Malicious Code Infiltrates Python Package Index

A recent supply-chain attack on a popular Python package has raised a critical question: how much trust do you really have in the software that quietly powers your work? A malicious .pth file hidden in the litellm package version 1.82.8 can automatically execute malicious code on every Python startup.

https://osintsights.com/malicious-code-infiltrates-python-package-index?utm_source=mastodon&utm_medium=social

#SupplyChain #PythonPackageIndex #MaliciousCode #EmergingThreats #SoftwareCompromise

Malicious Code Infiltrates Python Package Index

Malicious code infiltrates Python Package Index via litellm package, discover how to protect your environment now and prevent similar supply-chain attacks effectively.

OSINTSights
📢 Oh no, the Telnyx Python SDK has been breached! 😱 Apparently, someone thought it was a great idea to sneak malicious code into #PyPI. 🚨 This is what happens when your "supply chain security" is more like "supply chain Swiss cheese." 🧀🔒
https://telnyx.com/resources/telnyx-python-sdk-supply-chain-security-notice-march-2026 #TelnyxSDK #Breach #MaliciousCode #SupplyChainSecurity #Vulnerability #HackerNews #ngated
Telnyx Python SDK Security Notice: Malicious PyPI Versions Identified (March 2026)

Telnyx identified and removed malicious Python SDK versions (4.87.1 and 4.87.2) published to PyPI. The platform was not compromised. Learn who is affected and the steps to remediate securely.

When I use Channel4(UK) app, whenever a McDonald's advert comes on, the app will freeze on an image while subtitles and sound usually carry on -- causing me to need to close the app.

I call this the Channel4 "Google Play Services, Adobe, Location Tracking, Malicious Code" glitch. 👍

#Google #Android #Adobe #LocationTracking #MaliciousCode #Channel4UK #SpyCops

Developer gets 4 years for activating network “kill switch” to avenge his firing https://arstechni.ca/k4hK #maliciouscode #cybercrime #killswitch #developer #Policy
Developer gets 4 years for activating network “kill switch” to avenge his firing

Disgruntled developer was caught after naming the “kill switch” after himself.

Ars Technica

Un hacker ha inserito codice malevolo nella estensione Amazon Q per Visual Studio Code, progettata per assistere programmatori con AI generativa. Il codice, seppur difettoso e non dannoso, mirava a cancellare dati di sistema. Amazon ha rimosso la versione compromessa e invitato gli utenti ad aggiornare all’ultima release sicura.

https://www.bleepingcomputer.com/news/security/amazon-ai-coding-agent-hacked-to-inject-data-wiping-commands/

#amazonavscode #hackerattack #maliciouscode #cybersecurity #softwareupdate

Amazon AI coding agent hacked to inject data wiping commands

A hacker planted data wiping code in a version of Amazon's generative AI-powered assistant, the Q Developer Extension for Visual Studio Code.

BleepingComputer

Ubuntu Security Flaw Lets Attackers Bypass Full Disk Encryption
#OMGUbuntu article: https://www.omgubuntu.co.uk/2025/07/ubuntu-security-initramfs-bypass-encryption

“Not all #Linux distributions are affected, such as #OpenSUSE_Tumbleweed.”

#Attackers with physical access to a Linux system can access a debug shell simply by entering the wrong #decryption #password several times in a row. On Ubuntu, they hit esc at the password prompt, punch in a few key combos and debug shell appears.
They can mount a USB drive with tools that let them modify the #initramfs (Initial RAM Filesystem – a temporary system run during boot to prep the main OS) to inject #maliciouscode, and then repack it – without tripping any #security flags.
Then, the next time the owner boots up their #laptop and enters their correct password, the code runs with elevated privileges to do whatever the #attacker wants.”

“Impactful though this exploit could be in the wild, there is no reason for most #Ubuntu users to be concerned about it.
This #vulnerability is what the security industry refer to as an '#evilmaidattack': it requires physical access to a #device to pull off.”

“Finally, protecting against this #vulnerability is easy. Users can simply tweak their system #kernel so that the #computer #reboots on failed password attempts, instead of providing a #debug shell.”

New Linux Security Flaw Uses Initramfs to Inject Malware

A newly found security flaw in Ubuntu could allow attackers with physical access to bypass full disk encryption. Learn how the attack works.

OMG! Ubuntu
Enhancing Security in VSCode Extensions: Addressing the Threat of Malicious Code

Explore the security risks of VSCode extensions and the threat of malicious code integration.

The DefendOps Diaries
🚨 Malicious commits target GitHub projects! A Texas researcher claims someone is impersonating him to sabotage his reputation. 🛑👨‍💻 #GitHub #CyberSecurity #MaliciousCode #TechNews #Hacking #DataBreach #OpenSource #IdentityTheft #CyberAttack #ResearchNews
Attack Techniques: Trojaned Clipboard

Today in “Attack techniques so stupid, they can’t possibly succeed… except they do!” — the trojan clipboard technique. The attacking website convinces the victim user …

text/plain