<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Developer Tools &#8211; Cyber Pulse Academy</title>
	<atom:link href="https://www.cyberpulseacademy.com/tag/developer-tools/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.cyberpulseacademy.com</link>
	<description></description>
	<lastBuildDate>Mon, 16 Feb 2026 04:17:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://files.servewebsite.com/2023/07/ea224bb3-generated-image-1763134673008-enlarge.png</url>
	<title>Developer Tools &#8211; Cyber Pulse Academy</title>
	<link>https://www.cyberpulseacademy.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users</title>
		<link>https://www.cyberpulseacademy.com/open-vsx-supply-chain-attack/</link>
					<comments>https://www.cyberpulseacademy.com/open-vsx-supply-chain-attack/#respond</comments>
		
		<dc:creator><![CDATA[Cyber Pulse Academy]]></dc:creator>
		<pubDate>Mon, 02 Feb 2026 00:49:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[News - February 2026]]></category>
		<category><![CDATA[Developer Tools]]></category>
		<guid isPermaLink="false">https://www.cyberpulseacademy.com/?p=13283</guid>

					<description><![CDATA[In February 2026, attackers compromised a legitimate developer account on Open VSX to push malicious extension updates carrying the sophisticated GlassWorm malware. This post breaks down the attack chain, maps it to MITRE ATT&#38;CK, and provides actionable defense steps for developers and security teams.]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="13283" class="elementor elementor-13283" data-elementor-post-type="post">
				<header class="elementor-element elementor-element-fac0736 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="fac0736" data-element_type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-732c738 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="732c738" data-element_type="container">
				<div class="elementor-element elementor-element-dfd8dbd elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="dfd8dbd" data-element_type="widget" data-widget_type="divider.default">
				<div class="elementor-widget-container">
							<div class="elementor-divider">
			<span class="elementor-divider-separator">
						</span>
		</div>
						</div>
				</div>
				<div class="elementor-element elementor-element-2cc13f1 elementor-widget elementor-widget-wpr-breadcrumbs-pro" data-id="2cc13f1" data-element_type="widget" data-widget_type="wpr-breadcrumbs-pro.default">
				<div class="elementor-widget-container">
					<div class="wpr-post-breadcrumbs"><ul class="wpr-breadcrumbs"><li><a href="https://www.cyberpulseacademy.com">Home</a></li><li>/</li><li>Developer Tools</li></ul></div>				</div>
				</div>
				</div>
					</div>
				</header>
		<div class="elementor-element elementor-element-6a15589 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="6a15589" data-element_type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-507248a e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="507248a" data-element_type="container">
				<div class="elementor-element elementor-element-e9b53fc elementor-widget elementor-widget-template" data-id="e9b53fc" data-element_type="widget" data-widget_type="template.default">
				<div class="elementor-widget-container">
							<div class="elementor-template">
					<div data-elementor-type="page" data-elementor-id="13142" class="elementor elementor-13142" data-elementor-post-type="elementor_library">
				<div class="elementor-element elementor-element-ae173d5 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="ae173d5" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-f9db92a elementor-widget elementor-widget-html" data-id="f9db92a" data-element_type="widget" data-widget_type="html.default">
				<div class="elementor-widget-container">
					    <!-- Main Title -->
    <h1 class="global-title">Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users</h1>

    <!-- Decorative HR at beginning -->
    <hr style="border: 0;height: 1px;background: linear-gradient(90deg, transparent, #00D9FF, transparent);margin: 40px 0">

    <!-- Executive Summary / Introduction -->
    <h2 id="executive-summary" style="color: #00D9FF;font-size: 1.8em;margin-top: 30px;margin-bottom: 15px;font-weight: 600;line-height: 1.3">📋 Executive Summary</h2>
    <p>On January 30, 2026, a sophisticated <span class="threat-word">supply chain attack</span> hit the Open VSX Registry, a popular open-source marketplace for VS Code extensions. Attackers compromised a legitimate developer account (<strong>oorzc</strong>) and published malicious updates to four widely used extensions. These poisoned versions, collectively downloaded over 22,000 times, delivered the <span class="threat-word">GlassWorm malware loader</span>, designed to steal credentials, crypto wallets, and sensitive developer data.</p>
    <br>
    <p>This <span class="protect-word">beginner-friendly breakdown</span> walks you through the entire attack chain, maps it to <strong>MITRE ATT&amp;CK® techniques</strong>, and provides clear, actionable steps to defend against such threats, whether you're a developer, security student, or IT professional. Understanding this <strong>Open VSX supply chain attack</strong> is crucial in today's interconnected software ecosystem.</p>
    <hr style="border: 0;height: 1px;background: linear-gradient(90deg, transparent, #00D9FF, transparent);margin: 40px 0">
    <!-- Table of Contents -->
    <div class="toc-box">
        <h3 style="color: #00D9FF;margin-top: 0">📑 Table of Contents</h3>
        <ol>
            <li><a href="#executive-summary">Executive Summary</a></li>
            <li><a href="#real-world-scenario">Real-World Scenario</a></li>
            <li><a href="#attack-breakdown">Step-by-Step Attack Breakdown</a></li>
            <li><a href="#mitre-attack">MITRE ATT&amp;CK Mapping</a></li>
            <li><a href="#red-blue">Red Team vs Blue Team View</a></li>
            <li><a href="#mistakes-bestpractices">Common Mistakes &amp; Best Practices</a></li>
            <li><a href="#faq">FAQ</a></li>
            <li><a href="#key-takeaways">Key Takeaways &amp; CTA</a></li>
        </ul>
    </div>

