FEATURED
python-dateutils—A Cryptominer in Disguise Targeting Windows, Linux, macOS
You've probably heard of the Python module 'dateutil'. The module offers powerful extensions to the standard datetime library extensively used by Python developers. Yesterday, however, Sonatype's automated malware detection system caught a ...

Black Basta ransomware is mutating, and this has several implications
New variants of the Black Basta ransomware are now emerging in the wild and routinely turning up in our global honeypots. According to online reports, Black Basta has managed to make many ...

Sectrio’s IoT OT, and IT Security solution wins NASSCOM Gamechanger 2022 award
Sectrio’s unique AI-powered IoT and OT security solution based on the Adaptive Threat Defense approach has been recognized as a game-changing technology by NASSCOM. The solution won the top honor at an ...

Top 5 Myths Of Cyber Security Debunked
Myths of Cyber Security : We work online. We live online. As our fast-paced lives get exponentially dependent on digital services, the urgency to protect our information from being misused is crucial ...

How much can delaying a cyber threat assessment cost your business?
Between cyber-criminal groups, Lazarus (North Korea), Conti (Russia), and Mustang Panda (China), almost every business in every sector is on the radar of hackers. Because of geopolitical and economic reasons, these groups ...
Python packages upload your AWS keys, env vars, secrets to the web
Last week, Sonatype discovered multiple Python packages that not only exfiltrate your secrets—AWS credentials and environment variables but rather upload these to a publicly exposed endpoint. These packages were discovered by Sonatype's ...

Discussion, innovation, and collaboration: RSA and Purple Cloud Summit Event Recap 2022
In an exciting week of hustle and bustle in San Franciso, California, crowds filed to the city to attend RSA Conference 2022 and Lightspin’s Purple Cloud Summit Event. After years of will ...

Complete Guide to Cyber Threat Intelligence Feeds
Cyber Threat Intelligence [CTI] Feeds – The devil is in the details Whether your firm is looking for a cybersecurity vendor to meet your needs or your employees are undergoing a training ...

How to get started with OT security
In the last couple of years, OT security has managed to get plenty of attention from security teams. Some businesses have even started having dedicated teams to manage OT security and tools ...

The future of IoT ransomware – targeted multi-function bots and more cyberattacks
A new IoT malware was detected in October 2021 with as many as 30 exploit mechanisms that were coded into it. This malware called BotenaGo was able to seek out and attack ...