Media CoverageHugging Face

Hugging Face Media Coverage
AI Model DeploymentView tool profile →
This Month
22
Elite
0
All Time
28
Sources
10
Coverage Over Time
This MonthRecent Articles (22)
Hugging Face Hiding Second-Stage Malware for npm Supply Chain Attack
DatabreachesOther|Yesterday
Hackers Use Hugging Face to Host Second-Stage Malware for npm Supply Chain Attack
Cybersecurity NewsOther|Yesterday
Hackers Abuse Hugging Face to Deliver npm Malware
GBHackersOther|Yesterday
Fake OpenAI Repo Hit #1 on Hugging Face—And Stole Passwords While It Trended
DecryptOther|May 12
Hugging Face Packages Weaponized With a Single File Tweak
darkreadingOther|May 12
Hugging Face hosted malicious software masquerading as OpenAI release
AI NewsOther|May 12
Malicious Hugging Face Repository Typosquats OpenAI
Infosecurity MagazineOther|May 12
A fake OpenAI repository has taken top spot on Hugging Face — but all it does is push infostealer malware
TechRadarMid-Tier|May 11
Trending Hugging Face Repository With 200k Downloads Executes Malware on Windows Machines
Cybersecurity NewsOther|May 11
Malicious Hugging Face model masquerading as OpenAI release hits 244K downloads
CSO OnlineOther|May 11
Fake OpenAI Hugging Face OpenAI Repo Pushed Infostealer Malware
WinBuzzerOther|May 11
Trending Hugging Face Repo With 200K Downloads Spreads Windows Malware
GBHackersOther|May 11
Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads
The Hacker NewsOther|May 11
Fake OpenAI repository on Hugging Face pushes infostealer malware
BleepingComputerOther|May 9
Hackers Leveraged Hugging Face and ClawHub With 575+ Malicious Skills to Deploy Malware
Cybersecurity NewsOther|May 8
Hugging Face launches robot app store
Axios Tech (alt)Other|May 6
The app store for robots has arrived: Hugging Face launches open-source Reachy Mini App Store with 200+ apps
VentureBeatMid-Tier|May 6
Hugging Face, ClawHub Abused for Malware Distribution
SecurityWeekOther|May 1
Hugging Face LeRobot Vulnerability Enables Unauthenticated RCE Attacks
Cybersecurity NewsOther|Apr 29
Hugging Face LeRobot Flaw Opens Door to Remote Code Execution Attacks
GBHackersOther|Apr 28
Critical Unpatched Flaw Leaves Hugging Face LeRobot Open to Unauthenticated RCE
The Hacker NewsOther|Apr 28
Malicious npm Package Turns Hugging Face Into Malware CDN and Exfiltration Backend
Cybersecurity NewsOther|Apr 23