Skip to main content

Snyk Security Labs Blog Archive

Affichage 13 - 20 sur 20 publications

blog-feature-pypi-spoof

Vulnérabilité 0-day d’exécution de code à distance sur Gitpod via WebSocket

Dans cet article, nous présentons les premiers résultats tirés de notre analyse des environnements de développement dans le cloud (CDE). Nous sommes parvenus à prendre le contrôle complet d’un compte via un simple lien en exploitant une vulnérabilité souvent mal comprise (le détournement de WebSocket) et en utilisant un contournement de cookie SameSite.

wordpress-sync/feature-openssl-blue

Breaking down the ’critical’ OpenSSL vulnerability

In this post we’ll break down the two OpenSSL vulnerabilities, look at whether or not the level of attention this received is warranted, and how concerned we should actually be.

Phony PyPi package imitates known developer

A recent interesting finding in the Python Package Index (PyPi) attempted to imitate a known open source developer through identity spoofing. Upon further analysis, the team uncovered that the package, raw-tool, was attempting to hide malicious behavior using base64 encoding, reaching out to malicious servers, and executing obfuscated code. In this post, we’re going to take a deeper look at that vulnerability, but first let’s take a look at how our researchers discovered it.

wordpress-sync/blog-hero-pypi-malware-discord

Snyk détecte le malware PyPi, qui dérobe les identifiants et informations de paiement sur Discord et Roblox

Découvrez le nouveau malware PyPi, qui tente de dérober les identifiants et informations de paiement des utilisateurs de Discord et Roblox.

wordpress-sync/blog-banner-google-play

Mitigating and remediating intent-based Android security vulnerabilities

In part 3 of this series, we wrap things up by offering recommendations for mitigating and remediating intent-based Android security vulnerabilities. We also go over advice directly from Google Play.

Hunting intent-based Android security vulnerabilities with Snyk Code

We used Snyk Code to hunt for intent-based Android security vulnerabilities across 10,000 popular apps on Google Play. Learn about what we found.

Deep dive into Visual Studio Code extension security vulnerabilities

Snyk has found severe vulnerabilities in popular VS Code extensions, enabling attackers to compromise local machines as well as build and deployment systems through a developer’s IDE. Learn how they work and how to protect your code.

Exploring intent-based Android security vulnerabilities on Google Play

Intents are used by internal components to communicate with each other as well as to access exported components of other applications, which opens the door for malicious attacks. In this post, we’ll explore intent-based Android security vulnerabilities to see why and how they work.

12