#NotePad

Thor A. Hoplandhopland@snabelen.no
2026-02-06

#Notepad plus plus reminds us to thank our package maintainers for doing what they do.

Tbh not having a #packagemanager seems kind of barbaric to me.

#PackageManagement is a public good.

2026-02-05

Here’s what Xbox is working on for 2026

Microsoft has a big year ahead for Xbox as it marks its 25-year milestone. After the tough decision…
#NewsBeep #News #Topstories #Gaming #Headlines #Microsoft #Notepad #Tech #TopStories #Xbox
newsbeep.com/386154/

Marcin Lis (Fox)fox@social.lol
2026-02-05

W tym odcinku mówię o ataku hackerskim na #notepad o tym jak szczury psują internet, a także o francuskiej alternatywie dla #Zoom Poza tym omawiam tłok na orbicie i zmiany techniczne w #formula1
wtfs.stream/@what_the_fox_says
#podcast #technologia

The Vergetheverge@c.im
2026-02-05

Here’s what Xbox is working on for 2026 thever.ge/pQ2Z #Microsoft #Notepad #Gaming #Tech #Xbox

2026-02-04

Notepad++ supply chain attack breakdown | Securelist

Pulse ID: 698344543487b4267ae16795
Pulse Link: otx.alienvault.com/pulse/69834
Pulse Author: CyberHunter_NL
Created: 2026-02-04 13:06:28

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #Notepad #OTX #OpenThreatExchange #SecureList #SupplyChain #bot #CyberHunter_NL

Nicolas DelsauxRiduidel@framapiaf.org
2026-02-04

L'hébergeur du site de Notepad++ a été corrompu, par des acteurs d'état chinois.
Notez bien : Notepad++ est un projet open-source, installé sur l'immense majorité des machines Windows, et PAS UNE FOUTUE ENTREPRISE UTILISATRICE NE CONTRIBUE FINANCIEREMENT AU PROJET.
Donc le mec est littéralement tout seul pour faire face à une attaque apparement orchestrée par un état. L'open-source, c'est beau, mais ce genre de situation en es… notepad-plus-plus.org/news/hij #piratage #notepad

2026-02-04

Notepad++ supply chain attack breakdown

Pulse ID: 6982cbeba762ba78ca3d7a74
Pulse Link: otx.alienvault.com/pulse/6982c
Pulse Author: Tr1sa111
Created: 2026-02-04 04:32:43

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #Notepad #OTX #OpenThreatExchange #SupplyChain #bot #Tr1sa111

Miguel Afonso Caetanoremixtures@tldr.nettime.org
2026-02-03

"A China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad++.

The attack enabled the state-sponsored hacking group to deliver a previously undocumented backdoor codenamed Chrysalis to users of the open-source editor, according to new findings from Rapid7.

The development comes shortly after Notepad++ maintainer Don Ho said that a compromise at the hosting provider level allowed threat actors to hijack update traffic starting June 2025 and selectively redirect such requests from certain users to malicious servers to serve a tampered update by exploiting insufficient update verification controls that existed in older versions of the utility.

The weakness was plugged in December 2025 with the release of version 8.8.9. It has since emerged that the hosting provider for the software was breached to perform targeted traffic redirections until December 2, 2025, when the attacker's access was terminated. Notepad++ has since migrated to a new hosting provider with stronger security and rotated all credentials."

thehackernews.com/2026/02/note

#CyberSecurity #Notepad #China #OpenSource #StateHacking

2026-02-03

Notepad++ è stato colpito da un attacco alla supply chain che ha dirottato per mesi il sistema di aggiornamento, distribuendo un eseguibile malevolo al posto di quello legittimo. #Notepad++ #Sicurezza #Software

linuxeasy.org/notepad-e-il-pro

2026-02-03

Notepad++ supply chain attack breakdown

The article details a sophisticated supply chain attack on Notepad++ that occurred from July to October 2025. Attackers compromised the update infrastructure, deploying various malicious payloads through three distinct infection chains. The attack targeted individuals and organizations in Vietnam, El Salvador, Australia, and the Philippines. The infection methods evolved over time, using NSIS installers, Metasploit downloaders, and Cobalt Strike Beacons. The attackers employed clever techniques to evade detection, including the abuse of legitimate software and the use of multiple C2 servers. The article provides a comprehensive timeline of the attack, describes the different execution chains, and offers guidance on detecting traces of the attack.

Pulse ID: 6981e532c377aebc94f0e7a8
Pulse Link: otx.alienvault.com/pulse/6981e
Pulse Author: AlienVault
Created: 2026-02-03 12:08:18

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Australia #CobaltStrike #CyberSecurity #InfoSec #Notepad #OTX #OpenThreatExchange #Philippines #SupplyChain #Vietnam #bot #AlienVault

New.

Kaspersky: The Notepad++ supply chain attack — unnoticed execution chains and new IoCs securelist.com/notepad-supply- @Kaspersky #infosec #NotePad #databreach #threatresearch

Pixel Prophecy 🇵🇸🇺🇦🇪🇺PixelProphecy@mastodon.gamedev.place
2026-02-03

Regarding the #Notepad++ backdoor: I just whipped up a quick Windows batch script that I used to search my system for the known compromised files of the Chrysalis backdoor.

pixelprophecy.com/stuff/item/t

Hope it helps some of you too!

2026-02-03

The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
#Notepad++
securelist.com/notepad-supply-

2026-02-03

Those of you using Notepad++, you'll need to read this ASAP and update.

notepad-plus-plus.org/news/hij

#notepad++ #notepad #windows #hacking

2026-02-03

Notepad++ von staatlich geförderten Hackern gekapert
notepad-plus-plus.org/news/hij

#notepad+++ #hacker

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst