Robuta

Sponsor of the Day: Jerkmate
https://www.techradar.com/pro/security/three-high-risk-ai-vulnerabilities-discovered-in-claude-ai-end-to-end-attack-chain-exfiltrates-sensitive-info-without-user-knowing Three high-risk AI vulnerabilities discovered in Claude.ai – end-to-end attack chain exfiltrates... Mar 19, 2026 - A legitimate Google ad could lead to data exfiltration high risk aivulnerabilities discoveredattack chainthreeclaude https://www.computerweekly.com/news/366638863/Researchers-delve-inside-new-SolarWinds-RCE-attack-chain Researchers delve inside new SolarWinds RCE attack chain | Computer Weekly Researchers at Huntress and Microsoft have shared findings from their analysis of a new SolarWinds Web Help Desk vulnerability. inside newattack chaincomputer weeklyresearchersdelve https://hashnode.com/posts/trizetto-healthcare-breach-patient-data-exposure-attack-chain-ttps/69ad7b6c34565578f04e34e7 Discussion on "TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs" | Hashnode trizetto healthcarepatient dataattack chaindiscussionbreach https://www.enterprisesecuritytech.com/post/macos-malware-evolves-clickfix-attack-chain-shifts-from-terminal-to-script-editor-to-bypass-apple-d macOS Malware Evolves: ClickFix Attack Chain Shifts from Terminal to Script Editor to Bypass Apple... Apr 9, 2026 - A newly observed macOS malware campaign is signaling a tactical shift in how attackers deliver infostealers, quietly abandoning the Terminal in favor of a less... macos malwareclickfix attackchain shiftsscript editorevolves https://www.csoonline.com/article/4126336/from-credentials-to-cloud-admin-in-8-minutes-ai-supercharges-aws-attack-chain.html From credentials to cloud admin in 8 minutes: AI supercharges AWS attack chain | CSO Online Feb 4, 2026 - AI-assisted attackers weaponized exposed credentials and permissive roles to move from initial access to full AWS admin control in minutes. 8 minutesai superchargesattack chaincso onlinecredentials https://securityonline.info/fake-adobe-reader-screenconnect-hijack-in-memory-attack/ New Stealth Attack Chain Weaponizes Legitimate Remote Access Software Zscaler reveals a 2026 attack chain using fake Adobe Reader lures to install ScreenConnect via in-memory execution and UAC bypass. Protect your network now! remote access softwarenew stealthattack chainweaponizeslegitimate https://www.endorlabs.com/learn/shai-hulud-the-third-coming----inside-the-bitwarden-cli-2026-4-0-supply-chain-attack The Bitwarden CLI Supply Chain Attack: What Happened and What to Do | Blog | Endor Labs How attackers compromised Bitwarden's CLI and enlisted the help of AI coding agents to spread a worm and harvest developer secrets. supply chain attackblog endor labsbitwarden clihappened https://www.infoq.com/news/2026/03/litellm-supply-chain-attack/ PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information -... Mar 31, 2026 - Discovered by FutureSearch researcher Callum McMahon, a supply chain attack against LiteLLM on PyPI resulted in over 40 thousand downloads of a compromised... pypi supply chainsensitive informationattackcompromiseslitellm https://ramimac.me/axios/ Axios npm Supply Chain Attack Apr 6, 2026 - Timeline and IOCs for the Axios npm supply chain attack. Compromised maintainer account, credential stealer via plain-crypto-js dependency. axios npm supplychain attack https://securityaffairs.com/191215/malware/checkmarx-supply-chain-attack-impacts-bitwarden-npm-distribution-path.html Checkmarx supply chain attack impacts Bitwarden npm distribution path Apr 25, 2026 - Bitwarden CLI hit by the Checkmarx supply chain attack. Version 2026.4.0 shipped malicious code in bw1.js via a compromised GitHub Action. checkmarx supply chainattackimpactsbitwardennpm https://therecord.media/mercor-confirms-security-incident-tied-to-litellm Mercor confirms security incident tied to LiteLLM supply chain attack | The Record from Recorded... Apr 1, 2026 - Although the LiteLLM attack was reportedly tied to a group called TeamPCP, the hacking gang Lapsus$ claimed