
More supply chain trouble – this time with clear examples so you can learn how to spot this stuff yourself.
Europe, Global Security News, North America
Django vs Flask vs Fast API – A comparative Guide to Python Web Frameworks
by Meravath Raju •
Excerpt: Applications are widely used in almost all devices including desktops, Android, and iOS, But have you ever wondered or have you ever thought about how they are made and run with your commands?
The post Django vs Flask vs Fast API –…
Global Security News, North America
Attackers employ novel methods to backdoor French organizations
by Zeljka Zorz •
An advanced threat actor has been spotted using distinctive, novel methods to backdoor French entities in the construction, real estate, and government industries. How the attack unfolds The attack starts with a well-known technique – emails cont…
Malware Indicators (IoCs)
Sparta- A Network Scanning and Enumeration Tool
by Tyler Loftus •
What Is Sparta? Sparta, created by SECFORCE is the ultimate tool for recon and network…
Sparta- A Network Scanning and Enumeration Tool on Latest Hacking News.
Europe, Global Security News, North America, Vulnerabilities
Trojanized PyPI Package Imitates a Popular Python Server Library
by Ax Sharma •
Sonatype has once again stumbled upon a malicious Python package called ‘aiohttp-socks5’—this time imitating a massively popular middleware library. But instead, this package drops a Remote Access Trojan (RAT) that compromises your system complet…
Europe, Global Security News, North America
What is insecure deserialization?
by Vickie Li •
Getting to know a critical vulnerability that affects Java, Python, and other common programming languages.
Photo by Jiawei Zhao on Unsplash
As a penetration tester, there are few vulnerabilities that fascinate me more than insecure deserialization.
In…
Malware Indicators (IoCs)
Google Launched Differential Privacy Tool for Python Developers
by Abeerah Hashim •
After releasing in multiple programming languages, Google has now launched its differential privacy tool in…
Google Launched Differential Privacy Tool for Python Developers on Latest Hacking News.
Global Security News, North America
Malicious Python packages employ advanced detection evasion techniques
by Zeljka Zorz •
JFrog researchers have discovered 11 malicious Python packages on PyPI, the official third-party package repository for Python, which have been collectively downloaded over 41,000 times. This is not the first time that malicious packages have been succ…
Europe, Global Security News, North America
VERT Research Tips: Byting into Python
by Tyler Reguly •
The past few weeks, I’ve been spending a lot of my free time preparing for the OSCP exam, which means refreshing a lot of skills that I haven’t used in years. A large part of that is rebuilding muscle memory around buffer overflows, so that’s how I spe…
Global Security News, North America
Trojan Source bugs may lead to extensive supply-chain attacks on source code
by Zeljka Zorz •
Cambridge University researchers have detailed a new way targeted vulnerabilities can be introduced into source code while making them invisible to human code reviewers, allowing for extensive supply-chain attacks. “We have discovered ways of man…