Avantages (suite)

- #nobuild : pas de build requis (oubliez npm et autres package.json) : le code écrit est exactement celui qui est exécuté sur le navigateur sans transformation. Les libs sont inclues dans un dossier "vendor" et ne sont pas téléchargées via un gestionnaire de dépendances (évite les #supplychainattack)

Kaspersky Uncovers Trojanized DAEMON Tools in Targeted Supply-Chain Attack

If you installed DAEMON Tools between April 8 and now, your system may be compromised - Kaspersky researchers warn that a highly sophisticated supply-chain attack has been delivering a backdoor to thousands of systems via trojanized installers. Check your machines for unusual activity and take action ASAP to…

https://osintsights.com/kaspersky-uncovers-trojanized-daemon-tools-in-targeted-supply-chain-attack?utm_source=mastodon&utm_medium=social

#SupplyChainAttack #TrojanizedSoftware #DaemonTools #EmergingThreats #BackdoorMalware

Kaspersky Uncovers Trojanized DAEMON Tools in Targeted Supply-Chain Attack

Protect your systems from Trojanized DAEMON Tools attacks. Learn how to detect abnormal activities and prevent ongoing supply-chain threats today with expert insights.

OSINTSights

Kaspersky Uncovers DAEMON Tools Supply Chain Attack

Kaspersky researchers have uncovered a sneaky supply chain attack that used compromised DAEMON Tools installers, downloaded directly from the official website, to deliver a malicious payload - and what's even scarier is that these installers were digitally signed by the very developers of DAEMON Tools themselves.

https://osintsights.com/kaspersky-uncovers-daemon-tools-supply-chain-attack?utm_source=mastodon&utm_medium=social

#SupplyChainAttack #DaemonTools #Kaspersky #EmergingThreats #MalwareOperations

Kaspersky Uncovers DAEMON Tools Supply Chain Attack

Kaspersky uncovers supply chain attack on DAEMON Tools, learn how to protect yourself from compromised installers and malicious payloads now.

OSINTSights

@mttaggart

Who submiitted the un-needed patch that created the problem?

Is Canonical intentionally delaying fix because the flaw is under active exploit?

#SupplyChainAttack

Le groupe Everest Ransomware cible Symcor, acteur clé du traitement de données financières au Canada. Les groupes de ransomware continuent de viser les prestataires qui mutualisent les données de nombreux clients — une cible, des dizaines d'impacts potentiels. La chaîne d'approvisionnement numérique reste l'un des puzzles les plus complexes à sécuriser. 🧩 #ransomware #infosec #supplychainattack
https://malware.news/t/everest-ransomware-group-strikes-canadian-firm-symcor/106628
Everest Ransomware Group Strikes Canadian Firm Symcor

Summary Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor. Enroll Now and Save 10%: Coupon Code MWNEWS10 Note: Affiliate link – your enrollment helps support this platform at no extra cost to you. On May 2, 2026, the ransomware group Everest claimed responsibility for a cyberattack against Symcor (symcor.com), a leading Canadian business process outsourcing company. The group issued a statement indicat...

Malware Analysis, News and Indicators
TeamPCP Campaign Spreads to npm via a Hijacked Bitwarden CLI - JFrog Security Research

JFrog security researchers identified a hijacked npm package published as @bitwarden/cli version 2026.4.0, impersonating the legitimate Bitwarden command line client.

Compromised tag of intercom-php published via GitHub

### Impact On April 30, 2026, a malicious commit was pushed to the intercom/intercom-php repository and tagged as version 5.0.2, using a compromised service account (github-management-service). ...

GitHub

New supply chain attack:
Any of these in use?
```
Ruby:

knot-activesupport-logger
knot-devise-jwt-helper
knot-rack-session-store
knot-rails-assets-pipeline
knot-rspec-formatter-json
knot-date-utils-rb (Sleeper gem)
knot-simple-formatter (Sleeper gem)

Go:

github[.]com/BufferZoneCorp/go-metrics-sdk
github[.]com/BufferZoneCorp/go-weather-sdk
github[.]com/BufferZoneCorp/go-retryablehttp
github[.]com/BufferZoneCorp/go-stdlib-ext
github[.]com/BufferZoneCorp/grpc-client
github[.]com/BufferZoneCorp/net-helper
github[.]com/BufferZoneCorp/config-loader
github[.]com/BufferZoneCorp/log-core (Sleeper module)
github[.]com/BufferZoneCorp/go-envconfig (Sleeper module)
```
Read more here:
https://thehackernews.com/2026/05/poisoned-ruby-gems-andago-modules.html

#linux #SupplyChainAttack #go #ruby

PyTorch Lightning Targeted in PyPI Supply Chain Credential Heist

Malicious actors have struck PyTorch Lightning with a supply chain attack, publishing two tainted package versions that automatically steal credentials when imported. The attack involves a sneaky _runtime directory with a downloader and obfuscated JavaScript payload.

https://osintsights.com/pytorch-lightning-targeted-in-pypi-supply-chain-credential-heist?utm_source=mastodon&utm_medium=social

#PytorchLightning #SupplyChainAttack #Pypi #CredentialHeist #EmergingThreats

PyTorch Lightning Targeted in PyPI Supply Chain Credential Heist

PyTorch Lightning hit by malicious PyPI packages stealing credentials learn how to protect your supply chain now from credential heists using secure package management practices today.

OSINTSights

Mini Shai-Hulud: TeamPCP compromette i pacchetti npm ufficiali di SAP in un attacco supply chain enterprise

Il gruppo TeamPCP ha compromesso i pacchetti npm ufficiali di SAP in un attacco supply chain denominato 'Mini Shai-Hulud': versioni malevole pubblicate il 29 aprile 2026 rubano credenziali AWS, Azure, GCP, token GitHub e segreti CI/CD tramite un payload multistadio basato sul runtime Bun, con esfiltrazione cifrata su repository GitHub pubblici.

https://insicurezzadigitale.com/mini-shai-hulud-teampcp-compromette-i-pacchetti-npm-ufficiali-di-sap-in-un-attacco-supply-chain-enterprise/