Two CISOs dissect the Axios npm attack, revealing a self-erasing RAT, CI/CD compromise risks and why open-source software ...
Security teams are grappling with a major supply chain attack on Axios, a popular JavaScript library with over 100 million ...
Axios, a widely used JavaScript HTTP client, was briefly distributed through npm in two malicious versions after a maintainer ...
Threat actors can use malicious web content to set up AI Agent Traps and manipulate, deceive, and exploit visiting autonomous ...
North Korean hackers published backdoored versions of the Axios NPM package using a compromised long-lived access token.
Google patches 21 Chrome vulnerabilities, including an actively exploited zero-day flaw that could enable code execution and ...
Security firm Socket advised developers to check dependencies for affected Axios versions and remove or roll back compromised ...
In 2025, Google fixed a total of eight zero-days exploited in the wild, many of which were discovered and reported by ...
Attackers stole a long-lived npm token from the lead axios maintainer and published two poisoned versions that drop a ...
With almost 175,000 npm projects listing the library as a dependency, the attack had a huge cascade effect and shows how ...
Hackers linked to North Korea are suspected of an ambitious attack on an inconspicuous but widely used software package, ...
A supply chain compromise involving the widely used JavaScript package Axios is now being tied to a North Korea-linked threat actor, turning what already looked like a serious open-source incident ...