Github 35K Malicious Code Insertions

Github 35K Malicious Code Insertions

A threat actor with a name "Pl0xP" cloned a large number of GitHub repositories and changed the cloned repository names, in a typosquatting effort to impersonate legitimate projects. The widespread cloning…
Poisoned Python library removed

Poisoned Python library removed

Researchers have discovered the series of events that lead to the "ctx Python" library being seeded with code that sought to steal the AWS secret keys of anyone who included…
Trojan Source Bug Could Hijack Compilers

Trojan Source Bug Could Hijack Compilers

Researchers working to introduce advanced digital security systems to prevent hackers from getting hold of significant data from major companies and organizations. Recently researchers shown that almost all computer code…
AbstractEMU Malware Roots Android

AbstractEMU Malware Roots Android

New Android malware nicknamed SummaryEmu can root infected devices to gain full control and silently change system settings, as well as evade detection using code abstraction and anti emulation checks…
Remote Browser Isolation

Remote Browser Isolation

Remote browser isolation is a technology also referred to as web isolation or simply browser isolation. Remote browser isolation is an advanced cybersecurity technique that provides an additional layer of…