Whatfuscator: An analysis of malicious open source packages

Henrik from Endor Labs recently created a small prototype Go application for detecting malicious packages early. The article shares what his application found, his view on the evolution of malicious packages and what we should be doing to protect ourselves from it....

Critical Vulnerabilities in Connected Cars

Smart cars are great. They allow you to remotely lock and unlock your car, start or stop the engine, provide the car’s gps location, flash the headlights and honk the horn from any location. It could be using the manufacturer’s provided mobile app or via...

Analysis of Leaked AWS Keys in Python Package Index

We’ve been seeing a lot of python related security issues of late, including the leaking of secrets. When python developer Tom Forbes of London heard that Infosys had leaked their AWS keys, he got intrigued. The key that was leaked was not just any AWS key, it...

Slack’s GitHub repository Compromised

Slack recently disclosed that it had a security incident involving unauthorised access to a subset of their code repository. They have observed suspicious activities on their GitHub code repository account, and upon investigation, discovered that a limited number of...