<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Shai-Hulud: Another Wave and Going Open Source]]></title><description><![CDATA[<p>Shai-Hulud: Another Wave and Going Open Source</p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://www.stream.security/post/shai-hulud-another-wave-going-open-source" title="Shai-Hulud: Another Wave and Going Open Source">
<img src="https://cdn.prod.website-files.com/5f05d5858fab461d0d08eaeb/6a048cc2dcea37f12da37cd7_shai%202%20-%20social.png" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://www.stream.security/post/shai-hulud-another-wave-going-open-source">
Shai-Hulud: Another Wave and Going Open Source
</a>
</h5>
<p class="card-text line-clamp-3">Shai-Hulud - the self-propagating npm/PyPI supply-chain worm - is now open source on GitHub, and copycats are already forking it. If your detection strategy depends on recognizing this specific malware, you've lost the next round. The right question is how to detect stolen credentials being used abnormally - invariant across every variant past and future.</p>
</div>
<a href="https://www.stream.security/post/shai-hulud-another-wave-going-open-source" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://cdn.prod.website-files.com/5f05d585ae7f3b0c47bc77a4/663fa9aa8b9fb27189663423_32.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />





<p class="d-inline-block text-truncate mb-0"> <span class="text-secondary">(www.stream.security)</span></p>
</a>
</div></p><p>Read on HackerWorkspace: <a href="https://hackerworkspace.com/article/shai-hulud-another-wave-and-going-open-source" rel="nofollow noopener"><span>https://</span><span>hackerworkspace.com/article/sh</span><span>ai-hulud-another-wave-and-going-open-source</span></a></p><p><a href="https://infosec.exchange/tags/malware" rel="tag">#<span>malware</span></a> <a href="https://infosec.exchange/tags/cybersecurity" rel="tag">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/authentication" rel="tag">#<span>authentication</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/b468e904-cf60-4a26-8928-3740d50c34ab/shai-hulud-another-wave-and-going-open-source</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 01:55:26 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/b468e904-cf60-4a26-8928-3740d50c34ab.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 13 May 2026 18:30:41 GMT</pubDate><ttl>60</ttl></channel></rss>