Another week, another poisoned update. This time it's your website.
Each time, the mechanism has been the same: attackers find a way into a trusted update system, swap the legitimate contents for something malicious, and let the trust do the rest.
Each time, the mechanism has been the same: attackers find a way into a trusted update system, swap the legitimate contents for something malicious, and let the trust do the rest.
On Tuesday we covered how Anthropic accidentally leaked the source code of Claude Code, and how criminals immediately used that leak as a lure to spread malware. But that story
Imagine you are a builder, and you trust your supplier completely. You have been using them for years
The tool was litellm. The update was versions 1.82.7 and 1.82.8. And the damage was done before anyone knew it had started.
Someone calls your IT helpdesk. They sound calm, professional, and helpful. They know the name of an employee. They say there's been a problem with a login and they need a password reset.
In late February 2026, a developer working late into the night made a series of decisions that seemed reasonable in the moment — and ended with two and a half years