Follow

thehackernews.com/2026/03/glas
GlassWorm Targets Developers Via Extensions The GlassWorm campaign deployed 72 malicious extensions through the Open VSX registry, compromising 151 GitHub repositories...

... to establish footholds within developer environments through trusted tooling channels. The operation follows a documented supply-chain pattern: infiltrate upstream package sources rather than end targets directly. Corrupted extensions distributed through legitimate registries bypass standard perimeter controls, as developer workstations typically treat registry-sourced packages as implicitly verified. Open sources - closed narratives

Sign in to participate in the conversation
廣場🚩:長毛象自由站,歡迎豆瓣鄉親及臉書逃難者

那年的廣場,那些年的廣場,讓我們重造廣場。手機App:https://tooot.app/