Tag: party libraries

  • Unit 42: "Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack

    Source URL: https://unit42.paloaltonetworks.com/npm-supply-chain-attack/ Source: Unit 42 Title: "Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack Feedly Summary: Self-replicating worm “Shai-Hulud” has compromised 180-plus software packages in a supply chain attack targeting the npm ecosystem. We discuss scope and more. The post “Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack appeared first on Unit…

  • The Register: Ivanti patches two zero-days under active attack as intel agency warns customers

    Source URL: https://www.theregister.com/2025/05/14/ivanti_patches_two_zerodays_and/ Source: The Register Title: Ivanti patches two zero-days under active attack as intel agency warns customers Feedly Summary: Vendor says vulns are linked with 2 mystery open source libraries integrated into EPMM product Australia’s intelligence agency is warning organizations about several new Ivanti zero-days chained for remote code execution (RCE) attacks. The…

  • Slashdot: Over 3,200 Cursor Users Infected by Malicious Credential-Stealing npm Packages

    Source URL: https://developers.slashdot.org/story/25/05/11/2222257/over-3200-cursor-users-infected-by-malicious-credential-stealing-npm-packages?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Over 3,200 Cursor Users Infected by Malicious Credential-Stealing npm Packages Feedly Summary: AI Summary and Description: Yes Summary: The text highlights a recent cybersecurity threat involving malicious npm (Node Package Manager) packages that target the AI-powered code-editing tool Cursor on macOS. The packages are designed to steal user credentials…

  • Slashdot: AI-Generated Code Creates Major Security Risk Through ‘Package Hallucinations’

    Source URL: https://developers.slashdot.org/story/25/04/29/1837239/ai-generated-code-creates-major-security-risk-through-package-hallucinations?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: AI-Generated Code Creates Major Security Risk Through ‘Package Hallucinations’ Feedly Summary: AI Summary and Description: Yes Summary: The study highlights a critical vulnerability in AI-generated code, where a significant percentage of generated packages reference non-existent libraries, posing substantial risks for supply-chain attacks. This phenomenon is more prevalent in open…

  • Hacker News: Dangerous dependencies in third-party software – the underestimated risk

    Source URL: https://linux-howto.org/article/dangerous-dependencies-in-third-party-software-the-underestimated-risk Source: Hacker News Title: Dangerous dependencies in third-party software – the underestimated risk Feedly Summary: Comments AI Summary and Description: Yes **Short Summary with Insight:** The provided text offers an extensive exploration of the vulnerabilities associated with software dependencies, particularly emphasizing the risks posed by third-party libraries in the rapidly evolving landscape…

  • Hacker News: Microsoft Go 1.24 FIPS changes

    Source URL: https://devblogs.microsoft.com/go/go-1-24-fips-update/ Source: Hacker News Title: Microsoft Go 1.24 FIPS changes Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the advancements in Go 1.24’s cryptography packages towards achieving FIPS 140-3 compliance, emphasizing significant changes that enhance security for developers using Go. Key improvements include native support for FIPS-compliant libraries, streamlined…