on its website that it obtained hundreds of... litellm supply chainsecurity incidentmercorconfirmstied https://dev.to/rverwey/the-axios-supply-chain-attack-what-happened-how-to-check-and-what-to-do-next-18n The Axios Supply Chain Attack: What Happened, How to Check, and What to Do Next - DEV Community Apr 6, 2026 - Two malicious versions of Axios were published to npm on March 31, 2026, hiding a dependency that... Tagged with webdev, cybersecurity, devops, npm. axios supply chainnext devattackhappenedcheck https://thehackernews.com/2021/07/kaseya-revil-ransomware-attack.html Kaseya Supply-Chain Attack Hits Nearly 40 Service Providers With REvil Ransomware Kaseya cyberattack hits hundreds of companies with REvil ransomware in a surprise supply chain attack. supply chain attackhits nearly40 servicerevil ransomwarekaseya https://www.theregister.com/2025/10/21/muji_askul_ransomware/ Muji's minimalist vibe wrecked amid supply chain attack • The Register Oct 21, 2025 - : Japanese retailer halts online orders after attack cripples third-party vendor amid supply chainmujiminimalistvibewrecked https://www.theregister.com/2022/03/25/us_indicts_russian_state_hackers/ US reveals Russian supply chain attack on energy sector • The Register Mar 25, 2022 - Poisoned SCADA apps could have disrupted power supply – perhaps even at nuclear plants supply chain attackreveals russianenergy sectorregister https://www.theregister.com/2026/04/27/supply_chain_campaign_targets_security/ Ongoing supply-chain attack targets security, dev tools • The Register Apr 27, 2026 - : Vendor confirms repo data exposure after Lapsus$ claims source code, secrets dump supply chain attacksecurity devongoingtargetstools https://www.csoonline.com/article/4162865/bitwarden-cli-password-manager-trojanized-in-supply-chain-attack.html Bitwarden CLI password manager trojanized in supply chain attack | CSO Online Apr 23, 2026 - Attackers published a malicious command-line version of the popular open-source password manager to the npm registry and may be behind a spate of recent supply... supply chain attackbitwarden clipassword managercso onlinetrojanized https://www.crn.com/news/security/3cx-supply-chain-attack-8-biggest-things-to-know?page=2 3CX Supply Chain Attack: 8 Biggest Things To Know | CRN CRN looks at the supply chain attack on 3CX phone system software, which is being likened to the attacks on SolarWinds and Kaseya. supply chain attack8 biggest3cxthingsknow https://www.ox.security/blog/shai-hulud-bitwarden-cli-supply-chain-attack/ Bitwarden CLI Compromised: Inside the Shai-Hulud Supply Chain Attack supply chain attackbitwarden clishai huludcompromisedinside https://unit42.paloaltonetworks.com/npm-supply-chain-attack/ "Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack (Updated November 26) Self-replicating worm “Shai-Hulud” has compromised hundreds of software packages in a supply chain attack targeting the npm ecosystem. We discuss scope and... shai hulud wormsupply chain attackupdated novembercompromisesnpm https://www.aikido.dev/blog/npm-backdoor-lets-hackers-hijack-gambling-outcomes npm supply chain attack hijacks game backend to rig gambling outcomes Feb 17, 2026 - A targeted npm supply chain attack installs an Express backdoor, enables remote SQL/file access, and rewrites gambling balances while keeping logs consistent. npm supply chaingame backendattackhijacksrig https://thenextweb.com/news/wordpress-plugins-backdoor-supply-chain-essential-plugin-flippa-2 30+ WordPress plugins bought on Flippa and backdoored in supply chain attack Apr 15, 2026 - An attacker purchased 30+ WordPress plugins on Flippa, planted backdoors that lay dormant for eight months, then activated cloaked SEO spam served only to... supply chain attack30 wordpresspluginsboughtflippa https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/ Supply-chain attack using invisible code hits GitHub and other repositories - Ars Technica Mar 16, 2026 - Unicode that's invisible to the human eye was largely abandoned—until attackers