Python rejects $15M grant from US govt fearing ethical compromise

The Python Software Foundation (PSF) has declined a $15 million grant from the United States government, citing concerns over ethical compromises. This decision highlights the foundation's commitment to maintaining its independence and ethical standards in the face of external funding pressures. The grant was offered to support Python's development and community growth, but the PSF feared that accepting government funds might influence the project's direction or public perception negatively. This move underscores the broader debate within open-source communities about funding sources and the potential implications for project integrity and trust. The PSF's stance serves as a significant example for other open-source projects grappling with similar dilemmas, emphasizing the importance of transparency and ethical considerations in funding decisions. The refusal also sparks discussions about the balance between financial support and maintaining autonomy in open-source software development. Overall, the PSF's decision reflects a prioritization of ethical values over financial gain, reinforcing the foundation's dedication to its community and the principles of open-source software.

This Cyber News was published on www.bleepingcomputer.com. Publication date: Tue, 28 Oct 2025 22:20:21 +0000


Cyber News related to Python rejects $15M grant from US govt fearing ethical compromise

Encouraging Ethical Hacking Skills in Students - This article delves into the significance of encouraging ethical hacking skills in students and the numerous benefits it offers to individuals and society as a whole. Possessing ethical hacking skills can provide students with a competitive advantage ...
2 years ago Securityzap.com
Python rejects $15M grant from US govt fearing ethical compromise - The Python Software Foundation (PSF) has declined a $15 million grant from the United States government, citing concerns over ethical compromises. This decision highlights the foundation's commitment to maintaining its independence and ethical ...
2 months ago Bleepingcomputer.com
Teaching Digital Ethics: Navigating the Digital Age - In today's digital age, where technology permeates every aspect of our lives, the need for ethical behavior in the digital realm has become increasingly crucial. This article explores the significance of digital ethics education in our society and ...
2 years ago Securityzap.com
Python 2 EOL: Coping with Legacy System Challenges - Python 2.7 was the last major version in the 2.x series of this software language, which was launched on July 3, 2010 and was officially maintained and supported until January 1, 2020. At that point, when the Python 2 EOL phase began, the legacy ...
2 years ago Securityboulevard.com
ThreatNG open-source datasets aim to improve cybersecurity practices - The ThreatNG Governance and Compliance Dataset is an open-source initiative that aims to democratize access to critical data, fostering transparency, collaboration, and improvement of cybersecurity practices globally. The open-source datasets offered ...
2 years ago Helpnetsecurity.com
Navigating Ethical Challenges in AI-Powered Wargames - The intersection of wargames and artificial intelligence has become a key subject in the constantly changing field of combat and technology. Experts are advocating for ethical monitoring to reduce potential hazards as nations use AI to improve ...
2 years ago Cysecurity.news
Get 9 Courses on Ethical Hacking for Just $50 - TL;DR: Kickstart a lucrative ethical hacking career or protect your own business with The Complete 2024 Penetration Testing & Ethical Hacking Certification Training Bundle, now just $49.99. Ethical hackers are in high demand all over the world, in ...
1 year ago Techrepublic.com
Update your white hat hacking skills with $70 off this training bundle - Ethical hacking is a useful skill set not just for cybersecurity experts, but for every IT worker. The Ultimate 2020 White Hat Hacker Certification Bundle provides 10 detailed courses to get you up to speed on using hacking skills for positive ends. ...
2 years ago Bleepingcomputer.com
CVE-2022-50257 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
CVE-2023-40587 - Pyramid is an open source Python web framework. A path traversal vulnerability in Pyramid versions 2.0.0 and 2.0.1 impacts users of Python 3.11 that are using a Pyramid static view with a full filesystem path and have a `index.html` file that is ...
1 year ago
Python in Threat Intelligence: Analyzing and Mitigating Cyber Threats - In the world of emerging cybersecurity threats, understanding the significance of threat intelligence is crucial and can not be ignored. Threat intelligence involves the systematic collection, analysis, and application of data to understand potential ...
