Explore >> Select a destination


You are here

www.koi.security
| | blog.koi.security
0.9 parsecs away

Travel
| | Deep research and expert insights on software supply chain risk, browser extensions, AI security, MCP threats, and enterprise risks.
| | www.evasec.io
3.3 parsecs away

Travel
| | Multiple vulnerabilities affecting the CocoaPods ecosystem, have been discovered, posing a major risk of supply chain attacks.
| | www.koi.ai
1.3 parsecs away

Travel
| | [AI summary] A live webinar discusses the GlassWorm malware, a sophisticated supply chain attack targeting VS Code extensions and OpenVSX marketplaces, using invisible Unicode code and blockchain-based infrastructure to spread and persist.
| | www.malwaretech.com
12.3 parsecs away

Travel
| A while ago some of you may remember me saying that I was so bored of there being no decent malware to reverse, that I might as well write some. Well, I decided to give it a go and I've spent some of my free time developing a Windows XP 32-bit bootkit. Now, before you get on the phone to your friendly neighborhood FBI agent, I'd like to make clear a few thing: The bootkit is written as a proof of concept, it would be very difficult to weaponize, and there is no weaponized version to fall into the hands of criminals. For those of you who don't know, a bootkit is a type of rootkit that begins executing at boot time. By infecting the BIOS, Master Boot Record, Volume Boot Record or Initial Program Loader; Malware can begin execution early on in the operating sys...