With increased deployment of security solutions on cloud infrastructure, hackers have started adopting detection evasion tactics from Windows desktop computers to cloud environments. One such tactic ...
A sophisticated Python-based malware deployment uncovered during a fraud investigation has revealed a layered attack involving obfuscation, disposable infrastructure and commercial offensive tools.
The official Python software repository, PyPI, was discovered to host six packages that would download and install cryptomining software on affected systems according to a new report. Security ...
Malicious Python packages masquerading as legitimate code obfuscation tools are targeting developers via the PyPI code repository. Focusing on those interested in code obfuscation is a savvy choice ...
Researchers have documented the use of a process hollowing technique to disguise the presence of cryptocurrency mining malware on infected systems. On Wednesday, Trend Micro researchers Arianne Dela ...
This week, multiple malicious packages were caught in the PyPI repository for Python projects that turned developers' workstations into cryptomining machines. All malicious packages were published by ...
PyPI is popular among Python programmers for sharing and downloading code. Since anyone can contribute to the repository, malware – sometimes posing as legitimate, popular code libraries – can appear ...
The ever-evolving nature of cybersecurity threats necessitates constant vigilance against emerging threats. One such threat gaining traction is crypto malware. Recent statistics reveal a disturbing ...
Two newly uncovered malware campaigns are exploiting open-source software across Windows and Linux environments to target enterprise executives and cloud systems, signaling a sharp escalation in both ...
Researchers have discovered a new crypto-mining campaign targeting Elasticsearch instances which contains sinkholing capabilities to squash any competing miners. The aptly named “CryptoSink” malware ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results