Security researchers found two AI-branded VS Code extensions with 1.5M installs that covertly send source code and files to China-based servers.
A compromised Open VSX publisher account was used to distribute malicious extensions in a new GlassWorm supply chain attack.
In a a robust Hacker News thread sparked by Jamf Threat Labs research, a VS Code team member defended the editor's Workspace ...
Every code editor promises to be fast. VS Code dominated for years by being "fast enough." Now Google's Antigravity claims to revolutionize coding with AI agents. But both share the same fundamental ...
By Karyna Naminas, CEO of Label Your Data Choosing the right AI assistant can save you hours of debugging, documentation, and boilerplate coding. But when it comes to Gemini vs […] ...
Discover the leading AI code review tools reshaping DevOps practices in 2026, enhancing code quality, security, and team productivity with automated solutions.
Web browsers are among the most essential pieces of software we use daily, yet we often take them for granted. Most users settle for whatever default ships with their devices -- and that's a mistake.
Attackers can abuse VS Code configuration files for RCE when a GitHub Codespaces user opens a repository or pull request.
Visual Studio Code 1.109 introduces enhancements for providing agents with more skills and context and managing multiple ...
Two malicious extensions in Microsoft’s Visual Studio Code (VSCode) Marketplace that were collectively installed 1.5 million times exfiltrate developer data to China-based servers. Both extensions are ...