Cloudsmith Blog

Featured
Supply chain security
5 min read

Extend EPM policies to HuggingFace artifacts

By now it’s clear the use of GenAI tooling like Cursor and Claude has fundamentally changed how code is written. This shift, which we explored in depth in our previous post, moves the security perimet…
Supply chain security
4 min read

Shai-Hulud: The Second Coming - What You Need to Know and Do Now

At approximately 0300 on the 24th of November 2025, a new wave of compromised open source packages began circulating in the npm ecosystem. This iteration (dubbed “Shai-Hulud: The Second Coming” by the attackers) is designed to leak developer secrets, including GitHub tokens, CI/CD credentials, and cloud credentials. Here is what we know, how we responded, and what you need to do…
Integrations & partners
49 min read

Kubernetes 1.35 – What you need to know

Kubernetes 1.35 is fast approaching, and it’s a loaded update! Removing enhancements with the status of “Deferred” or “Removed from Milestone” we have 59 Enhancements in all listed within the official…
Keep up to date with our monthly newsletter

By submitting this form, you agree to our privacy policy