Sponsor of the Day:
Jerkmate
https://www.techradar.com/pro/security/three-high-risk-ai-vulnerabilities-discovered-in-claude-ai-end-to-end-attack-chain-exfiltrates-sensitive-info-without-user-knowing
Three high-risk AI vulnerabilities discovered in Claude.ai – end-to-end attack chain exfiltrates...
Mar 19, 2026 - A legitimate Google ad could lead to data exfiltration
high risk aivulnerabilities discoveredattack chainthreeclaude
https://www.computerweekly.com/news/366638863/Researchers-delve-inside-new-SolarWinds-RCE-attack-chain
Researchers delve inside new SolarWinds RCE attack chain | Computer Weekly
Researchers at Huntress and Microsoft have shared findings from their analysis of a new SolarWinds Web Help Desk vulnerability.
inside newattack chaincomputer weeklyresearchersdelve
https://hashnode.com/posts/trizetto-healthcare-breach-patient-data-exposure-attack-chain-ttps/69ad7b6c34565578f04e34e7
Discussion on "TriZetto Healthcare Breach: Patient Data Exposure Attack Chain TTPs" | Hashnode
trizetto healthcarepatient dataattack chaindiscussionbreach
https://www.enterprisesecuritytech.com/post/macos-malware-evolves-clickfix-attack-chain-shifts-from-terminal-to-script-editor-to-bypass-apple-d
macOS Malware Evolves: ClickFix Attack Chain Shifts from Terminal to Script Editor to Bypass Apple...
Apr 9, 2026 - A newly observed macOS malware campaign is signaling a tactical shift in how attackers deliver infostealers, quietly abandoning the Terminal in favor of a less...
macos malwareclickfix attackchain shiftsscript editorevolves
https://www.csoonline.com/article/4126336/from-credentials-to-cloud-admin-in-8-minutes-ai-supercharges-aws-attack-chain.html
From credentials to cloud admin in 8 minutes: AI supercharges AWS attack chain | CSO Online
Feb 4, 2026 - AI-assisted attackers weaponized exposed credentials and permissive roles to move from initial access to full AWS admin control in minutes.
8 minutesai superchargesattack chaincso onlinecredentials
https://securityonline.info/fake-adobe-reader-screenconnect-hijack-in-memory-attack/
New Stealth Attack Chain Weaponizes Legitimate Remote Access Software
Zscaler reveals a 2026 attack chain using fake Adobe Reader lures to install ScreenConnect via in-memory execution and UAC bypass. Protect your network now!
remote access softwarenew stealthattack chainweaponizeslegitimate
https://www.endorlabs.com/learn/shai-hulud-the-third-coming----inside-the-bitwarden-cli-2026-4-0-supply-chain-attack
The Bitwarden CLI Supply Chain Attack: What Happened and What to Do | Blog | Endor Labs
How attackers compromised Bitwarden's CLI and enlisted the help of AI coding agents to spread a worm and harvest developer secrets.
supply chain attackblog endor labsbitwarden clihappened
https://www.infoq.com/news/2026/03/litellm-supply-chain-attack/
PyPI Supply Chain Attack Compromises LiteLLM, Enabling the Exfiltration of Sensitive Information -...
Mar 31, 2026 - Discovered by FutureSearch researcher Callum McMahon, a supply chain attack against LiteLLM on PyPI resulted in over 40 thousand downloads of a compromised...
pypi supply chainsensitive informationattackcompromiseslitellm
https://ramimac.me/axios/
Axios npm Supply Chain Attack
Apr 6, 2026 - Timeline and IOCs for the Axios npm supply chain attack. Compromised maintainer account, credential stealer via plain-crypto-js dependency.
axios npm supplychain attack
https://securityaffairs.com/191215/malware/checkmarx-supply-chain-attack-impacts-bitwarden-npm-distribution-path.html
Checkmarx supply chain attack impacts Bitwarden npm distribution path
Apr 25, 2026 - Bitwarden CLI hit by the Checkmarx supply chain attack. Version 2026.4.0 shipped malicious code in bw1.js via a compromised GitHub Action.
checkmarx supply chainattackimpactsbitwardennpm
https://therecord.media/mercor-confirms-security-incident-tied-to-litellm
Mercor confirms security incident tied to LiteLLM supply chain attack | The Record from Recorded...
