Google links Axios npm supply chain attack to UNC1069 after trojanized versions 1.14.1 and 0.30.4 spread WAVESHAPER.V2, ...
Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver remote access trojans to Linux, Windows, and macOS systems. One malicious ...
On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages ...
Attackers stole a long-lived npm token from the lead axios maintainer and published two poisoned versions that drop a ...
A supply-chain attack backdoored versions of Axios, a popular JavaScript library that's present in many different software ...
With almost 175,000 npm projects listing the library as a dependency, the attack had a huge cascade effect and shows how quickly a compromised package can propagate through the ecosystem.
"The C2 hosts a web-based graphical user interface (GUI) titled 'NEXUS Listener' that can be used to view stolen information ...
Frore Systems Inc., which makes liquid cooling technology for AI chips, raised $143 million in a funding deal that values the startup at $1.64 billion. The round was led by MVP Ventures and includes ...
File syncing and storage services, also known as cloud storage services, offer major convenience. They let you back up and access your data—documents, photos, video, and other file types—on any ...
Just because you have antivirus software installed on your PC doesn't mean a zero-day Trojan can't steal your personal data. The top encryption software keeps you safe from malware (and the NSA). When ...
This blog is closing now but we’re continuing our live updates from the US-Israel war on Iran in a new live blog here, including a recap of the latest key developments. Thanks for reading. Middle East ...