took notice. supply chain attackars technicausinginvisiblecode https://www.databreachtoday.eu/how-ai-supply-chain-monitor-spotted-unfolding-axios-attack-a-31468 How AI Supply-Chain Monitor Spotted Unfolding Axios Attack Elastic Security Labs quickly spotted the unfolding supply-chain attack that backdoored the popular JavaScript library Axios, thanks to a lightweight, AI-driven ai supply chainmonitor spotted unfoldingaxios attack https://gbhackers.com/cisa-warns-compromised-axios-npm-package/ CISA Warns Compromised Axios npm Package Fueled Major Supply Chain Attack Apr 21, 2026 - CISA has issued an urgent alert regarding a severe software supply chain compromise affecting the widely used Axios node package manager (npm). axios npm packagesupply chain attackcisa warnscompromisedfueled https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/ Supply Chain Attack in litellm 1.82.8 on PyPI Mar 24, 2026 - litellm version 1.82.8 on PyPI contains a malicious .pth file that harvests SSH keys, cloud credentials, and secrets on every Python startup, then attempts... supply chain attack1 82litellmpypi https://www.infosecurity-magazine.com/news/supply-chain-attack-smart/ Supply Chain Attack Uses Smart Contracts for C2 Ops - Infosecurity Magazine Sep 28, 2025 - Checkmarx has observed a novel npm supply chain attack using Ethereum smart contracts to manage command-and-control (C2) operations supply chain attackuses smartinfosecurity magazinecontractsc2 https://sigh.dev/posts/ctrl-tinycolor-post-mortem/ @ctrl/tinycolor Supply Chain Attack Post-mortem • sigh.dev - Scott Cooper's dev blog Lessons learned from becoming the unexpected face of a npm supply-chain attack. supply chain attacksigh dev scottpost mortemctrlcooper https://cambridgeanalytica.org/data-breaches-scandals/checkmarx-github-leak-dark-web-march-supply-chain-50845/ Checkmarx's own GitHub repository just leaked on the dark web after March 23 supply chain attack Apr 28, 2026 - Security software maker Checkmarx confirms its own GitHub data was stolen and posted on the dark web following a March 23 supply chain attack. supply chain attackgithub repositorydark webmarch 23checkmarx https://ifpnews.com/human-chain-of-iranian-people-to-condemn-trumps-attack-on-civilian-infrastructure/ Human Chain Of Iranian People To Condemn Trump's Attack On Civilian Infrastructure - Iran Front Page Apr 18, 2026 - In response to the US President's threat to target Iranian civilian infrastructure, the people of Iran formed human chains near these targets. human chainiranian peoplecondemn trumpcivilian infrastructureattack https://www.networkworld.com/article/4154185/cert-eu-blames-trivy-supply-chain-attack-for-europa-eu-data-breach-2.html CERT-EU blames Trivy supply chain attack for Europa.eu data breach | Network World Apr 3, 2026 - Attackers exploited a vulnerability scanner to steal 350GB of data that they then leaked on the dark web. cert eu blamestrivy supply chaineuropa data breachnetwork worldattack https://threats.wiz.io/all-incidents/solana-web3js-supply-chain-attack Solana web3.js Supply Chain Attack On December 3, 2024, a critical supply chain attack was uncovered targeting versions 1.95.6 and 1.95.7 of the widely-used @solana/web3.js JavaScript library.... supply chain attackweb3 jssolana https://www.truesec.com/hub/blog/kaseya-supply-chain-attack-targeting-msps-to-deliver-revil-ransomware All you need to know about Kaseya supply chain attack - Truesec Learn more about Kaseya VSA, a product used by MSPs as part of a supply chain attack, delivering REvil ransomware to thousands of organizations. supply chain attackneedknowkaseyatruesec https://phoenix.security/bitwarden-cli-backdoored-shai-hulud-returns-through-a-93-minute-npm-window/ Bitwarden CLI Backdoored: 93-Minute npm Supply Chain Attack Apr 24, 2026 - @bitwarden/cli 2026.4.0 was live on npm for 93 minutes with a credential stealer, npm worm, workflow injector, and AI assistant poisoning payload. IOCs and... npm supply chainbitwarden clibackdoored93minute