|
You are here |
www.koi.security | ||
| | | | |
blog.koi.security
|
|
| | | | | Deep research and expert insights on software supply chain risk, browser extensions, AI security, MCP threats, and enterprise risks. | |
| | | | |
www.evasec.io
|
|
| | | | | Multiple vulnerabilities affecting the CocoaPods ecosystem, have been discovered, posing a major risk of supply chain attacks. | |
| | | | |
www.koi.ai
|
|
| | | | | [AI summary] A live webinar discusses the GlassWorm malware, a sophisticated supply chain attack targeting VS Code extensions and OpenVSX marketplaces, using invisible Unicode code and blockchain-based infrastructure to spread and persist. | |
| | | | |
www.malwaretech.com
|
|
| | | A while ago some of you may remember me saying that I was so bored of there being no decent malware to reverse, that I might as well write some. Well, I decided to give it a go and I've spent some of my free time developing a Windows XP 32-bit bootkit. Now, before you get on the phone to your friendly neighborhood FBI agent, I'd like to make clear a few thing: The bootkit is written as a proof of concept, it would be very difficult to weaponize, and there is no weaponized version to fall into the hands of criminals. For those of you who don't know, a bootkit is a type of rootkit that begins executing at boot time. By infecting the BIOS, Master Boot Record, Volume Boot Record or Initial Program Loader; Malware can begin execution early on in the operating sys... | ||