- Python Malware Imitates Signed PyPI Traffic in Novel Exfiltration Technique https://jfrog.com/blog/python-malware-imitates-signed-pypi-traffic-in-novel-exfiltration-technique/ 6 comments netsec
Linking pages
- Python developers are being targeted with malicious packages on PyPI https://jfrog.com/blog/malicious-pypi-packages-stealing-credit-cards-injecting-code/ 274 comments
- Malicious packages in npm enable theft of Discord tokens https://jfrog.com/blog/malicious-npm-packages-are-after-your-discord-tokens-17-new-packages-disclosed/ 2 comments
Linked pages
- The edge cloud platform behind the best of the web | Fastly http://www.fastly.com/ 754 comments
- Python developers are being targeted with malicious packages on PyPI https://jfrog.com/blog/malicious-pypi-packages-stealing-credit-cards-injecting-code/ 274 comments
- PyPI · The Python Package Index https://pypi.org 269 comments
- Varnish HTTP Cache — Varnish HTTP Cache https://www.varnish-cache.org/ 29 comments
- Fetch Standard https://fetch.spec.whatwg.org/#methods 23 comments
- PyPI · The Python Package Index https://pypi.python.org 6 comments
- http://pepy.tech/ 0 comments
Related searches:
Search whole site: site:jfrog.com
Search title: Malicious packages in PyPI use stealthy exfiltration methods
See how to search.