Sat.Nov 05, 2022

article thumbnail

Microsoft sued for open-source piracy through GitHub Copilot

Bleeping Computer

Programmer and lawyer Matthew Butterick has sued Microsoft, GitHub, and OpenAI, alleging that GitHub's Copilot violates the terms of open-source licenses and infringes the rights of code authors. [.].

100
100
article thumbnail

Zero-day are exploited on a massive scale in increasingly shorter timeframes

Security Affairs

Microsoft warns of an uptick among threat actors increasingly using publicly-disclosed zero-day exploits in their attacks. According to the Digital Defense Report published by Microsoft, threat actors are increasingly leveraging publicly-disclosed zero-day vulnerabilities to target organizations worldwide. The researchers noticed a reduction in the time between the announcement of a vulnerability and the commoditization of that vulnerability and remarked on the importance of the patch management

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers Uncover 29 Malicious PyPI Packages Targeted Developers with W4SP Stealer

The Hacker News

Cybersecurity researchers have uncovered 29 packages in Python Package Index (PyPI), the official third-party software repository for the Python programming language, that aim to infect developers' machines with a malware called W4SP Stealer.

article thumbnail

29 malicious PyPI packages spotted delivering the W4SP Stealer

Security Affairs

Cybersecurity researchers discovered 29 malicious PyPI packages delivering the W4SP stealer to developers’ systems. Cybersecurity researchers have discovered 29 packages in the official Python Package Index (PyPI) repository designed to infect developers’ systems with an info-stealing malware dubbed W4SP Stealer. “It appears that these packages are a more sophisticated attempt to deliver the W4SP Stealer on to Python developer’s machines by hiding a malicious import ” sta

Malware 92
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

BSidesPDX 2022 – Pim Trouerbach’s ‘Smokeloader: The Pandora’s Box Of Tricks, Payloads And Anti-Analysis’

Security Boulevard

Our sincere thanks to BSidesPDX 2022 for publishing their outstanding conference videos on the organization's YouTube channel. Permalink. The post BSidesPDX 2022 – Pim Trouerbach’s ‘Smokeloader: The Pandora’s Box Of Tricks, Payloads And Anti-Analysis’ appeared first on Security Boulevard.

article thumbnail

TikTok Admits Staff in China Can Access Europeans’ Data

WIRED Threat Level

Plus: Liz Truss’ phone-hacking trouble, Cash App’s sex-trafficking problem, and the rising cost of ransomware.

Hacking 95