Linking pages
- Python Malware Starting to Employ Anti-Debug Techniques https://jfrog.com/blog/pypi-malware-creators-are-starting-to-employ-anti-debug-techniques/ 104 comments
- CVE-2023-25136 OpenSSH Pre-Auth Double Free Writeup & PoC https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/ 104 comments
- Attackers are starting to target .NET developers with malicious-code NuGet packages | JFrog https://jfrog.com/blog/attackers-are-starting-to-target-net-developers-with-malicious-code-nuget-packages/ 50 comments
- Malicious Packages in npm Targeting Azure Developers https://jfrog.com/blog/large-scale-npm-attack-targets-azure-developers-with-malicious-packages/ 42 comments
- Binary secret scanning helped us prevent (what might have been) the worst supply chain attack you can imagine | JFrog https://jfrog.com/blog/leaked-pypi-secret-token-revealed-in-binary-preventing-suppy-chain-attack/ 41 comments
- Examining Malicious Hugging Face ML Models with Silent Backdoor https://jfrog.com/blog/data-scientists-targeted-by-malicious-hugging-face-ml-models-with-silent-backdoor/ 8 comments
- Nearly 20% of Docker Hub Repositories Spread Malware & Phishing Scams https://jfrog.com/blog/attacks-on-docker-with-millions-of-malicious-repositories-spread-malware-and-phishing-scams/ 7 comments
- Secure your Software Supply Chain with Pyrsia https://jfrog.com/blog/pyrsia-decentralized-package-network-that-secures-the-open-source-supply-chain/ 2 comments
- Denial of Service Vulnerability in Envoy Proxy - CVE-2022-29225 | JFrog https://jfrog.com/blog/denial-of-service-vulnerability-in-envoy-proxy-cve-2022-29225/ 2 comments
- SpringShell (Spring4Shell) Zero-Day Vulnerability: All You Need to Know | JFrog https://jfrog.com/blog/springshell-zero-day-vulnerability-all-you-need-to-know 1 comment
- CVE-2023-43786 & CVE-2023-43787 Vulns in libX11: All You Need To Know https://jfrog.com/blog/xorg-libx11-vulns-cve-2023-43786-cve-2023-43787-part-two/ 1 comment
- npm Supply Chain Attack Targeting Germany-Based Companies https://jfrog.com/blog/npm-supply-chain-attack-targets-german-based-companies/ 0 comments
- OpenSSH Privilege Separation and Sandbox - Attack Surface Analysis https://jfrog.com/blog/examining-openssh-sandboxing-and-privilege-separation-attack-surface-analysis/ 0 comments
- New .NET Malware “WhiteSnake” Targets Python Developers, Uses Tor for C&C Communication | JFrog https://jfrog.com/blog/new-malware-targets-python-developers-uses-tor-for-c2-communication/ 0 comments
- CVE-2023-34034 Spring WebFlux Security Bypass Write-up & PoC https://jfrog.com/blog/spring-webflux-cve-2023-34034-write-up-and-proof-of-concept/ 0 comments
- SSH Protocol Flaw CVE-2023-48795 Terrapin Attack: All You Need To Know https://jfrog.com/blog/ssh-protocol-flaw-terrapin-attack-cve-2023-48795-all-you-need-to-know/ 0 comments
- CVE-2023-43786 & CVE-2023-43787 Vulns in libX11: All You Need To Know https://jfrog.com/blog/xorg-libx11-vulns-cve-2023-43786-cve-2023-43787-part-one/ 0 comments
- Revival Hijack - PyPI hijack technique exploited in the wild, puts 22K packages at risk | JFrog https://jfrog.com/blog/revival-hijack-pypi-hijack-technique-exploited-22k-packages-at-risk/ 0 comments
Related searches:
Search whole site: site:research.jfrog.com
Search title: JFrog Security Research
See how to search.