    <hr class="section-divider">

    <!-- Real-World Scenario -->
    <h2 id="real-world-scenario" style="color: #00D9FF;font-size: 1.8em;margin-top: 30px;margin-bottom: 15px;font-weight: 600;line-height: 1.3">🌐 Real-World Scenario: When Trusted Tools Turn Toxic</h2>
    <p>Imagine you're a developer starting your day. You run <code>ext install oorzc.ssh-tools</code> to sync files via FTP, a tool you've trusted for two years. But this time, the update quietly installs a hidden <span class="threat-word">malware loader</span>. That's exactly what happened to thousands of developers in the <strong>Open VSX supply chain attack</strong>.</p>
    <br>
    <p>The attacker didn't create new, suspicious extensions, they hijacked <strong>established, legitimate ones</strong> from the publisher <em>oorzc</em>. This made the malicious updates blend in perfectly. The four extensions targeted were:</p>
    <ul class="all-list">
        <li><strong>FTP/SFTP/SSH Sync Tool</strong> (oorzc.ssh-tools version 0.5.1)</li>
        <li><strong>I18n Tools</strong> (oorzc.i18n-tools-plus version 1.6.8)</li>
        <li><strong>vscode mindmap</strong> (oorzc.mind-map version 1.0.61)</li>
        <li><strong>scss to css</strong> (oorzc.scss-to-css-compile version 1.3.4)</li>
    </ul>
    <p>These extensions had a combined history of over 22,000 downloads before the incident, making the <span class="threat-word">supply chain compromise</span> exceptionally effective.</p>

    <br><img decoding="async" class="aligncenter size-full wp-image-3716" src="https://files.servewebsite.com/2026/02/ec5dea63-2026-02_001_1.jpg" alt="Open VSX supply chain attack flow diagram showing account compromise leading to malware distribution and data theft" title="Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users 1">

    <hr class="section-divider">

    <!-- Step-by-Step Attack Breakdown -->
    <h2 id="attack-breakdown" style="color: #00D9FF;font-size: 1.8em;margin-top: 30px;margin-bottom: 15px;font-weight: 600;line-height: 1.3">🔍 Step-by-Step: How the Open VSX Supply Chain Attack Unfolded</h2>

    <div class="step-box">
        <h3 class="step-title">Step 1: Account Compromise (Initial Access)</h3>
        <p>The attackers gained unauthorized access to the <strong>oorzc</strong> publisher account on Open VSX. This was achieved via a <span class="threat-word">leaked token</span> or credential theft exact method unknown, but it falls under <strong>Valid Accounts (T1078)</strong> in MITRE ATT&amp;CK.</p>
    </div>

    <div class="step-box">
        <h3 class="step-title">Step 2: Malicious Extension Publication (Supply Chain Compromise)</h3>
        <p>Using the compromised account, attackers uploaded new versions of four existing extensions. The code was modified to include an obfuscated <span class="threat-word">GlassWorm loader</span>. These updates were signed and pushed as routine maintenance, bypassing any manual review.</p>
    </div>

    <div class="step-box">
        <h3 class="step-title">Step 3: User Execution (T1204)</h3>
        <p>Developers with auto-update enabled or those who manually updated received the malicious versions. The extensions still functioned normally, so no immediate red flags were raised.</p>
    </div>

    <div class="step-box">
        <h3 class="step-title">Step 4: Malware Loader Activation (Defense Evasion)</h3>
        <p>The malicious code used <strong>runtime decryption</strong> (T1027 - Obfuscated Files or Information) to unpack the final payload. It also employed <span class="threat-word">EtherHiding</span>: it fetched the real command-and-control (C2) addresses from <strong>Solana blockchain memos</strong> a clever way to rotate infrastructure without updating the extension (T1102 - Web Service).</p>
    </div>

    <div class="step-box">
        <h3 class="step-title">Step 5: Reconnaissance &amp; Evasion</h3>
        <p>Before deploying the full data-stealing payload, the malware checked the system locale. If it matched a <strong>Russian region</strong>, it would abort a classic sign of <span class="threat-word">Russian-affiliated threat actors</span> avoiding domestic prosecution (T1497 - Virtualization/Sandbox Evasion).</p>
    </div>

    <div class="step-box">
        <h3 class="step-title">Step 6: Data Exfiltration</h3>
        <p>The final <strong>GlassWorm</strong> payload harvested:</p>
        <ul class="all-list">
            <li>Browser data (logins, cookies, history, MetaMask wallets) from Chromium and Firefox.</li>
            <li>Documents from Desktop, Documents, Downloads.</li>
            <li>FortiClient VPN configs.</li>
            <li>Developer credentials: <code>~/.aws</code>, <code>~/.ssh</code>, npm <code>_authToken</code>, GitHub tokens.</li>
        </ul>
        <p>This data was exfiltrated over the C2 channel (T1041).</p>
    </div>

    <br><img decoding="async" class="aligncenter size-full wp-image-3716" src="https://files.servewebsite.com/2026/02/ae84e0d4-2026-02_001_2.jpg" alt="EtherHiding technique used in Open VSX supply chain attack to fetch dynamic C2 addresses from Solana memos" title="Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users 2">

    <hr class="section-divider">

    <!-- MITRE ATT&amp;CK Mapping -->
    <h2 id="mitre-attack" style="color: #00D9FF;font-size: 1.8em;margin-top: 30px;margin-bottom: 15px;font-weight: 600;line-height: 1.3">📌 MITRE ATT&amp;CK Techniques Used in This Attack</h2>
    <p>Mapping the <strong>Open VSX supply chain attack</strong> to the MITRE ATT&amp;CK framework helps us understand the adversary's playbook and build better defenses.</p>

