python-dateutils—A Cryptominer in Disguise Targeting Windows, Linux, macOS

You've probably heard of the Python module 'dateutil'. The module offers powerful extensions to the standard datetime library extensively used by Python developers. Yesterday, however, Sonatype's automated malware detection system caught a ...
Black Basta ransomware is mutating, and this has several implications

Black Basta ransomware is mutating, and this has several implications

New variants of the Black Basta ransomware are now emerging in the wild and routinely turning up in our global honeypots. According to online reports, Black Basta has managed to make many ...
Sectrio’s IoT OT, and IT Security solution wins NASSCOM Gamechanger 2022 award

Sectrio’s IoT OT, and IT Security solution wins NASSCOM Gamechanger 2022 award

Sectrio’s unique AI-powered IoT and OT security solution based on the Adaptive Threat Defense approach has been recognized as a game-changing technology by NASSCOM. The solution won the top honor at an ...
mssp webinar

Top 5 Myths Of Cyber Security Debunked

Myths of Cyber Security : We work online. We live online. As our fast-paced lives get exponentially dependent on digital services, the urgency to protect our information from being misused is crucial ...
How much can delaying a cyber threat assessment cost your business?

How much can delaying a cyber threat assessment cost your business?

Between cyber-criminal groups, Lazarus (North Korea), Conti (Russia), and Mustang Panda (China), almost every business in every sector is on the radar of hackers. Because of geopolitical and economic reasons, these groups ...

Python packages upload your AWS keys, env vars, secrets to the web

Last week, Sonatype discovered multiple Python packages that not only exfiltrate your secrets—AWS credentials and environment variables but rather upload these to a publicly exposed endpoint. These packages were discovered by Sonatype's ...
Lightspin Live Stream

Discussion, innovation, and collaboration: RSA and Purple Cloud Summit Event Recap 2022

| | FEATURED
In an exciting week of hustle and bustle in San Franciso, California, crowds filed to the city to attend RSA Conference 2022 and Lightspin’s Purple Cloud Summit Event. After years of will ...
Complete Guide to Cyber Threat Intelligence Feeds

Complete Guide to Cyber Threat Intelligence Feeds

Cyber Threat Intelligence [CTI] Feeds – The devil is in the details Whether your firm is looking for a cybersecurity vendor to meet your needs or your employees are undergoing a training ...
How to get started with OT security

How to get started with OT security

In the last couple of years, OT security has managed to get plenty of attention from security teams. Some businesses have even started having dedicated teams to manage OT security and tools ...
The future of IoT ransomware – targeted multi-function bots and more cyberattacks  

The future of IoT ransomware – targeted multi-function bots and more cyberattacks  

A new IoT malware was detected in October 2021 with as many as 30 exploit mechanisms that were coded into it. This malware called BotenaGo was able to seek out and attack ...