InNerd For TechbyTaylor ArmerdingThese software packages contain “presents” you don’t want to openMalicious hackers, instead of waiting for software developers to make mistakes, are trying to trick them into downloading mistakes.Dec 2
Akshat PatelTyposquatting: The Hidden Threat and How to Spot ItI’m Akshat Dharmesh Patel, currently pursuing my master’s in cybersecurity. Although I don’t have an extensive background in this field, I…Jun 7Jun 7
InT3CHbyCyberLuciferTyposquatting in GitHub Actions: A hidden threat to developersTyposquatting is a deceptive practice where malicious actors create names that are almost identical to legitimate ones, hoping users will…Sep 18Sep 18
InNerd For TechbyTaylor ArmerdingThese software packages contain “presents” you don’t want to openMalicious hackers, instead of waiting for software developers to make mistakes, are trying to trick them into downloading mistakes.Dec 2
Akshat PatelTyposquatting: The Hidden Threat and How to Spot ItI’m Akshat Dharmesh Patel, currently pursuing my master’s in cybersecurity. Although I don’t have an extensive background in this field, I…Jun 7
InT3CHbyCyberLuciferTyposquatting in GitHub Actions: A hidden threat to developersTyposquatting is a deceptive practice where malicious actors create names that are almost identical to legitimate ones, hoping users will…Sep 18
Vishnu Shivalal PTyposquatting / URL HijackingTyposquatting, a.k.a. URL Hijacking is a social engineering method that uses misspelt domains for various malicious or illegal activities…Jun 21
MEHERNOT-EE-PAD (A good example of TYPO-SQUATTING. )I started learning Wireshark and practicing with malware packet files for enumeration. It’s been quite fun diving into this world! I…Apr 41
BertusDiscord Token Stealer Discovered in PyPI RepositoryIn the months since my last posts regarding malicious code in the PyPI repository, I made some improvements to my static code analysis…Jan 20, 20191