    <table>
        <thead>
            <tr><th>Tactic</th><th>Technique ID</th><th>Name</th><th>How It Was Used</th></tr>
        </thead>
        <tbody>
            <tr><td><strong>Initial Access</strong></td><td>T1078.004</td><td>Valid Accounts: Cloud Accounts</td><td>Compromised Open VSX publisher account</td></tr>
            <tr><td><strong>Execution</strong></td><td>T1204.002</td><td>User Execution: Malicious File</td><td>Users installed the trojanized extension</td></tr>
            <tr><td><strong>Persistence</strong></td><td>T1195.002</td><td>Supply Chain Compromise</td><td>Malicious updates in trusted extensions</td></tr>
            <tr><td><strong>Defense Evasion</strong></td><td>T1027</td><td>Obfuscated Files or Information</td><td>Loader decrypted at runtime</td></tr>
            <tr><td><strong>Defense Evasion</strong></td><td>T1140</td><td>Deobfuscate/Decode Files</td><td>Runtime decryption of payload</td></tr>
            <tr><td><strong>Command and Control</strong></td><td>T1102</td><td>Web Service</td><td>EtherHiding using Solana memos for C2</td></tr>
            <tr><td><strong>Credential Access</strong></td><td>T1555.003</td><td>Credentials from Web Browsers</td><td>Stealing browser logins and cookies</td></tr>
            <tr><td><strong>Credential Access</strong></td><td>T1552</td><td>Unsecured Credentials</td><td>Scraping AWS, SSH, npm, GitHub tokens</td></tr>
            <tr><td><strong>Collection</strong></td><td>T1005</td><td>Data from Local System</td><td>Documents from user folders</td></tr>
            <tr><td><strong>Exfiltration</strong></td><td>T1041</td><td>Exfiltration Over C2 Channel</td><td>Stolen data sent to attacker server</td></tr>
            <tr><td><strong>Discovery/Evasion</strong></td><td>T1497</td><td>Virtualization/Sandbox Evasion</td><td>Locale check to avoid infecting Russian systems</td></tr>
        </tbody>
    </table>

    <hr class="section-divider">

    <!-- Red Team vs Blue Team View -->
    <h2 id="red-blue" style="color: #00D9FF;font-size: 1.8em;margin-top: 30px;margin-bottom: 15px;font-weight: 600;line-height: 1.3">⚔️ Red Team vs Blue Team: Attacker Mindset vs Defender Actions</h2>
    <div class="red-blue-box">
        <div class="red-team">
            <h3>🔴 Red Team (Threat Actor) View</h3>
            <ul class="all-list">
                <li><strong>Goal:</strong> Infiltrate developer ecosystems to steal credentials and intellectual property.</li>
                <li><strong>Tactic:</strong> Compromise a trusted account (oorzc) to piggyback on existing reputation.</li>
                <li><strong>Evasion:</strong> Use EtherHiding (blockchain) for resilient C2, avoiding hardcoded IPs.</li>
                <li><strong>Payload:</strong> Multi-stage loader that checks for Russian locale before detonating.</li>
                <li><strong>Targets:</strong> npm tokens, AWS keys, SSH, browser wallets high-value assets for lateral movement.</li>
            </ul>
        </div>
        <div class="blue-team">
            <h3>🔵 Blue Team (Defender) View</h3>
            <ul class="all-list">
                <li><strong>Challenge:</strong> Detecting malicious updates in trusted extensions requires behavioral analysis.</li>
                <li><strong>Action:</strong> Monitor for unusual outbound connections (e.g., to blockchain nodes).</li>
                <li><strong>Response:</strong> Rapid takedown of malicious versions (done by Open VSX team).</li>
                <li><strong>Hunt:</strong> Look for processes accessing browser profile data or SSH keys unexpectedly.</li>
                <li><strong>Fix:</strong> Encourage MFA and token rotation for all publisher accounts; use runtime integrity checks.</li>
            </ul>
        </div>
    </div>

    <hr class="section-divider">

    <!-- Common Mistakes &amp; Best Practices -->
    <h2 id="mistakes-bestpractices" style="color: #00D9FF;font-size: 1.8em;margin-top: 30px;margin-bottom: 15px;font-weight: 600;line-height: 1.3">⚠️ Common Mistakes &amp; Best Practices</h2>

    <h3 style="color: #FF6B9D;font-size: 1.5em;margin-top: 25px;margin-bottom: 12px;font-weight: 600;line-height: 1.3">Mistakes (What Went Wrong)</h3>
    <ul class="mistake-list">
        <li><span class="threat-word">No MFA enforcement</span> on the Open VSX publisher account (likely).</li>
        <li>Extensions were <strong>not cryptographically signed</strong> in a way that prevents tampering.</li>
        <li>Users and organizations <strong>lacked visibility</strong> into extension behavior (no runtime monitoring).</li>
        <li>Assumption that <strong>"established" extensions are safe</strong> attackers exploit this trust.</li>
        <li>No immediate rollback mechanism: even after removal, infected versions persist until a clean update is published.</li>
    </ul>

    <h3 style="color: #FF6B9D;font-size: 1.5em;margin-top: 25px;margin-bottom: 12px;font-weight: 600;line-height: 1.3">Best Practices (How to Defend)</h3>
    <ul class="best-list">
        <li><span class="protect-word">Enforce MFA and short-lived tokens</span> for all extension publishers.</li>
        <li>Use <strong>extension allowlisting</strong> and only install from verified publishers after review.</li>
        <li>Monitor for <strong>suspicious behavior</strong>: unexpected network calls (especially to blockchain), file access to credential folders.</li>
        <li>Implement <strong>runtime application self-protection (RASP)</strong> or endpoint detection rules for credential access.</li>
        <li>Regularly audit installed extensions and compare hashes with known-good versions.</li>
        <li>For developers: use <strong>dedicated development environments</strong> or sandboxes to limit blast radius.</li>
        <li>Stay informed: follow security feeds like Socket.dev or The Hacker News for IoCs.</li>
    </ul>

