GitHub makes it easier to scan your code for vulnerabilities Post Views: 8 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes GitHub has introduced a new option to set up code scanning for a repository known as “default...
Malicious PyPi packages create CloudFlare Tunnels to bypass firewalls Post Views: 83 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes Six malicious packages on PyPI, the Python Package Index, were found installing...
Hackers use CAPTCHA bypass to make 20K GitHub accounts in a month Post Views: 2 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes According to Palo Alto Networks Unit 42, the threat actors use a new CAPTCHA solving system, follow a...
New SHC-compiled Linux malware installs cryptominers, DDoS bots Post Views: 19 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes A new Linux malware downloader created using SHC (Shell Script Compiler) has been spotted in the wild,...
Over 60,000 Exchange servers vulnerable to ProxyNotShell attacks Post Views: 4 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes More than 60,000 Microsoft Exchange servers exposed online are yet to be patched against the...
PyTorch Framework compromised with dependency confusion attack Post Views: 2 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes The maintainers of the PyTorch package have warned users who have installed the nightly builds of the...