Jan 16, 2023
Supply Chain Attack Using Identical PyPI Packages, “colorslib”, “httpslib”, and “libhttps”
Supply Chain Attack Using Identical PyPI Packages, “colorslib”, “httpslib”, and “libhttps” | FortiGuard Labs
The FortiGuard Labs team discovered an attack embedded in three PyPI packages called ‘colorslib’, ‘httpslib’, and “libhttps”. Read our blog to learn more.…
-
-
-
-
Given that the invention of attack trees is commonly attributed to Schneier's 1999 article, I was surprised to see the idea described in a 1991 paper by J.D. Weiss of Bell Labs [1].
Even more surprising is that I found it because it was cited in another paper co-authored by Schneier in 1998 [2].
[1]J.D. Weiss, "A System Security Engineering Process," Proceedings of the 14th National
Computer Security Conference, 1991.
https://csrc.nist.gov/CSRC/media/Publications/conference-paper/1991/10/01/proceedings-14th-national-computer-security-conference-1991/documents/1991-14th-NCSC-proceedings-vol-2.pdf[2] Chris Salter, O. Sami Saydjari, Bruce Schneier, Jim Wallner, "Toward a secure system engineering methodology," NSPW '98: Proceedings of the 1998 workshop on New security paradigms
https://dl.acm.org/doi/10.1145/310889.310900
Alex Gantman: "Given that the invention of attack trees is commo…" - IOC.exchange
Attached: 1 image Given that the invention of attack trees is commonly attributed to Schneier's 1999 article, I was surprised to see the idea described in a 1991 paper by J.D. Weiss of Bell Labs [1]. Even more surprising is that I found it because it was cited in another paper co-authored by Schneier in 1998 [2]. [1]J.D. Weiss, "A System Security Engineering Process," Proceedings of the 14th National Computer Security Conference, 1991. https://csrc.nist.gov/CSRC/media/Publications/conference-paper/1991/10/01/proceedings-14th-national-computer-security-conference-1991/documents/1991-14th-NCSC-proceedings-vol-2.pdf [2] Chris Salter, O. Sami Saydjari, Bruce Schneier, Jim Wallner, "Toward a secure system engineering methodology," NSPW '98: Proceedings of the 1998 workshop on New security paradigms https://dl.acm.org/doi/10.1145/310889.310900
-
-
An arrow points to the empty area, with caption: "Brief, glorious period in which Tweetbot was usable"" loading="lazy">
-
Guccifer is out of prison and giving interviews. I wouldn’t wish American prison on my worst enemy.
Hacker Guccifer Launched Clinton Email Scandal Out of Prison
Before Russian intelligence cribbed his handle, Marcel Lehel Lazar hacked celebrities and Sidney Blumenthal. Now he’s back home in Transylvania.
-
-
-
holdsecurity.com/news/2023/01/s…
Motive aside, this is still a very dodgy approach to take.