The CPUID website was briefly hijacked to serve malware through a compromised backend API component on April 9-10, 2026, affecting downloads of popular system monitoring tools HWMonitor and CPU-Z. The attack redirected users to malicious executables for approximately six hours, though the original signed binaries remained uncompromised. CPUID confirmed the breach and patched the vulnerability.
Safety
CPUID site hijacked to serve malware instead of HWMonitor downloads
CPUID's compromised backend API served malware instead of HWMonitor and CPU-Z binaries for six hours, exposing how popular system monitoring tools remain high-value supply-chain targets.
Friday, April 10, 2026 12:00 PM UTC2 MIN READSOURCE: The RegisterBY sys://pipeline
Tags
safety
/// RELATED
Products4d ago
Progressive Web Components
Elena (2.6kB) enables progressive enhancement for Web Components—baseline HTML/CSS rendering plus JavaScript interactivity—solving SSR and framework lock-in in a single library.
Infrastructure4d ago
Advanced Quantization Algorithm for LLMs
Intel's AutoRound toolkit achieves 2–4 bit quantization for LLMs with minimal accuracy loss, now integrated into vLLM and Transformers to make inference dramatically cheaper and more accessible.