Infrastructure delivering updates for Notepad++—a widely used text editor for Windows—was compromised for six months by ...
The cybersecurity community is still grappling with a sobering realization: one of the most ubiquitous tools in the developer’s toolkit, Notepad++, was hiding a critical vulnerability for over six ...
State-sponsored threat actors compromised the popular code editor's hosting provider to redirect targeted users to malicious downloads.
Notepad++ targeted and used to deliver poisoned updates to a select group of victims.
The developer of the popular text editor Notepad++ said hackers associated with the Chinese government hijacked its software update mechanism to deliver tainted software to users for months.
Notepad++ has adopted a "double-lock" design for its update mechanism to address recently exploited security gaps that ...
Notepad++ 8.9.2 fixes update hijack exploited to deliver malware, patches RCE flaw, and hardens WinGUp security.
Notepad++ improves security mechanisms and closes a new vulnerability that allows attackers to execute malicious code.
CISA has expanded its KEV catalog with new SolarWinds, Notepad++, and Apple flaws, including two exploited as zero-days.
The Notepad++ supply chain compromise is the latest proof that sophisticated adversaries are deliberately targeting the gap between two disciplines: Vulnerability management and detection and response ...
TL;DR: Notepad++ was compromised for six months, but it wasn't the software itself which the exploit leveraged, but its hosting provider. An investigation into the attack has just been concluded with ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results