{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreih5x2rfzaamwqahbpjxk5vnegispnqgge67qtpo7iqtl2axkpzg24",
    "uri": "at://did:plc:z3a345rn6njmxg2o5lxmj3en/app.bsky.feed.post/3mj5k5lvvuta2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreif4olofz3vgfrhxxdrxfuvbnbrbtvfijhldtdfgshcurzbxu7bimq"
    },
    "mimeType": "image/jpeg",
    "size": 31816
  },
  "path": "/news/security/supply-chain-attack-at-cpuid-pushes-malware-with-cpu-z-hwmonitor/",
  "publishedAt": "2026-04-10T13:12:42.000Z",
  "site": "https://www.bleepingcomputer.com",
  "tags": [
    "Security"
  ],
  "textContent": "Hackers gained access to an API for the CPUID project and changed the download links on the official website to serve malicious executables for the popular CPU-Z and HWMonitor tools. [...]",
  "title": "Supply chain attack at CPUID pushes malware with CPU-Z/HWMonitor"
}