Security
10 articles
-
LinkedIn Extension Scanning Allegations: BrowserGate, EU Privacy, and Competitive Intelligence
Fairlinked’s BrowserGate investigation alleges client-side extension probing on linkedin.com—what is claimed, why GDPR and DMA matter, and how SignalStack reads the security and policy stakes.
-
Axios npm Incident: Phantom Dependency, RAT Dropper, and Supply-Chain Lessons
Malicious axios@1.14.1 and axios@0.30.4 on npm via a compromised maintainer account—plain-crypto-js postinstall, RAT and C2, npm response, and SignalStack’s read for defenders and platform teams.
-
Claude Code npm Leak: Source Maps, IP Risk, and the March 2026 npm Window
@anthropic-ai/claude-code v2.1.88 briefly shipped a large .map file on npm—packaging error vs. customer breach, overlap with Axios same-day risk, and SignalStack’s read for release engineering and agent security.
-
Axios npm Compromise (Briefing): Malicious 1.14.1 / 0.30.4 and RAT Chain
March 30–31, 2026: malicious axios on npm via maintainer account, plain-crypto-js postinstall, C2 and anti-forensics—condensed briefing with link to full SignalStack analysis.
-
Miasma: Trap Paths, Poison Data, and the Economics of AI Scraping
Open-source Rust tool Miasma uses reverse-proxy trap routes and decoy pages to raise crawler cost—technical stack, ops limits, legal caveats, and SignalStack’s read on publisher vs. model economics.
-
Tesla Model 3 on a Desk: Salvage Bring-Up, Rosenberger Cables, and Security Research
Bench-mounting MCU, AP, and display from salvage—power peaks, proprietary display paths, harness-based fixes, and why offline hardware matters for automotive security work.
-
LiteLLM on PyPI: Backdoored Builds, Secret Harvest, and .pth Persistence
Reported malicious 1.82.7–1.82.8 on PyPI—import-time execution, credential theft, .pth persistence—and what defenders should do next.
-
Windows 11 ‘Fix’: Performance Reset, Ads, Copilot, and the Trust Deficit
Microsoft’s repair-first narrative versus years of Copilot surfacing, Start/Settings ads, and account pressure—what was promised, what critics cite, and what to measure next.
-
Android Sideloading ‘Advanced Flow’: 24-Hour Delay, Verification, and Coercion Breaks
Developer verification, Advanced Flow steps, scam-interruption thesis, rollout markets, and tensions between security friction and independent distribution.
-
Xbox One ‘Bliss’: Voltage Glitching, Boot Trust, and Unpatchable Hardware Reality
Public Bliss-style break of long-standing Xbox One boot protections—privileged unsigned code, ROM-era limits, and what changes for preservation versus abuse.