https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/ 8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur Feb 4, 2025 - Surprise surprise, we've done it again. We've demonstrated an ability to compromise significantly sensitive networks, including governments, militaries, space... supply chain attack8 millionlook amateurrequestslater https://thehackernews.com/search/label/supply%20chain%20attack supply chain attack — Latest News, Reports & Analysis | The Hacker News Explore the latest news, real-world incidents, expert analysis, and trends in supply chain attack — only on The Hacker News, the leading cybersecurity and IT... supply chain attacklatest news reportsanalysishacker https://www.endorlabs.com/learn/supply-chain-attack-targeting-cline-installs-openclaw Supply Chain Attack targeting Cline installs OpenClaw | Blog | Endor Labs A compromised release of the popular Cline CLI npm package silently installs OpenClaw globally on any machine. supply chain attackblog endor labstargetingclineinstalls https://thehackernews.com/2026/04/google-attributes-axios-npm-supply.html Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069 Google links Axios npm supply chain attack to UNC1069 after trojanized versions 1.14.1 and 0.30.4 spread WAVESHAPER.V2, impacting multiple OS. axios npm supplychain attacknorth koreangoogleattributes https://www.ox.security/open-software-supply-chain-attack-reference-oscr/ Open Software Supply Chain Attack Reference (OSC&R) | OX Security software supply chainox securityopenattackreference https://www.giskard.ai/knowledge/litellm-supply-chain-attack-2026 How the LiteLLM PyPI Supply Chain Attack Happened — and What to Do If You're Affected On March 24 2026, attackers published two malicious versions of the litellm Python library to PyPI, stealing SSH keys, cloud credentials, and Kubernetes... pypi supply chainlitellmattackhappenedaffected https://www.databreachtoday.asia/how-ai-supply-chain-monitor-spotted-unfolding-axios-attack-a-31468 How AI Supply-Chain Monitor Spotted Unfolding Axios Attack Elastic Security Labs quickly spotted the unfolding supply-chain attack that backdoored the popular JavaScript library Axios, thanks to a lightweight, AI-driven ai supply chainmonitor spotted unfoldingaxios attack https://info.varonis.com/en/webinar/state-of-cybercrime-2026-04-08 State of Cybercrime: The Axios Supply Chain Attack Explore the Axios supply chain attack's implications for cybersecurity as experts discuss emerging threats and actionable insights to mitigate risks in the... axios supply chainstatecybercrimeattack https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account Axios 1.14.1 and 0.30.4 injected malicious plain-crypto-js@4.2.1 after npm compromise on March 31, 2026, deploying cross-platform RAT malware. axios supply chaincross platform ratvia compromisedattackpushes https://www.infoworld.com/article/4117662/possible-software-supply-chain-attack-through-aws-codebuild-service-blunted.html Possible software supply chain attack through AWS CodeBuild service blunted | InfoWorld Jan 15, 2026 - Researchers at Wiz, who discovered the hole, said it could have led to compromised AWS GitHub repositories. software supply chainaws codebuildpossibleattackservice https://sansec.io/research/polyfill-supply-chain-attack Polyfill supply chain attack hits 100K+ sites | Sansec Apr 14, 2026 - The new Chinese owner of the popular Polyfill JS project injects malware into more than 100 thousand sites. supply chain attackpolyfillhits100ksites https://www.databreachtoday.com/how-ai-supply-chain-monitor-spotted-unfolding-axios-attack-a-31468 How AI Supply-Chain Monitor Spotted Unfolding Axios Attack Elastic Security Labs quickly spotted the unfolding supply-chain attack that backdoored the popular JavaScript library Axios, thanks to a lightweight, AI-driven ai supply chainmonitor spotted unfoldingaxios attack https://www.theregister.com/2025/08/27/nx_npm_supply_chain_attack/ Nx NPM packages poisoned in AI-assisted supply chain attack • The Register Aug 27, 2025 - : Stolen dev credentials posted to GitHub as attackers abuse CLI tools for recon supply chain attacknpm packagesnxpoisonedassisted https://safedep.io/shai-hulud-second-coming-supply-chain-attack/ Shai-Hulud 2.0 npm Supply Chain Attack Technical Analysis - Real-time Open Source Software Supply... Critical npm supply chain attack compromises zapier-sdk, @asyncapi, posthog, and @postman packages with self-replicating malware. Technical analysis reveals... shai hulud 2npm supply chainanalysis real timeopen source software https://www.helpnetsecurity.com/2026/03/31/axios-npm-backdoored-supply-chain-attack/ Axios npm packages backdoored in supply chain attack - Help Net Security Mar 31, 2026 - An attacker has published backdoored Axios npm packages that trigger the installation of droppers and remote access trojans. supply chain attackaxios npmpackagesbackdooredhelp https://securelist.com/escan-supply-chain-attack/118688/ eScan supply chain attack: what you should know | Securelist Feb 4, 2026 - On January 20, Kaspersky solutions detected malware used in eScan antivirus supply chain attack. In this article we provide available information on the... supply chain attackescanknowsecurelist https://circleid.com/posts/a-look-back-at-the-top-ransomware-attack-targeting-the-salesforce-supply-chain A Look Back at the Top Ransomware Attack Targeting the Salesforce Supply Chain A sprawling ransomware campaign targeting Salesforce's SaaS supply chain topped 2025's breach rankings, exposing millions of records. Fresh DNS analysis... look backtop ransomwareattack targetingsupply chainsalesforce https://news.opensuse.org/2024/03/29/xz-backdoor/ openSUSE addresses supply chain attack against xz compression library - openSUSE News openSUSE maintainers received notification of a supply chain attack against the “xz” compression tool and “liblzma5” library. Background Andres Freund report... supply chain attackcompression libraryopensuseaddressesxz https://www.crowdstrike.com/en-us/blog/cve-2024-3094-xz-upstream-supply-chain-attack/ CVE-2024-3094 and XZ Upstream Supply Chain Attack | CrowdStrike Feb 3, 2025 - Learn about the CVE-2024-3094 and XZ Upstream Supply Chain Attack and how CrowdStrike is protecting its customers from exploitation. cve 2024 3094supply chain attackxzupstreamcrowdstrike https://www.infoworld.com/article/4154187/cert-eu-blames-trivy-supply-chain-attack-for-europa-eu-data-breach-3.html CERT-EU blames Trivy supply chain attack for Europa.eu data breach | InfoWorld Apr 3, 2026 - Attackers exploited a vulnerability scanner to steal 350GB of data that they then leaked on the dark web. cert eu blamestrivy supply chaineuropa data breachattackinfoworld https://www.computerworld.com/article/4152490/why-the-axios-supply-chain-attack-should-have-apple-worried.html Why the axios supply chain attack should have Apple worried – Computerworld Mar 31, 2026 - Critical digital infrastructure is increasingly maintained by under‑resourced individuals, yet exploits have economic and national security consequences — even... axios supply chainattackappleworriedcomputerworld https://adnanthekhan.com/2023/12/20/one-supply-chain-attack-to-rule-them-all/ One Supply Chain Attack to Rule Them All - Poisoning GitHub's Runner Images | Adnan Khan - Security... Dec 20, 2023 - One Supply Chain Attack to Rule Them All - Poisoning GitHub's Runner Images - Security research by adnanthekhan one supply chainadnan khan securityattackrulepoisoning https://www.thehindu.com/sci-tech/technology/apple-ios-vulnerability-chain-exposes-new-attack-pathway-researchers-say/article70760838.ece Apple iOS vulnerability chain exposes new attack pathway, researchers say - The Hindu A newly identified set of iOS vulnerabilities is at the centre of a sophisticated attack method known as “DarkSword,” according to a new research by Google’s... apple iosexposes newresearchers sayvulnerabilitychain https://devtalk.com/t/the-vercel-breach-oauth-supply-chain-attack-exposes-the-hidden-risk-in-platform-environment-variables/242279 