<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Supply Chain Attacks on The Coders Blog</title><link>https://thecodersblog.com/tag/supply-chain-attacks/</link><description>Recent content in Supply Chain Attacks on The Coders Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 01 May 2026 07:48:47 +0000</lastBuildDate><atom:link href="https://thecodersblog.com/tag/supply-chain-attacks/index.xml" rel="self" type="application/rss+xml"/><item><title>Critical Alert: Shai-Hulud Malware Discovered in PyTorch Lightning Dependencies</title><link>https://thecodersblog.com/shai-hulud-malware-in-pytorch-lightning-2026/</link><pubDate>Fri, 01 May 2026 07:48:47 +0000</pubDate><guid>https://thecodersblog.com/shai-hulud-malware-in-pytorch-lightning-2026/</guid><description>&lt;p&gt;Stop what you&amp;rsquo;re doing. A critical alert has been raised around the &amp;lsquo;Shai-Hulud Malware&amp;rsquo;, a sophisticated supply chain attack targeting the &lt;code&gt;lightning&lt;/code&gt; PyPI package, specifically versions &lt;code&gt;2.6.2&lt;/code&gt; and &lt;code&gt;2.6.3&lt;/code&gt;. This isn&amp;rsquo;t theoretical; your enterprise ML pipelines could be replicating a credential-stealing worm with every &lt;code&gt;pip install&lt;/code&gt;. This incident is a harsh lesson: the era of implicit trust in open-source ML libraries is irrevocably over for enterprise environments.&lt;/p&gt;
&lt;p&gt;The &amp;ldquo;Shai-Hulud Malware&amp;rdquo; isn&amp;rsquo;t merely a vulnerability; it&amp;rsquo;s a confirmed and active threat that has explicitly crossed from npm to compromise the PyTorch Lightning ecosystem. This attack directly hit a widely used deep-learning framework, demonstrating a sophisticated adversary&amp;rsquo;s ability to adapt and target critical infrastructure. Your next &lt;code&gt;pip install&lt;/code&gt; could be an open door.&lt;/p&gt;</description></item><item><title>Decentralized By Design: HardenedBSD Embraces Radicle for Ultimate Open Source Security (2026)</title><link>https://thecodersblog.com/hardenedbsd-s-migration-to-radicle-for-decentralized-code-hosting-2026/</link><pubDate>Wed, 29 Apr 2026 09:56:01 +0000</pubDate><guid>https://thecodersblog.com/hardenedbsd-s-migration-to-radicle-for-decentralized-code-hosting-2026/</guid><description>&lt;p&gt;Centralized code hosting isn&amp;rsquo;t just a convenience; it&amp;rsquo;s a single point of failure. The question isn&amp;rsquo;t &lt;em&gt;if&lt;/em&gt; it will be exploited, but &lt;em&gt;when&lt;/em&gt;.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="the-core-problem-your-codebase-as-a-supply-chain-ticking-time-bomb"&gt;The Core Problem: Your Codebase as a Supply Chain Ticking Time Bomb&lt;/h2&gt;
&lt;p&gt;Relying on single-entity platforms like GitHub, GitLab, or Bitbucket introduces a cascade of unacceptable risks for any serious open-source project. These centralized services offer convenience, but they do so at the cost of ultimate control and security. The moment your project lives on a corporate server, its sovereignty is compromised.&lt;/p&gt;</description></item></channel></rss>