惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

Google DeepMind News
Google DeepMind News
F
Fortinet All Blogs
阮一峰的网络日志
阮一峰的网络日志
Apple Machine Learning Research
Apple Machine Learning Research
爱范儿
爱范儿
WordPress大学
WordPress大学
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
J
Java Code Geeks
罗磊的独立博客
S
SegmentFault 最新的问题
V
V2EX
V
Visual Studio Blog
钛媒体:引领未来商业与生活新知
钛媒体:引领未来商业与生活新知
美团技术团队
博客园 - 三生石上(FineUI控件)
Stack Overflow Blog
Stack Overflow Blog
Y
Y Combinator Blog
MyScale Blog
MyScale Blog
D
Docker
Google DeepMind News
Google DeepMind News
Blog — PlanetScale
Blog — PlanetScale
M
Microsoft Research Blog - Microsoft Research
Martin Fowler
Martin Fowler
S
Secure Thoughts
B
Blog
cs.CL updates on arXiv.org
cs.CL updates on arXiv.org
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Recent Announcements
Recent Announcements
MongoDB | Blog
MongoDB | Blog
C
Cisco Blogs
C
CERT Recently Published Vulnerability Notes
T
True Tiger Recordings
GbyAI
GbyAI
P
Proofpoint News Feed
P
Privacy International News Feed
Jina AI
Jina AI
The Cloudflare Blog
I
Intezer
AWS News Blog
AWS News Blog
Hacker News - Newest:
Hacker News - Newest: "LLM"
S
Security Archives - TechRepublic
NISL@THU
NISL@THU
The Register - Security
The Register - Security
Recent Commits to openclaw:main
Recent Commits to openclaw:main
P
Palo Alto Networks Blog
S
Schneier on Security
L
LINUX DO - 热门话题
C
CXSECURITY Database RSS Feed - CXSecurity.com
Security Latest
Security Latest
C
Cybersecurity and Infrastructure Security Agency CISA

The Hacker News

Megalodon GitHub Attack Targets 5,561 Repos with Malicious CI/CD Workflows Making Vulnerable Drivers Exploitable Without Hardware - The BYOVD Perspective Kimwolf DDoS Botnet Operator Arrested in Canada Over DDoS-for-Hire Attacks CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories Microsoft Warns of Two Actively Exploited Defender Vulnerabilities When Identity is the Attack Path 9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros GitHub Internal Repositories Breached via Malicious Nx Console VS Code Extension Highly Critical Drupal Core Flaw Exposes PostgreSQL Sites to RCE Attacks Microsoft Open-Sources RAMPART and Clarity to Secure AI Agents During Development Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API Agent AI is Coming. Are You Ready? Typosquatting Is No Longer a User Problem. It's a Supply Chain Problem Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit Grafana GitHub Breach Exposes Source Code via TanStack npm Attack GitHub Investigating TeamPCP Claimed Breach of ~4,000 Internal Repositories Trapdoor Android Ad Fraud Scheme Hit 659 Million Daily Bid Requests Using 455 Apps DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability The New Phishing Click: How OAuth Consent Bypasses MFA Drupal to Release Urgent Core Security Updates on May 20, Sites Told to Prepare SEPPMail Secure E-Mail Gateway Vulnerabilities Enable RCE and Mail Traffic Access Compromised Nx Console 18.95.0 Targeted VS Code Developers with Credential Stealer Popular GitHub Action Tags Redirected to Imposter Commit to Steal CI/CD Credentials Mini Shai-Hulud Pushes Malicious AntV npm Packages via Compromised Maintainer Account INTERPOL Operation Ramz Disrupts MENA Cybercrime Networks with 201 Arrests ⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and More How to Reduce Phishing Exposure Before It Turns into Business Disruption Ivanti, Fortinet, SAP, VMware, n8n Patch RCE, SQL Injection, Privilege Escalation Flaws Four Malicious npm Packages Deliver Infostealers and Phantom Bot DDoS Malware Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations MiniPlasma Windows 0-Day Enables SYSTEM Privilege Escalation on Fully Patched Systems NGINX CVE-2026-42945 Exploited in the Wild, Causing Worker Crashes and Possible RCE Grafana GitHub Token Breach Led to Codebase Download and Extortion Attempt Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface TanStack Supply Chain Attack Hits Two OpenAI Employee Devices, Forces macOS Updates On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike PraisonAI CVE-2026-44338 Auth Bypass Targeted Within Hours of Disclosure How AI Hallucinations Are Creating Real Security Risks Windows Zero-Days Expose BitLocker Bypasses And CTFMON Privilege Escalation New Fragnesia Linux Kernel LPE Grants Root Access via Page Cache Corruption 18-Year-Old NGINX Rewrite Module Flaw Enables Unauthenticated RCE Microsoft's MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday Azerbaijani Energy Firm Hit by Repeated Microsoft Exchange Exploitation [Webinar] Why Your AppSec Tools Miss the "Lethal Path" (and How to Fix It) Most Remediation Programs Never Confirm the Fix Actually Worked Microsoft Patches 138 Vulnerabilities, Including DNS and Netlogon RCE Flaws GemStuffer Abuses 150+ RubyGems to Exfiltrate Scraped U.K. Council Portal Data Android Adds Intrusion Logging for Sophisticated Spyware Forensics New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots Webinar: What the Riskiest SOC Alerts Go Unanswered - and How Radiant Security Can Help Why Agentic AI Is Security's Next Blind Spot Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation iOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor Hackers Used AI to Develop First Known Zero-Day 2FA Bypass for Mass Exploitation ⚡ Weekly Recap: Linux Rootkit, macOS Crypto Stealer, WebSocket Skimmers and More Your Purple Team Isn't Purple — It's Just Red and Blue in the Same Room Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads Ollama Out-of-Bounds Read Vulnerability Allows Remote Process Memory Leak cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems One Click, Total Shutdown: The "Patient Zero" Webinar on Killing Stealth Breaches PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories Day Zero Readiness: The Operational Gaps That Break Incident Response PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open Your AI Agents Are Already Inside the Perimeter. Do You Know What They're Doing? Google's Android Apps Get Public Verification to Stop Supply Chain Attacks Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware
Developer Workstations Are Now Part of the Software Supply Chain
info@thehack · 2026-05-18 · via The Hacker News