    <br><img decoding="async" class="aligncenter size-full wp-image-3716" src="https://files.servewebsite.com/2026/02/27ffb2ad-2026-02_001_3.jpg" alt="Extension security best practices checklist for Open VSX supply chain attack prevention" title="Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users 3">

    <hr class="section-divider">

    <!-- FAQ Section -->
    <h2 id="faq" style="color: #00D9FF;font-size: 1.8em;margin-top: 30px;margin-bottom: 15px;font-weight: 600;line-height: 1.3">❓ Frequently Asked Questions</h2>

    <h3 style="color: #FF6B9D;font-size: 1.5em;margin-top: 25px;margin-bottom: 12px;font-weight: 600;line-height: 1.3">1. What is Open VSX and why was it targeted?</h3>
    <p>Open VSX is an open-source registry for VS Code extensions, used by platforms like Eclipse Theia and Gitpod. It's a prime target because compromising it can affect many developer tools downstream.</p>
    <br>
    <h3 style="color: #FF6B9D;font-size: 1.5em;margin-top: 25px;margin-bottom: 12px;font-weight: 600;line-height: 1.3">2. How does EtherHiding work?</h3>
    <p>EtherHiding uses blockchain transactions (like Solana memos) to store encrypted C2 addresses. The malware reads these memos to find where to send stolen data, making the infrastructure dynamic and hard to block.</p>
    <br>
    <h3 style="color: #FF6B9D;font-size: 1.5em;margin-top: 25px;margin-bottom: 12px;font-weight: 600;line-height: 1.3">3. Could this happen to the official VS Code Marketplace?</h3>
    <p>Yes, similar risks exist. Microsoft enforces more security (like code signing), but supply chain attacks via compromised accounts are always possible. Always verify publisher reputation and use additional tools.</p>
    <br>
    <h3 style="color: #FF6B9D;font-size: 1.5em;margin-top: 25px;margin-bottom: 12px;font-weight: 600;line-height: 1.3">4. How can I check if I'm affected?</h3>
    <p>Check your installed extensions against the list of malicious versions: versions 0.5.1 (ssh-tools), 1.6.8 (i18n-tools-plus), 1.0.61 (mind-map), 1.3.4 (scss-to-css). If you have them, assume compromise and rotate all credentials immediately.</p>
    <br>
    <h3 style="color: #FF6B9D;font-size: 1.5em;margin-top: 25px;margin-bottom: 12px;font-weight: 600;line-height: 1.3">5. What is GlassWorm malware?</h3>
    <p>GlassWorm is a sophisticated information stealer that targets developer machines. It steals browser credentials, crypto wallets, cloud tokens, and VPN configs, often used for lateral movement into corporate networks.</p>

    <hr class="section-divider">

    <!-- Key Takeaways &amp; Call to Action -->
    <h2 id="key-takeaways" style="color: #00D9FF;font-size: 1.8em;margin-top: 30px;margin-bottom: 15px;font-weight: 600;line-height: 1.3">✅ Key Takeaways</h2>
    <ul class="all-list">
        <li>The <strong>Open VSX supply chain attack</strong> highlights that <span class="threat-word">trusted accounts can be weaponized</span>.</li>
        <li>Attackers use advanced evasion like <strong>EtherHiding</strong> and <strong>runtime decryption</strong> to avoid detection.</li>
        <li>Both publishers and consumers must adopt <span class="protect-word">defense-in-depth</span>: MFA, behavioral monitoring, and credential hygiene.</li>
        <li>MITRE ATT&amp;CK mapping helps us understand adversary behavior and prioritize defenses (e.g., monitor T1102, T1552).</li>
        <li>Even after malicious extensions are removed, affected systems remain compromised until cleaned response must be swift.</li>
    </ul>

    <hr class="section-divider">

    <!-- Call to Action -->
    <h2 style="color: #00D9FF;font-size: 1.8em;margin-top: 30px;margin-bottom: 15px;font-weight: 600;line-height: 1.3">🚀 Next Steps for Your Security Journey</h2>
    <p>Stay ahead of threats like this <strong>Open VSX supply chain attack</strong> by continuously learning and implementing proactive measures.</p>
    <br>
    <p><span class="protect-word">👉 Bookmark</span> these resources for deeper dives:</p>
    <ul class="all-list">
        <li><a href="https://socket.dev/blog/open-vsx-supply-chain-attack-analysis" target="_blank" rel="noopener noreferrer">Socket's detailed analysis (External)</a></li>
        <li><a href="https://attack.mitre.org/" target="_blank" rel="noopener noreferrer">MITRE ATT&amp;CK® Framework</a></li>
        <li><a href="https://open-vsx.org/" target="_blank" rel="noopener noreferrer">Open VSX Registry (External)</a></li>
        <li><a href="https://thehackernews.com/" target="_blank" rel="noopener noreferrer">The Hacker News (External)</a></li>
    </ul>