Apr 1, 2026 - Although the LiteLLM attack was reportedly tied to a group called TeamPCP, the hacking gang Lapsus$ claimed on its website that it obtained hundreds of...
litellm supply chainsecurity incidentmercorconfirmstied
https://dev.to/rverwey/the-axios-supply-chain-attack-what-happened-how-to-check-and-what-to-do-next-18n
The Axios Supply Chain Attack: What Happened, How to Check, and What to Do Next - DEV Community
Apr 6, 2026 - Two malicious versions of Axios were published to npm on March 31, 2026, hiding a dependency that... Tagged with webdev, cybersecurity, devops, npm.
axios supply chainnext devattackhappenedcheck
https://thehackernews.com/2021/07/kaseya-revil-ransomware-attack.html
Kaseya Supply-Chain Attack Hits Nearly 40 Service Providers With REvil Ransomware
Kaseya cyberattack hits hundreds of companies with REvil ransomware in a surprise supply chain attack.
supply chain attackhits nearly40 servicerevil ransomwarekaseya
https://www.theregister.com/2025/10/21/muji_askul_ransomware/
Muji's minimalist vibe wrecked amid supply chain attack • The Register
Oct 21, 2025 - : Japanese retailer halts online orders after attack cripples third-party vendor
amid supply chainmujiminimalistvibewrecked
https://www.theregister.com/2022/03/25/us_indicts_russian_state_hackers/
US reveals Russian supply chain attack on energy sector • The Register
Mar 25, 2022 - Poisoned SCADA apps could have disrupted power supply – perhaps even at nuclear plants
supply chain attackreveals russianenergy sectorregister
https://www.theregister.com/2026/04/27/supply_chain_campaign_targets_security/
Ongoing supply-chain attack targets security, dev tools • The Register
Apr 27, 2026 - : Vendor confirms repo data exposure after Lapsus$ claims source code, secrets dump
supply chain attacksecurity devongoingtargetstools
https://www.csoonline.com/article/4162865/bitwarden-cli-password-manager-trojanized-in-supply-chain-attack.html
Bitwarden CLI password manager trojanized in supply chain attack | CSO Online
Apr 23, 2026 - Attackers published a malicious command-line version of the popular open-source password manager to the npm registry and may be behind a spate of recent supply...
supply chain attackbitwarden clipassword managercso onlinetrojanized
https://www.crn.com/news/security/3cx-supply-chain-attack-8-biggest-things-to-know?page=2
3CX Supply Chain Attack: 8 Biggest Things To Know | CRN
CRN looks at the supply chain attack on 3CX phone system software, which is being likened to the attacks on SolarWinds and Kaseya.
supply chain attack8 biggest3cxthingsknow
https://www.ox.security/blog/shai-hulud-bitwarden-cli-supply-chain-attack/
Bitwarden CLI Compromised: Inside the Shai-Hulud Supply Chain Attack
supply chain attackbitwarden clishai huludcompromisedinside
https://unit42.paloaltonetworks.com/npm-supply-chain-attack/
"Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack (Updated November 26)
Self-replicating worm “Shai-Hulud” has compromised hundreds of software packages in a supply chain attack targeting the npm ecosystem. We discuss scope and...
shai hulud wormsupply chain attackupdated novembercompromisesnpm
https://www.aikido.dev/blog/npm-backdoor-lets-hackers-hijack-gambling-outcomes
npm supply chain attack hijacks game backend to rig gambling outcomes
Feb 17, 2026 - A targeted npm supply chain attack installs an Express backdoor, enables remote SQL/file access, and rewrites gambling balances while keeping logs consistent.
npm supply chaingame backendattackhijacksrig
https://thenextweb.com/news/wordpress-plugins-backdoor-supply-chain-essential-plugin-flippa-2
30+ WordPress plugins bought on Flippa and backdoored in supply chain attack
Apr 15, 2026 - An attacker purchased 30+ WordPress plugins on Flippa, planted backdoors that lay dormant for eight months, then activated cloaked SEO spam served only to...
supply chain attack30 wordpresspluginsboughtflippa
https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/
Supply-chain attack using invisible code hits GitHub and other repositories - Ars Technica
Mar 16, 2026 - Unicode that's invisible to the human eye was largely abandoned—until attackers took notice.
supply chain attackars technicausinginvisiblecode
https://www.databreachtoday.eu/how-ai-supply-chain-monitor-spotted-unfolding-axios-attack-a-31468
How AI Supply-Chain Monitor Spotted Unfolding Axios Attack
Elastic Security Labs quickly spotted the unfolding supply-chain attack that backdoored the popular JavaScript library Axios, thanks to a lightweight, AI-driven
ai supply chainmonitor spotted unfoldingaxios attack
https://gbhackers.com/cisa-warns-compromised-axios-npm-package/
CISA Warns Compromised Axios npm Package Fueled Major Supply Chain Attack
Apr 21, 2026 - CISA has issued an urgent alert regarding a severe software supply chain compromise affecting the widely used Axios node package manager (npm).
