Nothing says career growth like a coding challenge that installs a RAT.
ReversingLabs says fake crypto/blockchain recruiters pushed 192 malicious packages on npm/PyPI; “bigmathutils” hit 10,000 downloads before turning bad in v1.1.0.
If the repo smells off, don’t run it 😼

https://it.slashdot.org/story/26/02/15/062259/fake-job-recruiters-hid-malware-in-developer-coding-challenges

#ReversingLabs #npm #PyPI

Fake Job Recruiters Hid Malware In Developer Coding Challenges - Slashdot

"A new variation of the fake recruiter campaign from North Korean threat actors is targeting JavaScript and Python developers with cryptocurrency-related tasks," reports the Register. Researchers at software supply-chain security company ReversingLabs say that the threat actor creates fake compani...

🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!

We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

We're thrilled to share this critical Brand Story conversation thanks to our friends at ReversingLabs 🙏

Your Business Apps Are Bringing Friends You Didn't Invite

Every commercial software application is a complex assembly of first-party, contracted, open source, and third-party code. But when #SolarWinds, #Kaseya, and #Ivanti happened, we learned that vendor questionnaires and contractual assurances offer little protection against supply chain compromises.

At #BlackHat2025, Saša Zdjelar, Chief Trust Officer at ReversingLabs, reveals how organizations can finally verify the integrity of #software from outside vendors—without relying on blind trust.

The game-changer: Comprehensive binary analysis that deconstructs any file into its components to:

• Detect malware, tampering, and embedded secrets

• Identify #vulnerabilities and insecure practices

• Uncover undocumented network connections

• Flag #compliance risks from restricted regions

This isn't just another policy checkbox—it's a true technical control that inspects the software itself, regardless of size or complexity.

Real-world applications:

• Procurement: Auto-scan all software before deployment

• Version Monitoring: Detect unexpected behavior changes between releases

• Critical Environments: Verify integrity before software enters OT, ICS, or financial systems

• Risk Management: Assess COTS software as part of ongoing vendor reviews

With regulations like EO 14028 and the EU's #CyberResilience Act demanding transparency, the ability to technically validate every application delivers both strategic protection and measurable benefits.

📺 Watch the video: https://youtu.be/pU9bHYFND7c

🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/your-business-apps-are-bringing-friends-you-didnt-invite-a-brand-story-with-saa-zdjelar-chief-trust-officer-at-reversinglabs-and-operating-partner-at-crosspoint-capital-a-black-hat-usa-2025-conference-on-location-brand-story-a2sfPy_B

📖 Read the blog: https://www.itspmagazine.com/their-stories/your-business-apps-are-bringing-friends-you-didnt-invite-a-brand-story-with-saa-zdjelar-chief-trust-officer-at-reversinglabs-a-black-hat-usa-2025-on-location-brand-story

➤ Learn more about ReversingLabs: https://itspm.ag/reversinglabs-v57b

✦ Catch more stories from #ReversingLabs: https://www.itspmagazine.com/directory/reversinglabs

🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25

#Cybersecurity #SupplyChainSecurity #SoftwareIntegrity #BlackHatUSA #BHUSA25 #ThirdPartyRisk #SBOM #BinaryAnalysis #Compliance #ZeroTrust

Nieuw beveiligingsrisico: schadelijke code in hugging face pickle-bestanden

Onderzoekers hebben ontdekt dat kwaadwillenden misbruik maken van de Pickle-bestanden op het AI-platform Hugging Face om schadelijke code te verspreiden. Dit v

Tech Nieuws
Malicious Python Packages Target Crypto Wallet Recovery Passwords

A newly discovered campaign pushing malicious open source software packages is designed to steal mnemonic phrases used to recover lost or destroyed crypto wallets, according to a report by ReversingLabs.

The Security Ledger with Paul F. Roberts

#ChatGPT is wrong more than half the time—makes many conceptual errors, but sounds confident, authoritative.

So, hard to spot the errors, say researchers. In this week’s #SSBlogwatch we can’t say we’re totally surprised. For #ReversingLabs: https://reversinglabs.com/blog/ai-coding-helpers-get-failing-grade?utm_source=richisoc&utm_medium=social #AI #DevOps

AI coding helpers get FAILing grade

Purdue researchers expose generative AI tools like Copilot's frequent errors when asked basic development questions. Only fools rush in.

ReversingLabs
Listen up, devs: AI trained to overhear passwords

Deep learning model knows what keys you press — “with 95% accuracy.” The password's days are numbered.

ReversingLabs

Google employees are to be protected from themselves. In what’s being described as a pilot program, they’ll lose internet access at work and/or root privileges.

The idea is to stop break-ins by bad actors. In this week’s #SSBlogwatch we try not to imagine the horror. For #ReversingLabs: https://www.reversinglabs.com/blog/no-net-for-some-no-root-for-devs-google-cuts-off-staff-internet-for-safety?utm_source=richisoc&utm_medium=social

No net for some, no root for devs — Google pilot walls off staff internet, access for ‘safety’

It’s an optional trial program (for now). How would your dev team cope? Is this the future of zero trust?

ReversingLabs
Is a DEF CON Village the right way to assess AI risk? | The Security Ledger with Paul F. Roberts

Is a DEF CON village the best venue for assessing the cyber risks of large language model AI like ChatGPT? Experts have their doubts.

The Security Ledger with Paul F. Roberts
The surveys speak: supply chain threats are freaking people out

A bunch of surveys of IT pros are clear: hreats and risks from vulnerable software supply chains are real, and they’re starting to freak people out.

The Security Ledger with Paul F. Roberts