    <!-- Required footer div -->
    <div class="footer-note">
        <p>© Cyber Pulse Academy. This content is provided for educational purposes only.</p>
        <p>Always consult with security professionals for organization-specific guidance.</p>
    </div>				</div>
				</div>
					</div>
				</div>
				</div>
				</div>
						</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-45990d8 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="45990d8" data-element_type="container">
				<div class="elementor-element elementor-element-988fcc5 elementor-widget__width-inherit elementor-widget elementor-widget-template" data-id="988fcc5" data-element_type="widget" data-widget_type="template.default">
				<div class="elementor-widget-container">
							<div class="elementor-template">
					<div data-elementor-type="container" data-elementor-id="11836" class="elementor elementor-11836" data-elementor-post-type="elementor_library">
				<div class="elementor-element elementor-element-3f67943 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="3f67943" data-element_type="container">
				<div class="elementor-element elementor-element-f4c05d5 elementor-widget elementor-widget-html" data-id="f4c05d5" data-element_type="widget" data-widget_type="html.default">
				<div class="elementor-widget-container">
					<hr style="border: 0;height: 1px;background: linear-gradient(90deg, transparent, #00D9FF, transparent);margin: 20px 0">
    <h4 style="text-align: center">Latest News</h4>
<hr style="border: 0;height: 1px;background: linear-gradient(90deg, transparent, #00D9FF, transparent);margin: 20px 0">				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-1a9ff89 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="1a9ff89" data-element_type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-0535694 wpr-grid-columns-1 wpr-grid-columns--tablet2 wpr-grid-columns--mobile1 wpr-grid-pagination-center wpr-item-styles-inner elementor-widget elementor-widget-wpr-grid" data-id="0535694" data-element_type="widget" data-widget_type="wpr-grid.default">
				<div class="elementor-widget-container">
					<ul class="wpr-grid-filters elementor-clearfix wpr-grid-filters-sep-right"><li class=" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-fade"><span  data-filter="*" class="wpr-grid-filters-item wpr-active-filter "><i class=" wpr-grid-filters-icon-left"></i>All Posts<sup data-brackets="yes"></sup></span><em class="wpr-grid-filters-sep"></em></li><li class=" wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-fade"><span   data-ajax-filter=["category","all-news"]  data-filter=".category-all-news"><i class=" wpr-grid-filters-icon-left"></i>News<sup data-brackets="yes"></sup></span><em class="wpr-grid-filters-sep"></em></li></ul><section class="wpr-grid elementor-clearfix" data-settings="{&quot;layout&quot;:&quot;masonry&quot;,&quot;stick_last_element_to_bottom&quot;:&quot;no&quot;,&quot;columns_desktop&quot;:&quot;1&quot;,&quot;gutter_hr&quot;:15,&quot;gutter_hr_mobile&quot;:15,&quot;gutter_hr_mobile_extra&quot;:15,&quot;gutter_hr_tablet&quot;:15,&quot;gutter_hr_tablet_extra&quot;:15,&quot;gutter_hr_laptop&quot;:15,&quot;gutter_hr_widescreen&quot;:15,&quot;gutter_vr&quot;:15,&quot;gutter_vr_mobile&quot;:15,&quot;gutter_vr_mobile_extra&quot;:15,&quot;gutter_vr_tablet&quot;:15,&quot;gutter_vr_tablet_extra&quot;:15,&quot;gutter_vr_laptop&quot;:15,&quot;gutter_vr_widescreen&quot;:15,&quot;animation&quot;:&quot;default&quot;,&quot;animation_duration&quot;:0.3,&quot;animation_delay&quot;:0.1,&quot;deeplinking&quot;:&quot;no&quot;,&quot;filters_linkable&quot;:&quot;no&quot;,&quot;filters_default_filter&quot;:&quot;&quot;,&quot;filters_count&quot;:&quot;yes&quot;,&quot;filters_hide_empty&quot;:&quot;yes&quot;,&quot;filters_animation&quot;:&quot;fade-slide&quot;,&quot;filters_animation_duration&quot;:0.3,&quot;filters_animation_delay&quot;:0.1,&quot;pagination_type&quot;:&quot;load-more&quot;,&quot;pagination_max_pages&quot;:11,&quot;lightbox&quot;:{&quot;selector&quot;:&quot;.wpr-grid-image-wrap&quot;,&quot;iframeMaxWidth&quot;:&quot;60%&quot;,&quot;hash&quot;:false,&quot;autoplay&quot;:&quot;true&quot;,&quot;pause&quot;:5000,&quot;progressBar&quot;:&quot;true&quot;,&quot;counter&quot;:&quot;true&quot;,&quot;controls&quot;:&quot;true&quot;,&quot;getCaptionFromTitleOrAlt&quot;:&quot;true&quot;,&quot;thumbnail&quot;:&quot;true&quot;,&quot;showThumbByDefault&quot;:&quot;true&quot;,&quot;share&quot;:&quot;true&quot;,&quot;zoom&quot;:&quot;true&quot;,&quot;fullScreen&quot;:&quot;true&quot;,&quot;download&quot;:&quot;true&quot;}}"><article class="wpr-grid-item elementor-clearfix post-13874 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-supply-chain-security"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/d6e6206f-2026-02_015.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/d6e6206f-2026-02_015.jpg" alt="Proactive Defense: Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions" class="wpr-anim-timing-ease-default" title="Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users 4"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/open-vsx-pre-publish-security-checks/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 21, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-238" href="https://www.cyberpulseacademy.com/tag/supply-chain-security/">Supply Chain Security</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/open-vsx-pre-publish-security-checks/">Proactive Defense: Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13852 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-software-security"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/5705c8a4-2026-02_014.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/5705c8a4-2026-02_014.jpg" alt="CISA Flags Critical SolarWinds Web Help Desk RCE Bug Under Active Attack" class="wpr-anim-timing-ease-default" title="Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users 5"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/solarwinds-web-rce-vulnerability/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 4, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-237" href="https://www.cyberpulseacademy.com/tag/software-security/">Software Security</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/solarwinds-web-rce-vulnerability/">CISA Flags Critical SolarWinds Web Help Desk RCE Bug Under Active Attack</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13828 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-artificial-intelligence"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/69824945-2026-02_013.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/69824945-2026-02_013.jpg" alt="DockerDash Vulnerability: Critical AI Flaw in Docker Desktop Enables Code Execution via Image Metadata" class="wpr-anim-timing-ease-default" title="Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users 6"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/dockerdash-vulnerability-guide/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 3, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-143" href="https://www.cyberpulseacademy.com/tag/artificial-intelligence/">Artificial Intelligence</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/dockerdash-vulnerability-guide/">DockerDash Vulnerability: Critical AI Flaw in Docker Desktop Enables Code Execution via Image Metadata</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13274 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-cloud-computing"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/2e895a8b-2026-02_011.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/2e895a8b-2026-02_011.jpg" alt="When the Cloud Fails: Protecting Identity Systems from Widespread Outages" class="wpr-anim-timing-ease-default" title="Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users 7"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/cloud-outage-identity-resilience/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 3, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-236" href="https://www.cyberpulseacademy.com/tag/cloud-computing/">Cloud Computing</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/cloud-outage-identity-resilience/">When the Cloud Fails: Protecting Identity Systems from Widespread Outages</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13272 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-open-source"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/76a46ad9-2026-02_012.