Aggregator
CVE-2022-41350 | Synacor Zimbra Collaboration Suite 8.8.15 search?action=voicemail&action=listen phone cross site scripting (EUVD-2022-44555)
Noyb Threatens Meta with Lawsuit for Violating GDPR to Train AI on E.U. User Data From May 27
OpenPubkey和OPKssh中的关键身份验证绕过使系统面临远程访问风险
PyPI恶意软件警报:恶意的“索拉纳令牌”包瞄准索拉纳开发人员
Вулканическое сердце Венеры забилось — планета, которую списали со счетов, снова подаёт признаки жизни
Nova Scotia Power confirms hackers stole customer data in cyberattack
Backdoor implant discovered on PyPI posing as debugging utility
Threat actors have all kinds of motivations for targeting open-source software (OSS) repositories like the Python Package Index (PyPI). Financial gain is one of them. As ReversingLabs (RL) 2025 Software Supply Chain Security Report noted, there were close to two dozen software supply chain campaigns in 2024 alone that targeted developers working on cryptocurrency applications.
But financial gain is just one motivation. Geopolitical tensions and political activism are another, as can be seen in a new malicious campaign that RL researchers detected on the PyPI this week, which may be linked to a threat actor that works in support of Ukraine since the Russian invasion of that country in 2022.
On Tuesday, the RL threat research team detected a newly uploaded malicious package that poses as a Python debugging utility. When installed, the package implants a backdoor on the developer’s system, enabling malicious actors to execute malicious code and exfiltrate sensitive data.
By comparing the malicious packages and attack techniques of previous malicious campaigns, RL researchers conclude that this new package may be attributable to a hacktivist gang known for its campaigns against Russian interests in support of Ukraine.
Here’s what RL researchers discovered — and what this ongoing campaign means for the current state of OSS security
The post Backdoor implant discovered on PyPI posing as debugging utility appeared first on Security Boulevard.
Interlock勒索软件因间谍驱动的数据泄露而袭击美国国防承包商AMTEC
Alleged Data Breach of BBB Group — Over 700 Audio Files Leaked
Inside Turla’s Uroboros Infrastructure and Tactics Revealed
In a nation-state cyber espionage, a recent static analysis of the Uroboros rootkit, attributed to the infamous APT group Turla, uncovers a chilling display of sophistication and mastery over Windows kernel internals. With the sample identified by the MD5 hash ed785bbd156b61553aaf78b6f71fb37b, this malware-first linked to Turla around 2014-2015-stands as a testament to the group’s elite […]
The post Inside Turla’s Uroboros Infrastructure and Tactics Revealed appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.