PyPI the Python Package Index temporarily ceases operation during the weekend

Python curled up tightly.
Photo by Mary Hinton on Unsplash

After a brief period of suspending new user registrations and package uploads, the Python Package Index (PyPI) repository is now operational once again. While some initially attributed the issue to an influx of malicious packages inundating the site, a PyPI administrator clarified that there was no significant surge, but rather a shortage of personnel to handle the usual volume. PyPI, the official software repository for Python, boasts a user base of over 700,000 and hosts more than 450,000 projects, as stated on its homepage. Due to its popularity, it has become a target for hackers who aim to introduce harmful packages as a starting point for supply chain breaches. Commencing on Saturday afternoon (UTC), PyPI temporarily halted new user and project registrations.

Source: https://www.darkreading.com/application-security/pypi-shuts-down-weekend-says-incident-overblown

Share this post

Surveillance cameras on wall

Russia Accuses US of Widespread Apple iPhone Hacking

Russia’s Federal Security Service (FSB) claims to have discovered an elaborate American espionage operation that compromised thousands of iPhones using sophisticated surveillance software. Moscow-based Kaspersky Lab confirmed that several of its employees’ devices were compromised during the operation.

Abstract powerlines

Mandiant Unearths New Malware That Can Sabotage Power Grids

A new strain of malware, dubbed COSMICENERGY, has been discovered that is designed to penetrate and disrupt critical systems in industrial environments. The malware is capable of exploiting an industrial communication protocol called IEC-104 to issue commands to RTUs, which could potentially cause power disruption. There is no evidence that the malware has been used in attacks, but its discovery is a reminder of the threat posed by malicious software to critical infrastructure.

Close up of North Korean flag.

SentinelLabs Identifies Ongoing Campaign by North Korean APT Group Kimsuky

SentinelLabs recently detected an ongoing operation conducted by Kimsuky, a North Korean Advanced Persistent Threat (APT) group, which aims to infiltrate North Korea-centric information services, human rights activists, and organizations that support defectors from the Democratic People’s Republic of Korea (DPRK).