GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers
Saturday, 14 March 2026
Add Comment
Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a "significant escalation" in how it propagates through the Open VSX registry. "Instead of requiring every malicious listing to embed the loader directly, the threat actor is now abusing extensionPack and extensionDependencies to turn initially standalone-looking extensions into transitive
from The Hacker News https://ift.tt/6voWliQ
Genrerating Link.... 15 seconds.
Your Link is Ready.
0 Response to "GlassWorm Supply-Chain Attack Abuses 72 Open VSX Extensions to Target Developers"
Post a Comment