Aggregator
CVE-2022-41481 | Tenda AC1200 US_AC6V2.0RTL_V15.03.06.51_multi_TDE01 Request 0x47de1c denial of service
CVE-2022-41482 | Tenda AC1200 US_AC6V2.0RTL_V15.03.06.51_multi_TDE01 Request 0x47c5dc denial of service
CVE-2022-41483 | Tenda AC1200 US_AC6V2.0RTL_V15.03.06.51_multi_TDE01 Request 0x4a12cc denial of service
CVE-2022-41484 | Tenda AC1200 US_AC6V2.0RTL_V15.03.06.51_multi_TDE01 Request 0x32384 denial of service
CVE-2022-41485 | Tenda AC1200 US_AC6V2.0RTL_V15.03.06.51_multi_TDE01 Request 0x47ce00 denial of service
CVE-2022-42156 | D-Link COVR 1200/COVR 1203 1.08 SetNetworkTomographySettings tomography_ping_number command injection
When the Perimeter Fails: Microsegmentation as the Last Line of Defense
Perimeter defenses can fail. Learn how microsegmentation halts lateral movement, securing your network from internal threats.
The post When the Perimeter Fails: Microsegmentation as the Last Line of Defense appeared first on ColorTokens.
The post When the Perimeter Fails: Microsegmentation as the Last Line of Defense appeared first on Security Boulevard.
CVE-2022-3456 | ikus060 rdiffweb up to 2.4.x allocation of resources (EUVD-2022-0266)
CVE-2022-37602 | karma-runner grunt-karma 4.0.1 grunt-karma.js key prototype pollution (Issue 311 / EUVD-2022-7104)
CVE-2022-35059 | OTFCC 617837b otfccdump+0x6c0414 heap-based overflow (EUVD-2022-37957)
CVE-2025-1683 | 1E Client up to 24.4/25.0/25.2 Nomad Module link following (EUVD-2025-6260)
CVE-2022-41350 | Synacor Zimbra Collaboration Suite 8.8.15 search?action=voicemail&action=listen phone cross site scripting (EUVD-2022-44555)
Noyb Threatens Meta with Lawsuit for Violating GDPR to Train AI on E.U. User Data From May 27
OpenPubkey和OPKssh中的关键身份验证绕过使系统面临远程访问风险
PyPI恶意软件警报:恶意的“索拉纳令牌”包瞄准索拉纳开发人员
Вулканическое сердце Венеры забилось — планета, которую списали со счетов, снова подаёт признаки жизни
Nova Scotia Power confirms hackers stole customer data in cyberattack
Backdoor implant discovered on PyPI posing as debugging utility
Threat actors have all kinds of motivations for targeting open-source software (OSS) repositories like the Python Package Index (PyPI). Financial gain is one of them. As ReversingLabs (RL) 2025 Software Supply Chain Security Report noted, there were close to two dozen software supply chain campaigns in 2024 alone that targeted developers working on cryptocurrency applications.
But financial gain is just one motivation. Geopolitical tensions and political activism are another, as can be seen in a new malicious campaign that RL researchers detected on the PyPI this week, which may be linked to a threat actor that works in support of Ukraine since the Russian invasion of that country in 2022.
On Tuesday, the RL threat research team detected a newly uploaded malicious package that poses as a Python debugging utility. When installed, the package implants a backdoor on the developer’s system, enabling malicious actors to execute malicious code and exfiltrate sensitive data.
By comparing the malicious packages and attack techniques of previous malicious campaigns, RL researchers conclude that this new package may be attributable to a hacktivist gang known for its campaigns against Russian interests in support of Ukraine.
Here’s what RL researchers discovered — and what this ongoing campaign means for the current state of OSS security
The post Backdoor implant discovered on PyPI posing as debugging utility appeared first on Security Boulevard.