Content has been added to your Folio

Research, News, and Perspectives

Add Filters
Filter by:
Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads
Artificial Intelligence (AI)

Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads

A packaging error in Anthropic’s Claude Code npm release briefly exposed internal source code. This entry examines how threat actors rapidly weaponized the resulting attention, pivoting an existing AI-themed campaign to spread Vidar and GhostSocks.

03/04/2026
Artificial Intelligence (AI)

Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads

A packaging error in Anthropic’s Claude Code npm release briefly exposed internal source code. This entry examines how threat actors rapidly weaponized the resulting attention, pivoting an existing AI-themed campaign to spread Vidar and GhostSocks.

Research 03/04/2026

Save to Folio

Research 03/04/2026

Save to Folio

Privacy & Risks

TrendAI Insight: New U.S. National Cyber Strategy

TrendAI reviews the White House National Cyber Strategy, outlining six pillars to strengthen U.S. cybersecurity—from deterrence and regulation to federal modernization, critical infrastructure protection, AI leadership, and workforce development.

Latest News 01/04/2026

Save to Folio

Latest News 01/04/2026

Save to Folio

Artificial Intelligence (AI)

The Real Risk of Vibecoding

This blog looks at how AI‑driven vibecoding speeds up software development while increasing security risk by outpacing traditional review and ownership. It explains why security needs to move earlier and be built into modern development workflows.

Expert Perspective 31/03/2026

Save to Folio

Expert Perspective 31/03/2026

Save to Folio

Artificial Intelligence (AI)

Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise

TeamPCP orchestrated one of the most sophisticated multi-ecosystem supply chain campaigns publicly documented to date. It cascaded through developer tooling and compromised LiteLLM and exposed how AI proxy services that concentrate API keys and cloud credentials become high-value collateral when supply chain attacks compromise upstream dependencies.

Latest News 26/03/2026

Save to Folio

Latest News 26/03/2026

Save to Folio