Nieuws

Threat actors building Python malware are getting better, and their payloads harder to detect, researchers have claimed. Analyzing a recently-detected malicious payload, JFrog reported how the ...
Chainguard, the secure foundation for software development and deployment, today announced Chainguard Libraries for Python, an index of malware-resistant Python dependencies built securely from ...
These malicious packages - deploying cyberespionage backdoors and targeting Windows and Linux systems - were found circulating via the PyPI repository. Security experts expect the problem to continue.
In a new twist on software supply chain attacks, researchers have discovered a Python package hiding malware inside of compiled code, allowing it to evade ordinary detection measures. On April 17 ...
Python-ontwikkelaars zijn via een malafide versie van de populaire package Colorama besmet geraakt met malware, waardoor ook verschillende GitHub-accounts konden worden gekaapt.
Also, the eval function, which can execute strings as Python code, is also very powerful for the purpose of programming malware, Jackson said.
Malware in PyPI Code Shows Supply Chain Risks A code backdoor in a package on the Python Package Index demonstrates the importance of verifying code brought in from code repositories.
Members of the North Korean hacker group Lazarus posing as recruiters are baiting Python developers with coding test project for password management products that include malware.
A new malware attack is targeting Mac computers with a Python-based backdoor Trojan. And Windows computers aren’t getting away scott free either.
A Python coding community is undergoing a software supply-chain attack, with threat actors targeting the 170,000-strong Top.gg GitHub organisation with malware.