OUR BLOG

Malicious NPM packages target marked-js library

Malicious NPM packages target marked-js library

Two NPM packages masquerading as legitimate javascript libraries were published to the NPM registry this week.  The packages were published by a user named "kamations" and target the marked-js...

NPM packages deploy new MacOS malware

NPM packages deploy new MacOS malware

A new malware payload is being delivered via NPM packages.  The NPM user named hi_ops published seven packages that are deploying a new MacOS malware.     How is the malware delivered? The...

Ultralytics publishes malicious PyPi packages

Ultralytics publishes malicious PyPi packages

The Ultralytics PyPi package was compromised today via a sneaky attack leveraging GitHub pull requests. Two consecutive package versions of the Ultralytics PyPi package were compromised and...

Are private bug bounty programs a good idea?

Are private bug bounty programs a good idea?

Bug bounty programs have emerged over the last 5 years as a vital tool for identifying and mitigating vulnerabilities.   Many enterprises have accepted the value of having bug bounty programs in...

Real talk about “memory-safe” languages.

Real talk about “memory-safe” languages.

You might have recently heard people talking about "memory-safe" languages and how we all need to start using them.  There is a loud contingent of people on LinkedIn and Twitter advocating that we...

What is the offensive security “Holy Trinity”?

What is the offensive security “Holy Trinity”?

What is offensive security? In today's complex cybersecurity landscape, organizations use a variety of techniques to fortify their defenses and use proactive measures to ensure the integrity of...