Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

Defensive Security Podcast Episode 340

9 snips
Feb 24, 2026
Discussion of a Notepad++ supply-chain compromise and how open-source projects respond. Exploration of malware hidden in developer coding challenges and abuse of centralized code hosting. Overview of macOS infostealer delivery through third-party AI skills and the trust gaps in AI agent marketplaces. Examination of agentic AI risks for credentials, payroll social-engineering schemes, and how security must adapt.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Notepad++ Attack Shows Importance Of Signed Updates

  • Notepad++ supply-chain compromise exploited lack of robust signed updates, allowing attackers to serve tainted installers from the project's hosting.
  • Jerry Bell notes Notepad++ hardened hosting and will enforce certificates and signature verification in upcoming releases 8.9+.
ADVICE

Require Verifiable Updates For Open Source Tools

  • Treat open-source tooling as third-party risk: require verifiable third-party certificates and centralized IT-controlled update channels.
  • Andrew Kallett recommends picking the source and pushing verified updates rather than blanket bans.
ANECDOTE

Fake Recruiters Use Coding Challenges To Deliver Malware

  • Criminals pose as recruiters and send coding challenges that require downloading malicious repos from NPM/PyPI, then steal crypto via RATs/infostealers.
  • Jerry Bell highlights targeting of blockchain developer job-seekers who often keep wallets on their dev machines.
Get the Snipd Podcast app to discover more snips from this episode
Get the app