The internet runs on shared code—a big problem when a cyberattack corrupts the software supply chain.
In 2025, Google fixed a total of eight zero-days exploited in the wild, many of which were discovered and reported by ...
Attackers stole a long-lived npm token from the lead axios maintainer and published two poisoned versions that drop a ...
North Korean hackers published backdoored versions of the Axios NPM package using a compromised long-lived access token.
Threat actors hijacked the popular npm package axios to spread RAT malware after compromising an open‑source maintainer’s ...
Hackers linked to North Korea breached behind-the-scenes software that runs many common online functions in an effort to ...
Suspected North Korean hackers have bugged a software package that has been used by thousands of US companies in a major ...
A hacker inserted malware in Axios, an open source web tool downloaded tens of millions of times weekly, in a widespread hack ...
The full breadth of this incident is still unclear, but given the popularity of the compromised package, we expect it will ...
A hacker has manipulated a widely-used JavaScript library, Axios, to distribute malware, potentially compromising millions of ...
Critical digital infrastructure is increasingly maintained by under‑resourced individuals, yet exploits have economic and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results