Users who deployed the nightly builds of PyTorch between Christmas and New Year’s Eve likely received a rogue package as part of the installation that siphoned off sensitive data from their systems. The incident was the result of an attack called dependency confusion that continues to impact package managers and development environments if hardening steps are not taken.
“If you installed PyTorch nightly on Linux via pip between December 25, 2022, and December 30, 2022, please uninstall it and torchtriton immediately, and use the latest nightly binaries (newer than December 30, 2022),” the PyTorch maintainers said in a security advisory.
More Stories
WP Ultimate CSV Importer Flaws Expose 20,000 Websites to Attacks
WP Ultimate CSV Importer flaws expose 20,000 websites to attacks enabling attackers to achieve full site compromise Read More
The AI Fix #44: AI-generated malware, and a stunning AI breakthrough
In episode 44 of The AI Fix, ChatGPT won’t build a crystal meth lab, GPT-4o improves the show’s podcast art,...
Ukraine Blames Russia for Railway Hack, Labels It “Act of Terrorism”
The CERT-UA investigation concluded that the attack’s techniques were “characteristic of Russian intelligence services” Read More
New Phishing Attack Combines Vishing and DLL Sideloading Techniques
A new attack targeting Microsoft Teams users used vishing, remote access tools and DLL sideloading to deploy a JavaScript backdoor...
Google to Switch on E2EE for All Gmail Users
Google is set to roll out end-to-end encryption for all Gmail users, boosting security, compliance and data sovereignty efforts Read...
Cybercriminals Expand Use of Lookalike Domains in Email Attacks
BlueVoyant found that the use of lookalike domains in email-based attacks is allowing actors to extend the types of individuals...