The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment... An OAuth supply chain compromise at Vercel exposed how trusted third party apps and platform environment variables can bypass traditional defenses and amplify... supply chain attackvercel breachexposes hiddenplatform environmentoauth https://wpshout.com/wceu-supply-chain-attack-more-acquisitions-july-2024-wordpress-news/ WordCamp Europe, Supply Chain Attack, More Acquisitions 🗞️ July 2024 WordPress News w/ WPShout Jul 1, 2024 - This news roundup covers WordCamp Europe 2024, an ongoing supply chain attack affecting WordPress, some notable acquisitions, and more. supply chain attackwordcamp europejuly 2024wordpress newsacquisitions https://www.reflectiz.com/blog/appsflyer-supply-chain-attack/ AppsFlyer SDK Exploited in New Supply Chain Crypto Attack – Reflectiz Apr 23, 2026 - AppsFlyer Supply Chain Attack: Explore how AppsFlyer's SDK was exploited in this new supply chain attack targeting crypto. new supply chainappsflyersdkexploitedcrypto https://www.trendmicro.com/en_us/research/26/c/axios-npm-package-compromised.html Axios NPM Package Compromised: Supply Chain Attack Hits JavaScript HTTP Client with 100M+ Weekly... axios npm packagesupply chain attackhttp clientcompromisedhits https://www.infoq.com/news/2026/04/axios-supply-chain/ Axios npm Package Compromised in Supply Chain Attack - InfoQ Apr 2, 2026 - On March 31, 2026, two versions of the Axios library were compromised and found to contain a Remote Access Trojan. The malicious packages were published... axios npm packagesupply chain attackcompromisedinfoq https://simonwillison.net/2026/Apr/3/supply-chain-social-engineering/ The Axios supply chain attack used individually targeted social engineering The Axios team have published a full postmortem on the supply chain attack which resulted in a malware dependency going out in a release the other day, and it... axios supply chaintargeted socialattackusedindividually https://www.bankinfosecurity.co.uk/litellm-hit-in-cascading-supply-chain-attack-a-31210 LiteLLM Hit in Cascading Supply-Chain Attack - BankInfoSecurity Threat group TeamPCP exploited credentials stolen in the Trivy breach to push malicious versions of LiteLLM to PyPI, exposing developers to credential theft, supply chain attacklitellmhitcascadingbankinfosecurity https://www.trendmicro.com/en_gb/research/26/d/vercel-breach-oauth-supply-chain.html The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment... An OAuth supply chain compromise at Vercel exposed how trusted third party apps and platform environment variables can bypass traditional defences and amplify... supply chain attackvercel breachexposes hiddenplatform environmentoauth https://thehackernews.com/2026/04/unc1069-social-engineering-of-axios.html UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack UNC1069 compromised Axios 1.14.1 and 0.30.4 via social engineering, impacting 100M weekly downloads and exposing supply chains. npm supply chainsocial engineeringunc1069axiosmaintainer https://it.slashdot.org/story/26/04/05/0316250/top-npm-maintainers-targeted-with-ai-deepfakes-in-massive-supply-chain-attack-axios-briefly-compromised Top NPM Maintainers Targeted with AI Deepfakes in Massive Supply-Chain Attack, Axios Briefly... supply chain attacktopnpmmaintainerstargeted https://www.infoq.com/news/2026/04/trivy-supply-chain-attack/ Open Source Security Tool Trivy Hit by Supply Chain Attack, Prompting Urgent Industry Response -... Apr 3, 2026 - A major security incident affecting the widely used open source vulnerability scanner Trivy has exposed critical weaknesses in software supply chain security,... open source securitysupply chain attackindustry responsetooltrivy https://blog.securelayer7.net/pypi-litellm-supply-chain-attack/ PyPI litellm Supply Chain Attack Explained: Risks & Prevention litellm supply chainattack explainedrisks preventionpypi https://www.paloaltonetworks.com/blog/cloud-security/trivy-supply-chain-attack/ When Security Scanners Become the Weapon: Breaking Down the Trivy Supply Chain Attack Mar 27, 2026 - The Trivy Supply Chain Attack shows how security tools can be weaponized. Learn how this 2026 breach unfolded and how Cortex Cloud blocks the threat. trivy supply chainsecurity scannersbecomeweaponbreaking https://www.securityweek.com/bitwarden-npm-package-hit-in-supply-chain-attack/ Bitwarden NPM Package Hit in Supply Chain Attack - SecurityWeek Apr 24, 2026 - The Bitwarden CLI NPM package compromise is tied to a Checkmarx supply chain attack and references the Shai-Hulud worm. supply chain attacknpm packagebitwardenhitsecurityweek https://www.csoonline.com/article/4028412/supply-chain-attack-compromises-npm-packages-to-spread-backdoor-malware.html Supply chain attack compromises npm packages to spread backdoor malware | CSO Online Jul 24, 2025 - Phishing attacks on package maintainer accounts led to infected JavaScript type testing utilities. supply chain attacknpm packagesbackdoor malwarecso onlinecompromises https://www.tenable.com/blog/faq-about-the-axios-npm-supply-chain-attack-by-north-korea-nexus-threat-actor-unc1069 Axios npm Supply Chain Attack FAQ: North Korea UNC1069 | Tenable® Apr 7, 2026 - North Korea-nexus threat actor UNC1069 compromised the axios npm package, delivering the WAVESHAPER.V2 RAT to macOS, Windows, and Linux systems. axios npm supplychain attackfaq northkoreaunc1069 https://www.f5.com/glossary/supply-chain-attack Supply Chain Attack | F5 supply chain attackf5 https://phoenix.security/teampcp-litellm-supply-chain-compromise-pypi-credential-stealer-kubernetes/ LiteLLM Backdoored by TeamPCP: PyPI Supply Chain Attack (2026) Mar 30, 2026 - TeamPCP backdoored LiteLLM v1.82.7 and v1.82.8 on PyPI with a credential stealer, K8s lateral movement, and persistent backdoor. Full IOCs, detection, and... pypi supply chainattack 2026litellmbackdooredteampcp https://www.tenable.com/blog/supply-chain-attack-on-axios-npm-package-scope-impact-and-remediations Axios npm supply chain attack | Tenable® Apr 7, 2026 - The attacker injected a malicious package called “plain-crypto-js” into the dependency tree of Axios versions 1.14.1 and 0.30.4. Scan your environment now to... axios npm supplychain attack https://attack.hr/hr/the-chain-of-music-venues-pluralism The Chain Of Music (Venues) Pluralism - Attack music venueschainpluralismattack https://www.herodevs.com/blog-posts/the-litellm-supply-chain-attack-what-happened-why-it-matters-and-what-to-do-next HeroDevs Blog | The LiteLLM Supply Chain Attack: What Happened, Why It Matters, and What to Do Next A deep dive into the LiteLLM supply chain attack, how malicious PyPI packages exposed developer credentials, and the critical steps you need to take to secure... litellm supply chainherodevs blogattackhappenedmatters https://www.csoonline.com/video/508779/lessons-from-the-solarwinds-attack-on-securing-the-software-supply-chain.html Lessons from the SolarWinds attack on securing the software supply chain | CSO Online software supply chaincso onlinelessonssolarwindsattack https://www.careersinfosecurity.asia/how-ai-supply-chain-monitor-spotted-unfolding-axios-attack-a-31468 How AI Supply-Chain Monitor Spotted Unfolding Axios Attack Elastic Security Labs quickly spotted the unfolding supply-chain attack that backdoored the popular JavaScript library Axios, thanks to a lightweight, AI-driven ai supply chainmonitor spotted unfoldingaxios attack https://securelist.com/notepad-supply-chain-attack/118708/ Notepad++ supply chain attack breakdown | Securelist Feb 16, 2026 - Kaspersky GReAT experts discovered previously undocumented infection chains used in the Notepad++ supply chain attacks. The article provides new IoCs related... supply chain attacknotepadbreakdownsecurelist https://www.aikido.dev/blog/glassworm-strikes-react-packages-phone-numbers Glassworm Strikes Popular React Native Phone Number Packages in a New Supply Chain Attack Mar 18, 2026 - Aikido Security researchers recovered and decrypted the full payload chain from two malicious React Native packages. Here's