axios npm packagesupply chain attackcisa warnscompromisedfueled
https://futuresearch.ai/blog/litellm-pypi-supply-chain-attack/
Supply Chain Attack in litellm 1.82.8 on PyPI
Mar 24, 2026 - litellm version 1.82.8 on PyPI contains a malicious .pth file that harvests SSH keys, cloud credentials, and secrets on every Python startup, then attempts...
supply chain attack1 82litellmpypi
https://www.infosecurity-magazine.com/news/supply-chain-attack-smart/
Supply Chain Attack Uses Smart Contracts for C2 Ops - Infosecurity Magazine
Sep 28, 2025 - Checkmarx has observed a novel npm supply chain attack using Ethereum smart contracts to manage command-and-control (C2) operations
supply chain attackuses smartinfosecurity magazinecontractsc2
https://sigh.dev/posts/ctrl-tinycolor-post-mortem/
@ctrl/tinycolor Supply Chain Attack Post-mortem • sigh.dev - Scott Cooper's dev blog
Lessons learned from becoming the unexpected face of a npm supply-chain attack.
supply chain attacksigh dev scottpost mortemctrlcooper
https://cambridgeanalytica.org/data-breaches-scandals/checkmarx-github-leak-dark-web-march-supply-chain-50845/
Checkmarx's own GitHub repository just leaked on the dark web after March 23 supply chain attack
Apr 28, 2026 - Security software maker Checkmarx confirms its own GitHub data was stolen and posted on the dark web following a March 23 supply chain attack.
supply chain attackgithub repositorydark webmarch 23checkmarx
https://ifpnews.com/human-chain-of-iranian-people-to-condemn-trumps-attack-on-civilian-infrastructure/
Human Chain Of Iranian People To Condemn Trump's Attack On Civilian Infrastructure - Iran Front Page
Apr 18, 2026 - In response to the US President's threat to target Iranian civilian infrastructure, the people of Iran formed human chains near these targets.
human chainiranian peoplecondemn trumpcivilian infrastructureattack
https://www.networkworld.com/article/4154185/cert-eu-blames-trivy-supply-chain-attack-for-europa-eu-data-breach-2.html
CERT-EU blames Trivy supply chain attack for Europa.eu data breach | Network World
Apr 3, 2026 - Attackers exploited a vulnerability scanner to steal 350GB of data that they then leaked on the dark web.
cert eu blamestrivy supply chaineuropa data breachnetwork worldattack
https://threats.wiz.io/all-incidents/solana-web3js-supply-chain-attack
Solana web3.js Supply Chain Attack
On December 3, 2024, a critical supply chain attack was uncovered targeting versions 1.95.6 and 1.95.7 of the widely-used @solana/web3.js JavaScript library....
supply chain attackweb3 jssolana
https://www.truesec.com/hub/blog/kaseya-supply-chain-attack-targeting-msps-to-deliver-revil-ransomware
All you need to know about Kaseya supply chain attack - Truesec
Learn more about Kaseya VSA, a product used by MSPs as part of a supply chain attack, delivering REvil ransomware to thousands of organizations.
supply chain attackneedknowkaseyatruesec
https://phoenix.security/bitwarden-cli-backdoored-shai-hulud-returns-through-a-93-minute-npm-window/
Bitwarden CLI Backdoored: 93-Minute npm Supply Chain Attack
Apr 24, 2026 - @bitwarden/cli 2026.4.0 was live on npm for 93 minutes with a credential stealer, npm worm, workflow injector, and AI assistant poisoning payload. IOCs and...
npm supply chainbitwarden clibackdoored93minute
https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/
8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur
Feb 4, 2025 - Surprise surprise, we've done it again. We've demonstrated an ability to compromise significantly sensitive networks, including governments, militaries, space...
supply chain attack8 millionlook amateurrequestslater
https://thehackernews.com/search/label/supply%20chain%20attack
supply chain attack — Latest News, Reports & Analysis | The Hacker News
Explore the latest news, real-world incidents, expert analysis, and trends in supply chain attack — only on The Hacker News, the leading cybersecurity and IT...
supply chain attacklatest news reportsanalysishacker
https://www.endorlabs.com/learn/supply-chain-attack-targeting-cline-installs-openclaw
Supply Chain Attack targeting Cline installs OpenClaw | Blog | Endor Labs
A compromised release of the popular Cline CLI npm package silently installs OpenClaw globally on any machine.
supply chain attackblog endor labstargetingclineinstalls
https://thehackernews.com/2026/04/google-attributes-axios-npm-supply.html
Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069
Google links Axios npm supply chain attack to UNC1069 after trojanized versions 1.14.1 and 0.30.4 spread WAVESHAPER.V2, impacting multiple OS.
axios npm supplychain attacknorth koreangoogleattributes
https://www.ox.security/open-software-supply-chain-attack-reference-oscr/
Open Software Supply Chain Attack Reference (OSC&R) | OX Security
software supply chainox securityopenattackreference
https://www.giskard.ai/knowledge/litellm-supply-chain-attack-2026
How the LiteLLM PyPI Supply Chain Attack Happened — and What to Do If You're Affected
On March 24 2026, attackers published two malicious versions of the litellm Python library to PyPI, stealing SSH keys, cloud credentials, and Kubernetes...
pypi supply chainlitellmattackhappenedaffected
https://www.databreachtoday.asia/how-ai-supply-chain-monitor-spotted-unfolding-axios-attack-a-31468
How AI Supply-Chain Monitor Spotted Unfolding Axios Attack
Elastic Security Labs quickly spotted the unfolding supply-chain attack that backdoored the popular JavaScript library Axios, thanks to a lightweight, AI-driven
ai supply chainmonitor spotted unfoldingaxios attack
https://info.varonis.com/en/webinar/state-of-cybercrime-2026-04-08
State of Cybercrime: The Axios Supply Chain Attack
Explore the Axios supply chain attack's implications for cybersecurity as experts discuss emerging threats and actionable insights to mitigate risks in the...
axios supply chainstatecybercrimeattack
https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html
Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
Axios 1.14.1 and 0.30.4 injected malicious plain-crypto-js@4.2.1 after npm compromise on March 31, 2026, deploying cross-platform RAT malware.
axios supply chaincross platform ratvia compromisedattackpushes
https://www.infoworld.com/article/4117662/possible-software-supply-chain-attack-through-aws-codebuild-service-blunted.html
Possible software supply chain attack through AWS CodeBuild service blunted | InfoWorld
Jan 15, 2026 - Researchers at Wiz, who discovered the hole, said it could have led to compromised AWS GitHub repositories.
software supply chainaws codebuildpossibleattackservice
https://sansec.io/research/polyfill-supply-chain-attack
Polyfill supply chain attack hits 100K+ sites | Sansec
Apr 14, 2026 - The new Chinese owner of the popular Polyfill JS project injects malware into more than 100 thousand sites.
supply chain attackpolyfillhits100ksites
https://www.databreachtoday.com/how-ai-supply-chain-monitor-spotted-unfolding-axios-attack-a-31468
How AI Supply-Chain Monitor Spotted Unfolding Axios Attack
Elastic Security Labs quickly spotted the unfolding supply-chain attack that backdoored the popular JavaScript library Axios, thanks to a lightweight, AI-driven
ai supply chainmonitor spotted unfoldingaxios attack
https://www.theregister.com/2025/08/27/nx_npm_supply_chain_attack/
Nx NPM packages poisoned in AI-assisted supply chain attack • The Register
Aug 27, 2025 - : Stolen dev credentials posted to GitHub as attackers abuse CLI tools for recon
supply chain attacknpm packagesnxpoisonedassisted
https://safedep.io/shai-hulud-second-coming-supply-chain-attack/
Shai-Hulud 2.0 npm Supply Chain Attack Technical Analysis - Real-time Open Source Software Supply...
Critical npm supply chain attack compromises zapier-sdk, @asyncapi, posthog, and @postman packages with self-replicating malware. Technical analysis reveals...
shai hulud 2npm supply chainanalysis real timeopen source software
https://www.helpnetsecurity.com/2026/03/31/axios-npm-backdoored-supply-chain-attack/
Axios npm packages backdoored in supply chain attack - Help Net Security
Mar 31, 2026 - An attacker has published backdoored Axios npm packages that trigger the installation of droppers and remote access trojans.
supply chain attackaxios npmpackagesbackdooredhelp
https://securelist.com/escan-supply-chain-attack/118688/
eScan supply chain attack: what you should know | Securelist
Feb 4, 2026 - On January 20, Kaspersky solutions detected malware used in eScan antivirus supply chain attack. In this article we provide available information on the...