Supply chain attackers are not only trying to slip malicious code into trusted software. They are trying to steal the access that makes trusted software possible. Recently, three separate campaigns hit npm, PyPI, and Docker Hub in a 48-hour window, and all three targeted secrets from developer environments and CI/CD pipelines, including API keys, cloud credentials, SSH keys, and tokens. This is an ongoing concern and is self-propagating, as seen in attacks like the "mini Shai Hulud" campaigns. 

That pattern should change how security teams think about the software supply chain.

Traditionally, security focused on shared systems like source code repositories, CI/CD platforms, artifact registries, package managers, and cloud environments. The goal was to protect production workloads and data. We absolutely still need to focus on these areas, but it is an incomplete picture. 

Modern software delivery begins before code reaches Git. It begins on the developer workstation, where code is written, dependencies are installed, credentials are tested, AI assistants are prompted, containers are built, and trusted actions begin.

Developer workstations are a real part of the software supply chain. Treating them as 'just' ordinary endpoints leaves gaps among endpoint security, identity security, application security, and supply chain governance.

Supply Chain Attacks Have Become Credential-Harvesting Operations

Recent incidents keep pointing to the same operational truth. Attackers may use poisoned packages, compromised images, dependency bots, malicious workflows, or vulnerable developer tools, but the recurring objective is access.

Events like the TeamPCP and Shai-Hulud campaigns show how supply chain attacks increasingly converge around credential theft. In the TeamPCP campaign, attackers used compromised packages and developer tooling to harvest tokens, cloud credentials, SSH keys, npm configuration files, and environment variables. 

Shai-Hulud pushed the same pattern even further, turning infected developer environments into credential collection points that exposed thousands of secrets across GitHub, cloud services, package registries, and internal systems.

That is not just software tampering. It is credential collection at the points where developers and automation already hold trust.

The supply chain is exposed when attackers gain access to credentials and context that allow them to alter, publish, build, deploy, or impersonate trusted software systems. Packages altered and published in a modern supply chain attack remain live for hours, while automation tools merge malicious updates in minutes. 

The common thread across many of the recent attacks has been secrets, either as an initial access vector or as the target of collection.