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/76a46ad9-2026-02_012.jpg" alt="Metro4Shell Under Fire: How Attackers Exploit CVE-2025-11953 in React Native Tooling" class="wpr-anim-timing-ease-default" title="Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users 8"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/metro4shell-rce-exploitation-guide/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 3, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-174" href="https://www.cyberpulseacademy.com/tag/open-source/">Open Source</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/metro4shell-rce-exploitation-guide/">Metro4Shell Under Fire: How Attackers Exploit CVE-2025-11953 in React Native Tooling</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13273 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-vulnerability"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/a8388a10-2026-02_010.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/a8388a10-2026-02_010.jpg" alt="APT28 Weaponizes Microsoft Office CVE-2026-21509: A Deep Dive into Operation Neusploit" class="wpr-anim-timing-ease-default" title="Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users 9"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/apt28-cve-2026-21509-office-exploit/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 3, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-144" href="https://www.cyberpulseacademy.com/tag/vulnerability/">Vulnerability</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/apt28-cve-2026-21509-office-exploit/">APT28 Weaponizes Microsoft Office CVE-2026-21509: A Deep Dive into Operation Neusploit</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13276 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-artificial-intelligence"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/8d059fc3-2026-02_009.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/8d059fc3-2026-02_009.jpg" alt="Firefox’s One-Click AI Kill Switch: Master Your Generative AI Privacy" class="wpr-anim-timing-ease-default" title="Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users 10"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/firefox-generative-ai-privacy-control/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 3, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-143" href="https://www.cyberpulseacademy.com/tag/artificial-intelligence/">Artificial Intelligence</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/firefox-generative-ai-privacy-control/">Firefox’s One-Click AI Kill Switch: Master Your Generative AI Privacy</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13275 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-malware"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/4939bab1-2026-02_008.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/4939bab1-2026-02_008.jpg" alt="Lotus Blossom&#8217;s Notepad++ Supply Chain Attack: A Deep Dive into the Chrysalis Backdoor" class="wpr-anim-timing-ease-default" title="Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users 11"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/notepad-plus-plus-supply-chain-attack/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 3, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-147" href="https://www.cyberpulseacademy.com/tag/malware/">Malware</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/notepad-plus-plus-supply-chain-attack/">Lotus Blossom&#8217;s Notepad++ Supply Chain Attack: A Deep Dive into the Chrysalis Backdoor</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13277 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-malware"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/27e0de7e-2026-02_007.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/27e0de7e-2026-02_007.jpg" alt="341 Malicious ClawHub Skills Exposed in OpenClaw Supply Chain Attack" class="wpr-anim-timing-ease-default" title="Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users 12"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/clawhub-malicious-skills-attack/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 2, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-147" href="https://www.cyberpulseacademy.com/tag/malware/">Malware</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/clawhub-malicious-skills-attack/">341 Malicious ClawHub Skills Exposed in OpenClaw Supply Chain Attack</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article><article class="wpr-grid-item elementor-clearfix post-13278 post type-post status-publish format-standard has-post-thumbnail hentry category-all-news category-february-2026-news tag-vulnerability"><div class="wpr-grid-item-inner"><div class="wpr-grid-media-wrap wpr-effect-size-medium " data-overlay-link="yes"><div class="wpr-grid-image-wrap" data-src="https://files.servewebsite.com/2026/02/cbb5b3e3-2026-02_006.jpg" data-img-on-hover=""  data-src-secondary=""><img decoding="async" data-no-lazy="1" src="https://files.servewebsite.com/2026/02/cbb5b3e3-2026-02_006.jpg" alt="Critical OpenClaw Remote Code Execution: One-Click Exploit Puts AI Assistants at Risk" class="wpr-anim-timing-ease-default" title="Open VSX Supply Chain Attack: How a Compromised Dev Account Spread GlassWorm Malware to 22,000+ Users 13"></div><div class="wpr-grid-media-hover wpr-animation-wrap"><div class="wpr-grid-media-hover-bg " data-url="https://www.cyberpulseacademy.com/openclaw-remote-code-execution/"></div><div class="wpr-grid-media-hover-bottom elementor-clearfix"><div class="wpr-grid-item-date elementor-repeater-item-a52412d wpr-grid-item-display-inline wpr-grid-item-align-right"><div class="inner-block"><span>February 2, 2026</span></div></div></div></div></div><div class="wpr-grid-item-below-content elementor-clearfix"><div class="wpr-grid-item-post_tag elementor-repeater-item-f5a6d7f wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-underline wpr-pointer-line-fx wpr-pointer-fx-fade wpr-grid-tax-style-1"><div class="inner-block"><a class="wpr-pointer-item wpr-tax-id-144" href="https://www.cyberpulseacademy.com/tag/vulnerability/">Vulnerability</a></div></div><h3 class="wpr-grid-item-title elementor-repeater-item-bf79233 wpr-grid-item-display-block wpr-grid-item-align-left wpr-pointer-none wpr-pointer-line-fx wpr-pointer-fx-slide"><div class="inner-block"><a target="_blank" href="https://www.cyberpulseacademy.com/openclaw-remote-code-execution/">Critical OpenClaw Remote Code Execution: One-Click Exploit Puts AI Assistants at Risk</a></div></h3><div class="wpr-grid-item-separator elementor-repeater-item-db41e7b wpr-grid-item-display-block wpr-grid-item-align-left wpr-grid-sep-style-1"><div class="inner-block"><span></span></div></div></div></div></article></section><div class="wpr-grid-pagination elementor-clearfix wpr-grid-pagination-load-more"><a href="https://www.cyberpulseacademy.com/tag/developer-tools/feed/page/2/" class="wpr-load-more-btn" data-e-disable-page-transition>Load More</a><div class="wpr-pagination-loading"><div class="wpr-double-bounce"><div class="wpr-child wpr-double-bounce1"></div><div class="wpr-child wpr-double-bounce2"></div></div></div><p class="wpr-pagination-finish">End of Content.</p></div>				</div>
				</div>
					</div>
				</div>
				</div>
				</div>
						</div>
				</div>
		<div class="elementor-element elementor-element-120484c e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child" data-id="120484c" data-element_type="container">
				<div class="elementor-element elementor-element-ab0ee4b elementor-widget__width-inherit elementor-widget elementor-widget-html" data-id="ab0ee4b" data-element_type="widget" data-widget_type="html.default">
				<div class="elementor-widget-container">
					<div class="donation-section">
        <div class="donation-card">
            <!-- header: shield + lock, cyber style -->
            <div class="donation-header">
                <h3>DONATE · SUPPORT</h3>
            </div>

