Treat this as an immediate security incident, CISOs advised; researchers say it’s one of the most sophisticated supply chain ...
The coordinated campaign abuses Visual Studio Code and OpenVSX extensions to steal code, mine cryptocurrency, and maintain ...
New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that ...
The latest releases of Cursor and Windsurf integrated development environments are vulnerable to more than 94 known and ...
Researchers at tech giant Google's Threat Intelligence team highlight a years-old exploit that is now being used by North ...
The web framework for Python is already celebrating its 20th birthday. A new study shows which JavaScript libraries are most ...
A Sonatype report reveals a sharp rise in sophisticated attacks hiding in trusted code libraries, with data theft becoming ...
There isn’t a consistent threat model for extension marketplaces yet, McCarthy said, making it difficult for any platform to anticipate these risks. However, he added, Microsoft’s marketplace has seen ...
In the major release, the browser mode is stable, which recently offers Visual Regression Testing to uncover optical changes.
Attackers are using the open-source red-team tool RedTiger to build an infostealer that collects Discord account data and ...
Google’s Threat Intelligence Group has linked North Korean hackers to EtherHiding, blockchain malware previously used by ...