Two CISOs dissect the Axios npm attack, revealing a self-erasing RAT, CI/CD compromise risks and why open-source software ...
Hackers infiltrated Axios maintainers using fake Slack channels and Teams calls, then published infected packages.
A threat actor has used 36 malicious NPM packages posing as Strapi plugins to distribute malware targeting Redis, Docker, and ...
Phishing surge, LinkedIn tracking claims, spyware use, and rising stealers expose growing abuse of trusted systems.
Hackers are exploiting Anthropic's accidental Claude Code source leak to distribute Vidar and GhostSocks malware through fake ...
The North Korean threat actor behind the Axios supply chain attack has been targeting high-profile Node.js maintainers.
Spread the loveIn a significant security incident that has sent shockwaves through the developer community, a North Korean state-sponsored hacking group has successfully compromised the popular Axios ...
When I checked my 10-year-old daughter’s TikTok messages in early February 2026, I expected to find the usual mix of dance ...