Tag: Security

  • Blind Trust in LLMs: How Hallucinated Packages Can Compromise Open-Source Projects

    Blind Trust in LLMs: How Hallucinated Packages Can Compromise Open-Source Projects

    Large Language Models(LLMs) have become essential tools for software developers, helping them solve complex problems and even implement entire functionalities in some cases. However, while these models can accelerate development and streamline workflows, over-reliance on them comes with its own set of risks. A well-known flaw of LLMs is their…

  • Crypto Wallets Targetted Using Malicious PyPI Packages

    Crypto Wallets Targetted Using Malicious PyPI Packages

    PyPI has long been used as a means of distributing malicious code masquerading as legitimate utilities by bad actors. Yehuda Gelb recently exposed one such operation, targeting users of prominent crypto-wallets such as Atomic, Metamask, Exodus, and many more, by uploading multiple packages within a short timeframe to the repository,…

  • Linux Printing System Vulnerabilities Lead to Remote Code Execution(RCE)

    Linux Printing System Vulnerabilities Lead to Remote Code Execution(RCE)

    A chain of vulnerabilities in the Common UNIX Printing System(CUPS) was recently discovered by security researcher Simone Margaritelli, allowing attackers to execute code remotely on vulnerable machines provided certain conditions are met. CUPS is the most widely used printing system on Linux and other UNIX-like operating systems. It has a…

  • Exploding Pagers and Walkie-Talkies in Lebanon – A Hacker’s Analysis

    Exploding Pagers and Walkie-Talkies in Lebanon – A Hacker’s Analysis

    Lebanese militant group Hezbollah has had a rough couple of days with communication devices exploding all around them. Thousands of pagers detonated simultaneously in Hezbollah strongholds on Tuesday, the 17th of September, killing 9 and injuring more than 3,000 Lebanese citizens. Among the affected were several Hezbollah fighters as well…

  • Revival Hijack: A PyPI Supply Chain Attack Technique.

    Revival Hijack: A PyPI Supply Chain Attack Technique.

    Researchers at JFrog have recently discovered a PyPI supply chain attack technique being exploited in the wild, dubbed “Revival Hijack”. This technique can be used to hijack Python packages hosted on PyPI by manipulating the option to re-register(revive) their names once the owner takes them down. A package repository is a centralized…

  • Airport Security Screening can be Bypassed?

    Airport Security Screening can be Bypassed?

    Security researchers Sam Curry and Ian Carrol discovered a vulnerability in an air transport security system which could allow unauthorized individuals to bypass airport security screenings and even gain access to flight cockpits!

  • The Lay(wo)man’s Guide to Online Security

    The Lay(wo)man’s Guide to Online Security

    Overview The average individual spends 6 hours and 35 minutes of their day on the internet. At least 1/3rd of this time is spent on social media, peering into other people’s lives and giving them peaks into their own. There is however a limit to how much information you can…