            <div class="donation-message">
                <!-- honest, direct text – no fluff -->
                <div class="donation-text">
                    <i class="fas fa-bolt" style="margin-right: 10px;color: #0ff"></i> 
                    <strong>We keep threat intelligence free.</strong> No paywalls, no ads.  
                    Your donation directly funds server infrastructure, research, and tools.  
                    Every contribution - no matter the size - makes this platform sustainable.
                </div>

                <!-- brief, honest closing – human &amp; direct -->
                <div class="honest-note">
                    <i class="fas fa-hand-holding-heart" style="margin-left: 8px"></i>
                    100% of your support goes to the platform. No corporate sponsors, just the community.
                </div>
            </div>

            <!-- subtle terminal status -->
            <div style="position: absolute;bottom: 15px;right: 25px;font-size: 0.7rem;letter-spacing: 3px">
                <i class="fas fa-terminal"></i> ROOT::DONATE
            </div>
        </div>
    </div>				</div>
				</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-6c6d5ed e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="6c6d5ed" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-ee79e02 elementor-widget elementor-widget-wpr-post-navigation" data-id="ee79e02" data-element_type="widget" data-widget_type="wpr-post-navigation.default">
				<div class="elementor-widget-container">
					<div class="wpr-post-navigation-wrap elementor-clearfix wpr-post-nav-static-wrap wpr-post-nav-dividers"><div class="wpr-post-nav-prev wpr-post-navigation wpr-post-nav-static"><a href="https://www.cyberpulseacademy.com/chainlit-vulnerabilities-ai-framework/" class="elementor-clearfix"><div class="wpr-posts-navigation-svg-wrapper"><svg version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 291.4 512" style="enable-background:new 0 0 291.4 512;" xml:space="preserve"><g><path class="st0" d="M281.1,451.5c13.8,13.8,13.8,36.3,0,50.1c-13.8,13.8-36.3,13.8-50.1,0L10.4,281C3.5,274.1,0,265.1,0,256c0-9.1,3.5-18.1,10.4-25L231,10.4c13.8-13.8,36.3-13.8,50.1,0c6.9,6.9,10.4,16,10.4,25s-3.5,18.1-10.4,25L85.5,256L281.1,451.5z"/></g></svg></div><div class="wpr-post-nav-labels"><span>Previous Post</span></div></a></div><div class="wpr-post-nav-divider"></div><div class="wpr-post-nav-next wpr-post-navigation wpr-post-nav-static"><a href="https://www.cyberpulseacademy.com/escan-antivirus-supply-chain-attack/" class="elementor-clearfix"><div class="wpr-post-nav-labels"><span>Next Post</span></div><div class="wpr-posts-navigation-svg-wrapper"><svg style="transform: rotate(180deg); -webkit-transform: rotate(180deg);" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" x="0px" y="0px" viewBox="0 0 291.4 512" style="enable-background:new 0 0 291.4 512;" xml:space="preserve"><g><path class="st0" d="M281.1,451.5c13.8,13.8,13.8,36.3,0,50.1c-13.8,13.8-36.3,13.8-50.1,0L10.4,281C3.5,274.1,0,265.1,0,256c0-9.1,3.5-18.1,10.4-25L231,10.4c13.8-13.8,36.3-13.8,50.1,0c6.9,6.9,10.4,16,10.4,25s-3.5,18.1-10.4,25L85.5,256L281.1,451.5z"/></g></svg></div></a></div></div>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-f92fca0 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="f92fca0" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-1e766f4 wpr-comment-reply-separate wpr-comment-reply-align-right elementor-widget elementor-widget-wpr-post-comments" data-id="1e766f4" data-element_type="widget" data-widget_type="wpr-post-comments.default">
				<div class="elementor-widget-container">
					<div class="wpr-comments-wrap" id="comments">	<div id="respond" class="comment-respond">
		<h3 id="wpr-reply-title" class="wpr-comment-reply-title">Leave a Comment <small><a rel="nofollow" id="cancel-comment-reply-link" href="/tag/developer-tools/feed/#respond" style="display:none;">Cancel reply</a></small></h3><form action="https://www.cyberpulseacademy.com/comments/" method="post" id="wpr-comment-form" class="wpr-comment-form wpr-cf-style-6 wpr-cf-no-url" novalidate><p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message">Required fields are marked <span class="required">*</span></span></p><div class="wpr-comment-form-text"><textarea name="comment" placeholder="Message*" cols="45" rows="8" maxlength="65525"></textarea></div><div class="wpr-comment-form-fields"> <div class="wpr-comment-form-author"><input type="text" name="author" placeholder="Name*"/></div>
