Tag: Open Source Software
-
Securing millions of developers through 2FA
Though technology has advanced significantly to combat the proliferation of sophisticated security threats, the reality is that preventing …
-
PoC Exploit Released For Critical Oracle VirtualBox Vulnerability
Oracle Virtualbox was identified and reported as having a critical vulnerability associated with Privilege Escalation and Arbitrary File …
-
Graylog: Open-source log management
Graylog is an open-source solution with centralized log management capabilities. It enables teams to collect, store, and analyze data to …
-
IT pros targeted with malicious Google ads for PuTTY, FileZilla
An ongoing malvertising campaign is targeting IT administrators looking to download system utilities such as PuTTY (a free SSH and Telnet …
-
Active Nitrogen campaign delivered via malicious ads for PuTTY, FileZilla
In the past couple of weeks, we have observed an ongoing campaign targeting system administrators with fraudulent ads for popular system …
-
Google Adds V8 Sandbox To Chrome To Fight Against Browser Attacks
A Sandbox is a protective medium that blocks the entire system from any application accessing vulnerable resources. Restrictive …
-
Google Chrome Adds V8 Sandbox – A New Defense Against Browser Attacks
Google has announced support for what’s called a V8 Sandbox in the Chrome web browser in an effort to address memory corruption issues. The …
-
WordPress, Apple, and Kim Dotcom –
This week, Wordpress vulnerabilities, Apple updates, Gentoo, Kim Dotcom, discovering 0-day exploits, and bypassing Apple’s USB restricted …
-
Sign1 Malware Hijacked 39,000 WordPress Websites
A client’s website was experiencing random pop-ups as server side scanner logs revealed a JavaScript injection related to Sign1, which is …
-
RisePro stealer targets Github users in “gitgub” campaign
Github repositories We identified at least 13 such repositories belonging to a RisePro stealer campaign that was named “gitgub” by the …
-
Celebrating 15 Years of Surveillance Self-Defense
(SSD). At the time, we pitched it as, “an online how-to guide for protecting your private data against government …
-
Securing software repositories leads to better OSS security
Malicious software packages are found on public software repositories such as GitHub, PyPI and the npm registry seemingly every day. …
●●●