Vulnerability in tarfile module | Kaspersky official blog
Credit to Author: Enoch Root| Date: Fri, 30 Sep 2022 15:35:08 +0000
A 15-year-old vulnerability in the tarfile module poses a threat to many programs.
Read moreCredit to Author: Enoch Root| Date: Fri, 30 Sep 2022 15:35:08 +0000
A 15-year-old vulnerability in the tarfile module poses a threat to many programs.
Read moreCredit to Author: Paul Oliveria| Date: Wed, 01 Jun 2022 18:00:00 +0000
Dealing with a great amount of data can be time consuming, thus using Python can be very powerful to help analysts sort information and extract the most relevant data for their investigation. The open-source tools library, MSTICpy, for example, is a Python tool dedicated to threat intelligence. It aims to help threat analysts acquire, enrich, analyze, and visualize data.
The post Using Python to unearth a goldmine of threat intelligence from leaked chat logs appeared first on Microsoft Security Blog.
Read moreCredit to Author: Tilly Travers| Date: Thu, 17 Mar 2022 09:13:50 +0000
A collection of Sophos threat research articles and security operations reports related to new or prevalent ransomware groups from 2018 to the present. The content will be updated as new research is published
Read moreCredit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Fri, 25 Feb 2022 17:00:00 +0000
In January 2022, MSTIC ran its inaugural hack month for the open-source Jupyter and Python Security Tools library, MSTICPy. This blog highlights some of the contributions.
The post MSTICPy January 2022 hackathon highlights appeared first on Microsoft Security Blog.
Read moreCredit to Author: Rutuja Mane| Date: Tue, 02 Nov 2021 11:01:48 +0000
What is WSL? The Windows Subsystem for Linux (WSL) is a resource inside the Windows operating system that…
The post Stay Alert – Malware Authors Deploy ELF as Windows Loaders to Exploit WSL feature appeared first on Quick Heal Blog | Latest computer security news, tips, and advice.
Read moreCredit to Author: Jérôme Segura| Date: Wed, 06 Feb 2019 17:16:50 +0000
![]() | |
A security researcher recently published a proof of concept exploit for open-source office software LibreOffice and OpenOffice. Will this new vulnerability be used in the wild? Categories: Tags: CVE-2018-16858exploitlibreofficeopenofficepythonrce |
The post New critical vulnerability discovered in open-source office suites appeared first on Malwarebytes Labs.
Read moreCredit to Author: Jérôme Segura| Date: Wed, 06 Feb 2019 17:16:50 +0000
![]() | |
A security researcher recently published a proof of concept exploit for open-source office software LibreOffice and OpenOffice. Will this new vulnerability be used in the wild? Categories: Tags: CVE-2018-16858exploitlibreofficeopenofficepythonrce |
The post New critical vulnerability in open-source office suites appeared first on Malwarebytes Labs.
Read moreCredit to Author: hasherezade| Date: Wed, 18 Apr 2018 15:00:00 +0000
![]() | |
Recently, we came across a Python-based sample dropped by an exploit kit. Although it arrives under the disguise of a MinerBlocker, it has nothing in common with miners. In fact, it seems to be PBot: a Python-based adware. Categories: Tags: adwarePBotpbot adwarepythonpython-based adware |
The post PBot: a Python-based adware appeared first on Malwarebytes Labs.
Read more