what the malware does and what to... new supply chainreact nativephone numberglasswormstrikes https://netnam.com/thu-vien/blog/supply-chain-attack-lan-song-tan-cong-chuoi-cung-ung-va-chien-luoc-an-toan-thong-tin Supply Chain Attack: Làn sóng tấn công chuỗi cung ứng và chiến lược an toàn thông tin Mar 20, 2026 - Phân tích các vấn đề an ninh mạng và giải pháp bảo mật trong bối cảnh tấn công chuỗi cung ứng ngày càng gia tăng. Học hỏi từ vụ vi phạm dữ liệu của Nissan. supply chain attackcungtin https://dev.to/jtorchia/bitwarden-cli-comprometido-lo-que-un-supply-chain-attack-sobre-una-herramienta-que-uso-me-obliga-a-453d Bitwarden CLI comprometido: lo que un supply chain attack sobre una herramienta que uso me obliga a... Apr 24, 2026 - Checkmarx detectó un supply chain attack sobre el ecosistema de Bitwarden CLI. Yo uso esa herramienta en producción. Esto no es un problema de Bitwarden — es... lo que unsupply chain attackbitwarden clisobre unacomprometido https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours UNC6426 used stolen GitHub tokens from the 2025 nx npm breach to gain AWS admin access in under 72 hours, enabling data theft and cloud destruction. npm supply chainadmin access72 hoursexploitsnx https://www.csoonline.com/article/4154176/cert-eu-blames-trivy-supply-chain-attack-for-europa-eu-data-breach.html CERT-EU blames Trivy supply chain attack for Europa.eu data breach | CSO Online Apr 3, 2026 - Attackers exploited a vulnerability scanner to steal 350GB of data that they then leaked on the dark web. cert eu blamestrivy supply chaineuropa data breachcso onlineattack https://www.pcmag.com/news/ransomware-attack-at-software-supplier-ensnares-starbucks-grocery-chain Ransomware Attack at Software Supplier Ensnares Starbucks, Grocery Chain | PCMag Starbucks is tracking employee’s work hours manually after a hack at Blue Yonder. ransomware attacksoftware suppliergrocery chainensnaresstarbucks https://securitybrief.co.uk/story/cyber-attack-on-m-s-exposes-uk-food-supply-chain-risks Cyber attack on M&S exposes UK food supply chain risks food supply chaincyber attackexposesukrisks https://www.f5.com.cn/glossary/supply-chain-attack Supply Chain Attack | F5 supply chain attackf5 https://www.careersinfosecurity.in/how-ai-supply-chain-monitor-spotted-unfolding-axios-attack-a-31468 How AI Supply-Chain Monitor Spotted Unfolding Axios Attack Elastic Security Labs quickly spotted the unfolding supply-chain attack that backdoored the popular JavaScript library Axios, thanks to a lightweight, AI-driven ai supply chainmonitor spotted unfoldingaxios attack https://thehackernews.com/2026/03/trivy-supply-chain-attack-triggers-self.html Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages CanisterWorm infects 28 npm packages via ICP-based C2, enabling self-propagation and persistent backdoor access across developer systems. trivy supply chainattack triggersnpm packagesselfspreading https://dev.to/pranay_batta/the-litellm-supply-chain-attack-broke-trust-in-python-based-ai-infrastructure-1poi The LiteLLM Supply Chain Attack Broke Trust in Python-Based AI Infrastructure - DEV Community Mar 27, 2026 - If you run LiteLLM in production, you probably had a rough week. On March 24, 2026, two backdoored... Tagged with ai, llm, python, security. litellm supply chaininfrastructure dev communitypython basedattackbroke https://netrouting.com/axios-npm-attack-ci-cd-security-risk/ Axios npm Supply Chain Attack: CI/CD & Infrastructure Risk Explained Apr 6, 2026 - Axios npm attack exposes CI/CD risks. Learn how dependency installs can compromise infrastructure and how to secure your pipelines. axios npm supplychain attackci cdrisk explainedinfrastructure https://arstechnica.com/security/2026/03/widely-used-trivy-scanner-compromised-in-ongoing-supply-chain-attack/ Widely used Trivy scanner compromised in ongoing supply-chain attack - Ars Technica Mar 20, 2026 - Admins: Sorry to say, but it's likely a rotate-your-secrets kind of weekend. supply chain attackwidely usedars technicatrivyscanner