tag
Supply Chain
50 posts
- Active Supply Chain Attack Compromises @antv Packages on npm
- IT threat evolution in Q1 2026. Non-mobile statistics
- Weekly Recap — 2026-05-11 -> 2026-05-18
- Mini Shai-Hulud: The Worm Returns and Goes Public
- Understanding the CMMC Final Rule: Program Key Takeaways
- TeamPCP and BreachForums Launch $1,000 Contest for Supply Chain Attacks
- GemStuffer Campaign Abuses RubyGems as Exfiltration Channel Targeting UK Local Government
- Analyzing TeamPCP’s Supply Chain Attacks: Checkmarx KICS and elementary-data in CI/CD Credential Theft
- fsnotify Maintainer Dispute Sparks Supply Chain Concerns
- TanStack npm Packages Compromised in Ongoing Mini Shai-Hulud Supply-Chain Attack
- GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
- 5 Malicious NuGet Packages Impersonate Chinese UI Libraries to Distribute Crypto Wallet and Credential Stealer
- OceanLotus suspected of using PyPI to deliver ZiChatBot malware
- LABScon25 Replay | Please Connect to the Foreign Entity to Enhance Your User Experience
- PyPI Fixes High-Severity Access Control Issues Found in Security Audit
- Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities
- Malicious Ruby Gems and Go Modules Impersonate Developer Tools to Steal Secrets and Poison CI
- Mini Shai-Hulud Spreads to Packagist: Malicious Intercom PHP Package Follows npm Compromise
- Intercom’s npm Package Compromised in Ongoing Mini Shai-Hulud Worm Attack
- lightning PyPI Package Compromised in Supply Chain Attack
- Malicious npm Package Brand-Squats TanStack to Exfiltrate Environment Variables
- 'Mini Shai-Hulud' supply chain attack targets SAP npm packages
- CI/CD pipeline abuse: the problem no one is watching
- Lazarus Doesn't Need AGI
- 73 Open VSX Sleeper Extensions Linked to GlassWorm Show New Malware Activations
- Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
- Critical Minerals and Cyber Operations
- LABScon25 Replay | Are Your Chinese Cameras Spying For You Or On You?
- Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories
- Emerging Enterprise Security Risks of AI
- The Vercel Breach: The Steps To Take Now to Protect Your Organization
- The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment Variables
- Supply Chain Compromise Impacts Axios Node Package Manager
- Intelligence Center
- Your Supply Chain Breach Is Someone Else's Payday
- Iran War: Future Scenarios and Business Implications
- Third-Party Risk Is an Intelligence Operation. It's Time We Treated It Like One.
- North Korea’s Contagious Interview Campaign Spreads Across 5 Ecosystems, Delivering Staged RAT Payloads
- Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
- A Look Inside Claude's Leaked AI Coding Agent
- Supply Chain Attacks Surge in March 2026 | ThreatLabz
- Intelligence Center
- Axios Maintainer Confirms Social Engineering Attack Behind npm Compromise
- Supply Chain Attack on Axios Pulls Malicious Dependency from npm
- STARDUST CHOLLIMA Likely Compromises Axios npm Package
- How we caught the Axios supply chain attack
- The Shift: An Era of Quantum Geopolitics
- Mitigating the Axios npm supply chain compromise
- Inside the Axios supply chain compromise - one RAT to rule them all
- Elastic releases detections for the Axios supply chain compromise