{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreih5x2rfzaamwqahbpjxk5vnegispnqgge67qtpo7iqtl2axkpzg24",
"uri": "at://did:plc:z3a345rn6njmxg2o5lxmj3en/app.bsky.feed.post/3mj5k5lvvuta2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreif4olofz3vgfrhxxdrxfuvbnbrbtvfijhldtdfgshcurzbxu7bimq"
},
"mimeType": "image/jpeg",
"size": 31816
},
"path": "/news/security/supply-chain-attack-at-cpuid-pushes-malware-with-cpu-z-hwmonitor/",
"publishedAt": "2026-04-10T13:12:42.000Z",
"site": "https://www.bleepingcomputer.com",
"tags": [
"Security"
],
"textContent": "Hackers gained access to an API for the CPUID project and changed the download links on the official website to serve malicious executables for the popular CPU-Z and HWMonitor tools. [...]",
"title": "Supply chain attack at CPUID pushes malware with CPU-Z/HWMonitor"
}