The GlassWorm supply-chain campaign has returned with a new, coordinated attack that targeted hundreds of packages, ...
GlassWorm campaign injects malware into GitHub Python repos using stolen tokens since March 8, 2026, exposing developers to ...
When I open my local copy of my tracking repo of the microsoft/vscode repo I get this message in the Extension Host output channel: 2026-03-05 16:37:29.200 [info] ExtensionService#_doActivateExtension ...
The Glassworm campaign has compromised over 151 GitHub repositories and npm packages using invisible Unicode payloads that ...
Threat actors are publishing clean extensions that later update to depend on hidden payload packages, bypassing marketplace ...
New AI-assisted development approach reduces costs and accelerates delivery timelines for modern JavaScript applications ...
GlassWorm campaign used 72 malicious Open VSX extensions and infected 151 GitHub repositories, enabling stealth supply-chain attacks on developers.
How can an extension change hands with no oversight?
More fun than it should be, honestly.