June 6, 2023, 4:40 p.m. | MalBot

Malware Analysis, News and Indicators - Latest topics malware.news


Python Package Index (PyPI) attackers used compiled code to evade detection. It’s possibly the first attack to take advantage of .PYC file direct execution — but likely not the last.


The ReversingLabs’ reverse engineering team led by Karlo Zanki (pictured) spotted the tactic. In this week’s Secure Software Blogwatch, we round up reax right.


Your humble blogwatcher curated these bloggy bits for your entertainment. Not to mention: Bees Packed in a Suitcase.
 


AST/SCA FAIL — RL FTW …

attack attackers caught code detection engineering evade file hackers led package pypi python python package python package index researchers reverse reverse engineering reversinglabs secure software secure software blogwatch software tactic team

Digital Security Infrastructure Manager

@ Wizz Air | Budapest, HU, H-1103

Sr. Solution Consultant

@ Highspot | Sydney

Cyber Security Analyst III

@ Love's Travel Stops | Oklahoma City, OK, US, 73120

Lead Security Engineer

@ JPMorgan Chase & Co. | Tampa, FL, United States

GTI Manager of Cybersecurity Operations

@ Grant Thornton | Tulsa, OK, United States

GCP Incident Response Engineer

@ Publicis Groupe | Dallas, Texas, United States