Saturday, 14 March 2026

GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers

iT4iNT SERVER Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a "significant escalation" in how it propagates through the Open VSX registry.
"Instead of requiring every malicious listing to embed the loader directly, the threat actor is now abusing extensionPack and extensionDependencies to turn initially standalone-looking extensions into transitive VDS VPS Cloud


http://dlvr.it/TRV2DS

No comments:

Post a Comment

Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain

iT4iNT SERVER Cybersecurity researchers have discovered a critical "by design" weakness in the Model Context Protocol's (MCP) ...