all InfoSec news
Typosquatting Campaign Targets Python Developers
March 28, 2024, 5:33 p.m. | Phylum Research Team
Phylum blog.phylum.io
On 26 March 2024, Phylum’s automated risk detection platform picked up yet another typosquat campaign targeting some attackers’ favorite targets in PyPI. As of writing, this attack still appears to be active and has come in two big waves after about a 20-hour break in between. So
attack attackers automated big break in campaign detection developers march phylum platform pypi python research risk targeting typosquatting writing
More from blog.phylum.io / Phylum
Python Package Installation Attacks
2 days, 23 hours ago |
blog.phylum.io
Python Trojan Functions and Imports
2 days, 23 hours ago |
blog.phylum.io
Python Package Spoofing
2 days, 23 hours ago |
blog.phylum.io
Series: How Malicious Python Code Gains Execution
2 days, 23 hours ago |
blog.phylum.io
Nation-State Threat Actors Renew Publications to npm
3 days, 16 hours ago |
blog.phylum.io
Q1 2024 Evolution of Software Supply Chain Security Report
1 week, 5 days ago |
blog.phylum.io
Rust crate shipping xz backdoor
2 weeks, 2 days ago |
blog.phylum.io
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Cybersecurity Engineer
@ Booz Allen Hamilton | USA, VA, Arlington (1550 Crystal Dr Suite 300) non-client
Invoice Compliance Reviewer
@ AC Disaster Consulting | Fort Myers, Florida, United States - Remote
Technical Program Manager II - Compliance
@ Microsoft | Redmond, Washington, United States
Head of U.S. Threat Intelligence / Senior Manager for Threat Intelligence
@ Moonshot | Washington, District of Columbia, United States
Customer Engineer, Security, Public Sector
@ Google | Virginia, USA; Illinois, USA