GoKawiil
Tech News
clear
Topic Analysis:
Today
This Week
This Month
This Year
1.
Open VSX rotates access tokens used in supply-chain malware attack
(bleepingcomputer.com)
2025-11-03 |
related products
| tags:
extensions
,
malicious
,
open
2.
The security paradox of local LLMs
(news.ycombinator.com)
2025-10-31 | by Jacek Migdal |
related products
| tags:
code
,
local
,
malicious
3.
CISA: High-severity Windows SMB flaw now exploited in attacks
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
2025
,
cisa
,
malicious
4.
Malicious crypto-stealing VSCode extensions resurface on OpenVSX
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
koi
,
malicious
,
security
5.
A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones
(wired.com)
2025-10-31 | by Dan Goodin |
related products
| tags:
app
,
attack
,
gpu
6.
Hackers can steal 2FA codes and private messages from Android phones
(arstechnica.com)
2025-10-31 |
related products
| tags:
android
,
app
,
attack
7.
Researchers find just 250 malicious documents can leave LLMs vulnerable to backdoors
(engadget.com)
2025-10-31 |
related products
| tags:
data
,
llm
,
malicious
8.
Malicious Rust packages on Crates.io steal crypto wallet keys
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
crate
,
crates
,
malicious
9.
NPM package caught using QR Code to fetch cookie-stealing malware
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
code
,
codes
,
malicious
10.
Hidden risk in Notion 3.0 AI agents: Web search tool abuse for data exfiltration
(news.ycombinator.com)
2025-10-31 |
related products
| tags:
client
,
data
,
malicious
11.
CISA exposes malware kits deployed in Ivanti EPMM attacks
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
cisa
,
ivanti
,
malicious
12.
Tinycolor supply chain attack post-mortem
(news.ycombinator.com)
2025-10-31 | by Scott Cooper |
related products
| tags:
github
,
malicious
,
npm
13.
Microsoft adds malicious link warnings to Teams private chats
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
feature
,
malicious
,
message
14.
Hackers left empty-handed after massive NPM supply-chain attack
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
attack
,
cloud
,
environments
15.
Hackers steal 3,325 secrets in GhostAction GitHub supply chain attack
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
gitguardian
,
github
,
malicious
16.
6 browser-based attacks all security teams should be ready for in 2025
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
attackers
,
browser
,
malicious
17.
Threat actors abuse X’s Grok AI to spread malicious links
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
grok
,
instead
,
link
18.
Why you should delete your browser extensions right now - or do this to stay safe
(zdnet.com)
2025-10-31 | by Jack Wallen |
related products
| tags:
browser
,
extension
,
extensions
19.
How RubyGems.org protects OSS infrastructure
(news.ycombinator.com)
2025-10-31 | by Marty Haught |
related products
| tags:
malicious
,
org
,
rubygems
20.
Malicious Android apps with 19M installs removed from Google Play
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
anatsa
,
apps
,
google
21.
LLMs and coding agents are a security nightmare
(news.ycombinator.com)
2025-10-31 | by Gary Marcus |
related products
| tags:
agents
,
code
,
coding
22.
LLMs and Coding Agents = Security Nightmare
(news.ycombinator.com)
2025-10-31 | by Gary Marcus |
related products
| tags:
agents
,
code
,
coding
23.
DoubleAgents: Fine-Tuning LLMs for Covert Malicious Tool Calls
(news.ycombinator.com)
2025-10-31 | by Justin Albrethsen |
related products
| tags:
fine
,
llm
,
llms
24.
60 malicious Ruby gems downloaded 275,000 times steal credentials
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
gems
,
malicious
,
ruby
25.
Fake WhatsApp developer libraries hide destructive data-wiping code
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
com
,
github
,
malicious
26.
Wave of 150 crypto-draining extensions hits Firefox add-on store
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
add
,
extensions
,
koi
27.
Attackers exploit link-wrapping services to steal Microsoft 365 logins
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
email
,
link
,
malicious
28.
Inside a Real Clickfix Attack: How This Social Engineering Hack Unfolds
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
browser
,
clickfix
,
clipboard
29.
Flaw in Gemini CLI AI coding assistant allowed stealthy code execution
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
command
,
gemini
,
malicious
30.
Hackers breach Toptal GitHub account, publish malicious npm packages
(bleepingcomputer.com)
2025-10-31 |
related products
| tags:
github
,
malicious
,
packages
1
2
next ›
Today's top topics:
apple
google
zdnet
iphone
amazon
reviews
editorial
game
android
samsung
View all today's topics →