The internet runs on shared code—a big problem when a cyberattack corrupts the software supply chain.
In 2025, Google fixed a total of eight zero-days exploited in the wild, many of which were discovered and reported by ...
Attackers stole a long-lived npm token from the lead axios maintainer and published two poisoned versions that drop a ...
North Korean hackers published backdoored versions of the Axios NPM package using a compromised long-lived access token.
Threat actors hijacked the popular npm package axios to spread RAT malware after compromising an open‑source maintainer’s ...
Hackers linked to North Korea breached behind-the-scenes software that runs many common online functions in an effort to ...
Suspected North Korean hackers have bugged a software package that has been used by thousands of US companies in a major ...
A hacker inserted malware in Axios, an open source web tool downloaded tens of millions of times weekly, in a widespread hack ...
The full breadth of this incident is still unclear, but given the popularity of the compromised package, we expect it will ...
A hacker has manipulated a widely-used JavaScript library, Axios, to distribute malware, potentially compromising millions of ...
Critical digital infrastructure is increasingly maintained by under‑resourced individuals, yet exploits have economic and ...