The Cybersecurity and Infrastructure Security Agency (CISA) has released an alert to provide guidance in response to the ...
Fake packages aim to steal data, credentials, and secrets, and to infect every package created using them, in what could be ...
Developers are increasingly adopting Microsoft Authentication Library (MSAL) for stronger, more flexible authentication in SharePoint Framework (SPFx) solutions. This enables secure token handling, ...
Attackers stole a long-lived npm token from the lead axios maintainer and published two poisoned versions that drop a cross-platform RAT. Axios sits in 80% of cloud environments. Huntress confirmed ...
In March 2026, Trivy, one of the most widely used open-source vulnerability scanners in the Kubernetes ecosystem, was weaponized against the very organizations that relied on it for security.
OpenAI is one of many organizations affected by the recent Axios supply chain attack attributed to North Korean hackers.
As SpaceX prepares to go public, Mr. Musk has proposed moonshots that differ from the company’s original aim of reaching Mars. By Ryan Mac Mythos has triggered emergency responses from central banks ...
Aikido Security is launching Aikido Endpoint, a lightweight agent designed to protect developers’ endpoints against supply ...