2 years ago Hackread.com
CVE-2021-32807 - The module `AccessControl` defines security policies for Python code used in restricted code within Zope applications. Restricted code is any code that resides in Zope's object database, such as the contents of `Script (Python)` objects. The ...
3 years ago
Learn Cybersecurity Skills From Scratch for Just $30 Through January 1 - Save on tech services or switch to a lucrative new tech career in 2024 by training at your own pace to develop high-demand cybersecurity skills. On sale from 12/26 through 1/1. We may be compensated by vendors who appear on this page through methods ...
2 years ago Techrepublic.com
"Do Not Push To Production" And Other Insecure Code, Demonstrated By An Ethical Hacker - Viewers got to see some interesting vulnerabilities and coding practices that made her demo app pretty open to exploits. A friend of mine published a book about it over 25 years ago, called The Happy Hacker. If you're hacking without permission, no ...
2 years ago Securityboulevard.com
Ensuring a Secure Future: Global Guidelines for AI Security - With the increasing integration of AI into various facets of our lives, concerns about security and ethical considerations have come to the forefront. Establishing global guidelines for AI security is imperative to harness the benefits of this ...
2 years ago Cybersecurity-insiders.com
North Korean Hackers Employs Social Engineering Tactics & Python Script - The attackers employ a dual approach: meticulously crafted social engineering schemes combined with elegantly disguised Python code to gain initial access to target systems. Behind the scenes, the code establishes connections to command and control ...
9 months ago Cybersecuritynews.com
Hackers Employ DLL Side-Loading To Deliver Malicious Python Code - DLL side-loading exploits the Windows DLL search order mechanism, where attackers place malicious DLL files in locations where legitimate applications will load them instead of the intended legitimate libraries. The technique enables attackers to ...
9 months ago Cybersecuritynews.com
Critical Flaw in AI Python Package Can Lead to System and Data Compromise - A critical vulnerability discovered recently in a Python package used by AI application developers can allow arbitrary code execution, putting systems and data at risk. The issue, discovered by researcher Patrick Peng, is tracked as CVE-2024-34359 ...
1 year ago Packetstormsecurity.com CVE-2024-34359
CVE-2017-12855 - Xen maintains the _GTF_{read,writ}ing bits as appropriate, to inform the guest that a grant is in use. A guest is expected not to modify the grant details while it is in use, whereas the guest is free to modify/reuse the grant entry when it is not in ...
8 years ago
CVE-2022-33684 - The Apache Pulsar C++ Client does not verify peer TLS certificates when making HTTPS calls for the OAuth2.0 Client Credential Flow, even when tlsAllowInsecureConnection is disabled via configuration. This vulnerability allows an attacker to perform a ...
2 years ago
116 Malicious PyPI Packages Downloaded Over 10,000 Times - A cluster of malicious Python projects has been identified in PyPI, the official Python PyPI package repository, which targets both Windows and Linux systems and often deploys a custom backdoor. In certain instances, the ultimate payload consists of ...
2 years ago Cybersecuritynews.com
CVE-2025-61765 - python-socketio is a Python implementation of the Socket.IO realtime client and server. A remote code execution vulnerability in python-socketio versions prior to 5.14.0 allows attackers to execute arbitrary Python code through malicious pickle ...
3 months ago
Bradford ethical hacker honoured with record-breaking work - A bug bounty-hunter who identifies security loopholes in company websites has been celebrated in the India Book of Records. University of Bradford student Nikhil Rane is an ethical hacker who helps firms find gaps in their systems that may be ...
2 years ago Bbc.com
HackerOne paid ethical hackers over $300 million in bug bounties - HackerOne has announced that its bug bounty programs have awarded over $300 million in rewards to ethical hackers and vulnerability researchers since the platform's inception. Thirty hackers have earned over a million USD for their submissions, and ...
2 years ago Bleepingcomputer.com Inception Hunters
Grab 9 Ethical Hacking Courses for $25 and Improve Your Business Security - TL;DR: If you want to improve your knowledge of cybersecurity, The All-in-One Ethical Hacking & Penetration Testing Bundle is available for $24.97. Cybersecurity is a growing industry, projected to be worth $424.97 billion by 2030. Even if you don't ...
2 years ago Techrepublic.com