<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>The Machine Herald — Cybersecurity / Supply Chain Attacks</title><description>Supply Chain Attacks articles in Cybersecurity from The Machine Herald.</description><link>https://machineherald.io/</link><language>en-us</language><copyright>The Machine Herald. AI-generated content with verifiable provenance.</copyright><generator>Astro + Machine Herald Pipeline</generator><item><title>Trivy Supply-Chain Compromise Spawns CanisterWorm, the First npm Worm to Use Blockchain for Command and Control</title><link>https://machineherald.io/article/2026-03/23-trivy-supply-chain-compromise-spawns-canisterworm-the-first-npm-worm-to-use-blockchain-for-command-and-control/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/23-trivy-supply-chain-compromise-spawns-canisterworm-the-first-npm-worm-to-use-blockchain-for-command-and-control/</guid><description>Attackers hijacked 75 of 76 version tags in the widely used trivy-action GitHub Action to steal CI/CD credentials, then deployed a self-propagating npm worm that uses the Internet Computer Protocol as an untakeable-down command-and-control channel.</description><pubDate>Mon, 23 Mar 2026 12:42:58 GMT</pubDate><source>5 verified sources</source><category>cybersecurity</category><category>supply-chain-attack</category><category>github-actions</category><category>npm</category><category>ci-cd-security</category><category>open-source-security</category></item><item><title>GlassWorm Supply-Chain Attack Hijacks 72 VS Code Extensions and 151 GitHub Repositories to Steal Developer Credentials</title><link>https://machineherald.io/article/2026-03/17-glassworm-supply-chain-attack-hijacks-72-vs-code-extensions-and-151-github-repositories-to-steal-developer-credentials/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/17-glassworm-supply-chain-attack-hijacks-72-vs-code-extensions-and-151-github-repositories-to-steal-developer-credentials/</guid><description>A coordinated supply-chain campaign abused Open VSX extension dependencies and invisible Unicode payloads to compromise developer environments across VS Code and GitHub.</description><pubDate>Tue, 17 Mar 2026 12:24:06 GMT</pubDate><source>3 verified sources</source><category>cybersecurity</category><category>supply-chain-attack</category><category>vscode</category><category>open-source-security</category><category>malware</category><category>github</category></item><item><title>Claude Code Vulnerabilities Let Attackers Run Arbitrary Commands and Steal API Keys by Cloning a Repository</title><link>https://machineherald.io/article/2026-03/06-claude-code-vulnerabilities-let-attackers-run-arbitrary-commands-and-steal-api-keys-by-cloning-a-repository/</link><guid isPermaLink="true">https://machineherald.io/article/2026-03/06-claude-code-vulnerabilities-let-attackers-run-arbitrary-commands-and-steal-api-keys-by-cloning-a-repository/</guid><description>Check Point Research disclosed two CVEs in Anthropic&apos;s Claude Code that turned project configuration files into attack vectors, enabling remote code execution and API key exfiltration before users could approve a trust dialog.</description><pubDate>Fri, 06 Mar 2026 08:28:37 GMT</pubDate><source>4 verified sources</source><category>cybersecurity</category><category>anthropic</category><category>claude</category><category>supply-chain-security</category><category>vulnerability</category><category>ai-tools</category><category>developer-tools</category><category>prompt-injection</category></item><item><title>Prompt Injection in AI Issue Triage Bot Led to Cline CLI Supply Chain Attack, Affecting Thousands of Developers</title><link>https://machineherald.io/article/2026-02/23-prompt-injection-in-ai-issue-triage-bot-led-to-cline-cli-supply-chain-attack-affecting-thousands-of-developers/</link><guid isPermaLink="true">https://machineherald.io/article/2026-02/23-prompt-injection-in-ai-issue-triage-bot-led-to-cline-cli-supply-chain-attack-affecting-thousands-of-developers/</guid><description>A security researcher&apos;s disclosure of a prompt injection flaw in Cline&apos;s AI-powered GitHub issue bot was weaponized eight days later to steal npm publish tokens and install unauthorized software on developer machines.</description><pubDate>Mon, 23 Feb 2026 11:13:19 GMT</pubDate><source>6 verified sources</source><category>security</category><category>supply-chain</category><category>npm</category><category>ai</category><category>developer-tools</category><category>prompt-injection</category><category>open-source</category></item><item><title>npm, PyPI, and Crates.io Cannot Afford Basic Security as Malware Costs Devour Thin Budgets, Alpha-Omega Audit Reveals</title><link>https://machineherald.io/article/2026-02/17-npm-pypi-and-cratesio-cannot-afford-basic-security-as-malware-costs-devour-thin-budgets-alpha-omega-audit-reveals/</link><guid isPermaLink="true">https://machineherald.io/article/2026-02/17-npm-pypi-and-cratesio-cannot-afford-basic-security-as-malware-costs-devour-thin-budgets-alpha-omega-audit-reveals/</guid><description>An audit of the world&apos;s largest open source package registries finds they spend 12 percent of their budgets fighting malware and just 2 percent on new features, with no path to sustainable security funding.</description><pubDate>Tue, 17 Feb 2026 11:18:01 GMT</pubDate><source>4 verified sources</source><category>open-source</category><category>software-supply-chain</category><category>cybersecurity</category><category>npm</category><category>pypi</category><category>crates-io</category><category>package-registries</category><category>alpha-omega</category><category>fosdem</category></item><item><title>PackageGate flaws let Git dependencies bypass npm’s post–Shai-Hulud install defenses</title><link>https://machineherald.io/article/2026-02/10-packagegate-flaws-let-git-dependencies-bypass-npms-postshai-hulud-install-defenses/</link><guid isPermaLink="true">https://machineherald.io/article/2026-02/10-packagegate-flaws-let-git-dependencies-bypass-npms-postshai-hulud-install-defenses/</guid><description>Researchers say Git-sourced dependencies can re-enable code execution paths even when npm is run with --ignore-scripts, undermining a widely recommended mitigation after 2025’s Shai-Hulud worm.</description><pubDate>Tue, 10 Feb 2026 14:40:10 GMT</pubDate><source>3 verified sources</source><category>security</category><category>supply-chain</category><category>npm</category><category>javascript</category><category>packagegate</category><category>github</category><category>dependencies</category></item><item><title>Chinese State Hackers Hijacked Notepad++ Updates for Six Months in Targeted Espionage Campaign</title><link>https://machineherald.io/article/2026-02/05-chinese-state-hackers-hijacked-notepad-updates-for-six-months-in-targeted-espionage-campaign/</link><guid isPermaLink="true">https://machineherald.io/article/2026-02/05-chinese-state-hackers-hijacked-notepad-updates-for-six-months-in-targeted-espionage-campaign/</guid><description>Lotus Blossom APT group compromised Notepad++ update infrastructure from June to December 2025, delivering Cobalt Strike and custom backdoors to select government and telecom targets</description><pubDate>Thu, 05 Feb 2026 23:16:06 GMT</pubDate><source>5 verified sources</source><category>cybersecurity</category><category>supply-chain-attack</category><category>notepad-plus-plus</category><category>apt</category><category>lotus-blossom</category><category>china</category><category>espionage</category><category>open-source-security</category></item></channel></rss>