Skip to main content

Snyk Security Labs Blog Archiv

Anzeige 13 - 20 von 20 posts

blog-feature-pypi-spoof

Gitpod remote code execution 0-day vulnerability via WebSockets

In this post, we present the first findings from our current research into Cloud Development Environments (CDEs) — which allowed a full account takeover through visiting a link, exploiting a commonly misunderstood vulnerability (WebSocket Hijacking), and leveraging a practical SameSite cookie bypass.

wordpress-sync/feature-openssl-blue

Breaking down the ’critical’ OpenSSL vulnerability

In this post we’ll break down the two OpenSSL vulnerabilities, look at whether or not the level of attention this received is warranted, and how concerned we should actually be.

Phony PyPi package imitates known developer

A recent interesting finding in the Python Package Index (PyPi) attempted to imitate a known open source developer through identity spoofing. Upon further analysis, the team uncovered that the package, raw-tool, was attempting to hide malicious behavior using base64 encoding, reaching out to malicious servers, and executing obfuscated code. In this post, we’re going to take a deeper look at that vulnerability, but first let’s take a look at how our researchers discovered it.

wordpress-sync/blog-hero-pypi-malware-discord

Snyk identifiziert PyPi-Malware, die Daten und Zahlungsinformationen von Discord und Roblox Nutzern abgreift

Hier erhalten Sie weitere Details zur PyPi-Malware, die Daten und Zahlungsinformationen von Discord und Roblox Nutzern abgreift.

wordpress-sync/blog-banner-google-play

Mitigating and remediating intent-based Android security vulnerabilities

In part 3 of this series, we wrap things up by offering recommendations for mitigating and remediating intent-based Android security vulnerabilities. We also go over advice directly from Google Play.

Hunting intent-based Android security vulnerabilities with Snyk Code

We used Snyk Code to hunt for intent-based Android security vulnerabilities across 10,000 popular apps on Google Play. Learn about what we found.

Deep dive into Visual Studio Code extension security vulnerabilities

Snyk has found severe vulnerabilities in popular VS Code extensions, enabling attackers to compromise local machines as well as build and deployment systems through a developer’s IDE. Learn how they work and how to protect your code.

Exploring intent-based Android security vulnerabilities on Google Play

Intents are used by internal components to communicate with each other as well as to access exported components of other applications, which opens the door for malicious attacks. In this post, we’ll explore intent-based Android security vulnerabilities to see why and how they work.

12