The Attacker Path Now Runs Through Developer-Side Context

The developer workstation is valuable because it concentrates context. It often contains local repositories, .env files, shell history, SSH keys, package manager credentials and configs, build scripts, debugging logs, and browser sessions. Those pieces become far more dangerous when viewed together.

A single access token may look limited in isolation. A token found next to a Git remote, deployment script, README, cloud profile, and CI configuration tells an attacker where the token fits and what it might unlock. In the Shai-Hulud 2.0 campaign, for example, GitHub credentials dominated the exposed and exfiltrated credentials, each with potential admin access to repositories and CI workflows. 

Local compromise is not only a device problem. It can serve as a map for source control, cloud accounts, package publishing workflows, CI/CD systems, internal APIs, and production-adjacent infrastructure.

Developer Machines Concentrate Software Delivery Authority

A standard employee laptop may expose corporate data. A developer workstation may expose the ability to change software. That distinction is critical when considering endpoint security. 

Developers often need broad access to do their jobs. They clone private repositories, authenticate to cloud services, publish packages, access staging environments, and interact with multiple internal tools. Their machines become a working intersection of source code, credentials, automation, and delivery authority.

While not every developer has production access, many do have enough access to influence the systems that eventually produce production outcomes. A registry token can affect packages. A GitHub token can affect repositories or workflows. A cloud profile can expose infrastructure. A CI/CD credential can affect build behavior. 

The board and auditors do not care if a developer stored a secret locally. The business risk is really that a local exposure gives attackers a path into systems that build, modify, release, or operate software. 

That shift changes the questions security teams should ask:

  • Can you identify which credentials are usable from developer workstations?
  • Can you limit the value and lifetime of those credentials?
  • Can you detect sensitive material before it enters Git history, CI logs, tickets, artifacts, or chat?
  • Can you revoke and rotate access quickly when you suspect workstation compromise?
  • Can you tell the difference between low-impact local exposure and credentials with admin-like privilege?

Those questions sit between AppSec, endpoint, identity, platform, and cloud security. However your organization chooses to coordinate, you must understand how developer behavior connects to delivery systems.

Automation And AI Make The Exposure Surface Thinner And Faster

Automation has compressed the time between compromise and impact. Dependency update bots can open and merge changes quickly. CI/CD systems can execute trusted workflows automatically. Package managers can run installation scripts. AI agents and coding assistants can read files, call tools, generate commands, inspect output, and move context across systems.

Automation is not inherently unsafe, but typically, any automation inherits trust, especially if it comes in an agentic form. If a malicious dependency update appears routine, an automated workflow may move it forward faster than a human reviewer can understand what happened. 

AI In The Loop

AI-assisted development adds another set of handoff points. Sensitive data can appear in prompts, terminal output, tool calls, generated code, agent memory, logs, and local configuration copied into a debugging session. The issue is broader than whether a model provider stores prompts. The larger issue is that local development context now flows through more semi-automated systems.

Security teams should evaluate AI coding risk through the same lens they use for supply chain risk. Teams need to answer: what sources and data can the tool read? What can it execute? Where does output go? What credentials are nearby? And, maybe most importantly, what trust does the workflow inherit?

Downstream Controls Still Matter, But They Are Too Late By Themselves

Repository scanning, branch protection, CI/CD policy, artifact signing, dependency analysis, and runtime controls remain essential. They create shared enforcement points and help teams govern software at scale.

The problem is now timing, thanks to the speed of modern attacks. Attackers now leverage AI-powered tools to exploit any and all secrets within seconds of discovery. 

Guardrails reduce potential exposure and the blast radius. Catching sensitive material while a developer is editing a file, preparing a commit, running a local command, installing a dependency, or interacting with an AI assistant keeps the impact to a minimum. 

Mature programs distinguish between actions that should be blocked, actions that should give warnings, and actions that should merely generate telemetry for deeper investigation. The goal is not to bury developers in friction. 

Treat The Workstation As A Local Supply Chain Boundary

The modern software supply chain does not start when code is pushed. It starts where code, credentials, automation, and trust first come together. 

It is time to treat the developer workstation as a local supply chain boundary. That boundary includes the IDE, terminal, Git client, package manager, container tooling, cloud CLI, local build system, secrets handling practices, AI assistants, and automation agents. It is the place where individual developer action becomes organizational software delivery risk.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.