Search results: malicious applications

Radware Bot Risk Scanner Safeguards Your Splunk Applications From Malicious Bots

Radware Bot Risk Scanner Safeguards Your Splunk Applications From Malicious Bots

Twenty-five percent of all internet traffic today is generated by bad bots. Unfortunately, many organizations cannot make a definitive distinction between good and bad bots. This leaves their applications vulnerable to malicious ...

Unsafelok Threat Highlights It’s About Both IoT Devices and Applications

IoT devices and applications exist all over the place, and in high volume.  Today’s news brought yet another example of how the scale of IoT systems leads to the conclusion that their ...
Unveiling The Applications and Distinctions of Machine Learning and Artificial Intelligence in Cybersecurity

Unveiling The Applications and Distinctions of Machine Learning and Artificial Intelligence in Cybersecurity

The terms "machine learning" and "artificial intelligence" are frequently used in cybersecurity, often interchangeably, leading to confusion about their precise meanings and applications. Both machine learning and artificial intelligence play pivotal roles ...
BIPClip: Malicious PyPI packages target crypto wallet recovery passwords

BIPClip: Malicious PyPI packages target crypto wallet recovery passwords

| | Threat Research
ReversingLabs has identified a new, malicious campaign consisting of seven different open source packages with 19 different versions on the Python Package Index (PyPI), with the oldest package dating back to December, ...
supply chain software

Malicious Packages in npm, PyPI Highlight Supply Chain Threat

Software developers are being targeted with malicious packages in npm and PyPI as threat groups launch software supply-chain attacks ...
Security Boulevard
Attackers leverage PyPI to sideload malicious DLLs

Attackers leverage PyPI to sideload malicious DLLs

| | Threat Research
ReversingLabs researchers have observed a clear trend in which open-source platforms and code have become the stage for a growing and diverse range of malicious activity and campaigns. This trend includes hosting ...

Malicious Google Ads Targeting Chinese Users – Stay Informed

Online scams through Google ads continue to pose a significant threat to internet users worldwide. Malicious actors continuously evolve their strategies to exploit vulnerabilities and target unsuspecting users. Recently, a concerning trend ...
owasp-llm

OWASP Top 10 for LLM Applications and Mitigation

| | Cybersecurity
The increasing use of Large Language Models (LLMs) across various applications has revolutionized how we interact with technology, from virtual assistants to advanced data analysis tools. However, like any emerging technology, LLMs ...

Alert: New DLL Variant Used For Malicious Code Execution

Recent research findings have brought to light a new DLL variant pertaining to search order hijacking techniques. As per recent reports, this dynamic link library variant could potentially be used by threat ...
Best practices to protect your Flask applications

Best practices to protect your Flask applications

Learn to secure your Flask applications effectively with our expert hands-on tutorial. Enhance security for your projects in just a few steps! ...