<div class="wpr-comment-form-email"><input type="text" name="email" placeholder="Email*"/></div>
</div>
<p class="form-submit"><input name="submit" type="submit" id="wpr-submit-comment" class="wpr-submit-comment" value="Submit" /> <input type='hidden' name='comment_post_ID' value='13283' id='comment_post_ID' />
<input type='hidden' name='comment_parent' id='comment_parent' value='0' />
</p><p style="display: none;"><input type="hidden" id="akismet_comment_nonce" name="akismet_comment_nonce" value="1cc9ed5899" /></p><br /><div  class='g-recaptcha lz-recaptcha' data-sitekey='6Lc9PoMsAAAAAFp10uygUH8ZjhLtd9yoDUh1U9Rq' data-theme='light' data-size='normal'></div>
<noscript>
	<div style='width: 302px; height: 352px;'>
		<div style='width: 302px; height: 352px; position: relative;'>
			<div style='width: 302px; height: 352px; position: absolute;'>
				<iframe src='https://www.google.com/recaptcha/api/fallback?k=6Lc9PoMsAAAAAFp10uygUH8ZjhLtd9yoDUh1U9Rq' frameborder='0' scrolling='no' style='width: 302px; height:352px; border-style: none;'>
				</iframe>
			</div>
			<div style='width: 250px; height: 80px; position: absolute; border-style: none; bottom: 21px; left: 25px; margin: 0px; padding: 0px; right: 25px;'>
				<textarea name='g-recaptcha-response' class='g-recaptcha-response' style='width: 250px; height: 80px; border: 1px solid #c1c1c1; margin: 0px; padding: 0px; resize: none;' value=''>
				</textarea>
			</div>
		</div>
	</div>
</noscript><br><p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>&#916;<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="40"/><script>document.getElementById( "ak_js_1" ).setAttribute( "value", ( new Date() ).getTime() );</script></p></form>	</div><!-- #respond -->
	</div>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-aa5e7f1 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="aa5e7f1" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-241730d wpr-stt-btn-align-fixed wpr-stt-btn-align-fixed-right elementor-widget elementor-widget-wpr-back-to-top" data-id="241730d" data-element_type="widget" data-widget_type="wpr-back-to-top.default">
				<div class="elementor-widget-container">
					<div class="wpr-stt-wrapper"><div class='wpr-stt-btn' data-settings='{&quot;animation&quot;:&quot;fade&quot;,&quot;animationOffset&quot;:&quot;0&quot;,&quot;animationDuration&quot;:&quot;200&quot;,&quot;fixed&quot;:&quot;fixed&quot;,&quot;scrolAnim&quot;:&quot;800&quot;}'><span class="wpr-stt-icon"><i class="fas fa-arrow-circle-up"></i></span></div></div>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-5cf11c7 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent" data-id="5cf11c7" data-element_type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-6761662 elementor-align-justify button-donate elementor-widget__width-initial elementor-fixed elementor-widget elementor-widget-paypal-button" data-id="6761662" data-element_type="widget" data-settings="{&quot;_position&quot;:&quot;fixed&quot;,&quot;merchant_account&quot;:&quot;simple&quot;}" data-widget_type="paypal-button.default">
				<div class="elementor-widget-container">
									<div class="elementor-button-wrapper">
							<form action="https://www.paypal.com/cgi-bin/webscr" method="post" target="_blank">
			<input type="hidden" name="cmd" value="_donations" />
			<input type="hidden" name="business" value="marzouk.souhaieb@proton.me" />
			<input type="hidden" name="lc" value="US" />
			<input type="hidden" name="item_name" value="Cyber Pulse Academy Platform Donation" />
			<input type="hidden" name="item_number" value="" />
			<input type="hidden" name="currency_code" value="EUR" />
			<input type="hidden" name="amount" value="" />
			<input type="hidden" name="no_note" value="1">

					<button class="elementor-button elementor-size-sm elementor-paypal-legacy elementor-payment-button" role="button" type="submit">
					<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<i aria-hidden="true" class="fas fa-donate"></i>			</span>
									<span class="elementor-button-text">Donate Now</span>
					</span>
				</button>
				</form>
						</div>
								</div>
				</div>
					</div>
				</div>
				</div>
		]]></content:encoded>
					
					<wfw:commentRss>https://www.cyberpulseacademy.com/open-vsx-supply-chain-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