supply chain attackescanknowsecurelist
https://circleid.com/posts/a-look-back-at-the-top-ransomware-attack-targeting-the-salesforce-supply-chain
A Look Back at the Top Ransomware Attack Targeting the Salesforce Supply Chain
A sprawling ransomware campaign targeting Salesforce's SaaS supply chain topped 2025's breach rankings, exposing millions of records. Fresh DNS analysis...
look backtop ransomwareattack targetingsupply chainsalesforce
https://news.opensuse.org/2024/03/29/xz-backdoor/
openSUSE addresses supply chain attack against xz compression library - openSUSE News
openSUSE maintainers received notification of a supply chain attack against the “xz” compression tool and “liblzma5” library. Background Andres Freund report...
supply chain attackcompression libraryopensuseaddressesxz
https://www.crowdstrike.com/en-us/blog/cve-2024-3094-xz-upstream-supply-chain-attack/
CVE-2024-3094 and XZ Upstream Supply Chain Attack | CrowdStrike
Feb 3, 2025 - Learn about the CVE-2024-3094 and XZ Upstream Supply Chain Attack and how CrowdStrike is protecting its customers from exploitation.
cve 2024 3094supply chain attackxzupstreamcrowdstrike
https://www.infoworld.com/article/4154187/cert-eu-blames-trivy-supply-chain-attack-for-europa-eu-data-breach-3.html
CERT-EU blames Trivy supply chain attack for Europa.eu data breach | InfoWorld
Apr 3, 2026 - Attackers exploited a vulnerability scanner to steal 350GB of data that they then leaked on the dark web.
cert eu blamestrivy supply chaineuropa data breachattackinfoworld
https://www.computerworld.com/article/4152490/why-the-axios-supply-chain-attack-should-have-apple-worried.html
Why the axios supply chain attack should have Apple worried – Computerworld
Mar 31, 2026 - Critical digital infrastructure is increasingly maintained by under‑resourced individuals, yet exploits have economic and national security consequences — even...
axios supply chainattackappleworriedcomputerworld
https://adnanthekhan.com/2023/12/20/one-supply-chain-attack-to-rule-them-all/
One Supply Chain Attack to Rule Them All - Poisoning GitHub's Runner Images | Adnan Khan - Security...
Dec 20, 2023 - One Supply Chain Attack to Rule Them All - Poisoning GitHub's Runner Images - Security research by adnanthekhan
one supply chainadnan khan securityattackrulepoisoning
https://www.thehindu.com/sci-tech/technology/apple-ios-vulnerability-chain-exposes-new-attack-pathway-researchers-say/article70760838.ece
Apple iOS vulnerability chain exposes new attack pathway, researchers say - The Hindu
A newly identified set of iOS vulnerabilities is at the centre of a sophisticated attack method known as “DarkSword,” according to a new research by Google’s...
apple iosexposes newresearchers sayvulnerabilitychain
https://devtalk.com/t/the-vercel-breach-oauth-supply-chain-attack-exposes-the-hidden-risk-in-platform-environment-variables/242279
The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment...
An OAuth supply chain compromise at Vercel exposed how trusted third party apps and platform environment variables can bypass traditional defenses and amplify...
supply chain attackvercel breachexposes hiddenplatform environmentoauth
https://wpshout.com/wceu-supply-chain-attack-more-acquisitions-july-2024-wordpress-news/
WordCamp Europe, Supply Chain Attack, More Acquisitions 🗞️ July 2024 WordPress News w/ WPShout
Jul 1, 2024 - This news roundup covers WordCamp Europe 2024, an ongoing supply chain attack affecting WordPress, some notable acquisitions, and more.
supply chain attackwordcamp europejuly 2024wordpress newsacquisitions
https://www.reflectiz.com/blog/appsflyer-supply-chain-attack/
AppsFlyer SDK Exploited in New Supply Chain Crypto Attack – Reflectiz
Apr 23, 2026 - AppsFlyer Supply Chain Attack: Explore how AppsFlyer's SDK was exploited in this new supply chain attack targeting crypto.
new supply chainappsflyersdkexploitedcrypto
https://www.trendmicro.com/en_us/research/26/c/axios-npm-package-compromised.html
Axios NPM Package Compromised: Supply Chain Attack Hits JavaScript HTTP Client with 100M+ Weekly...
axios npm packagesupply chain attackhttp clientcompromisedhits
https://www.infoq.com/news/2026/04/axios-supply-chain/
Axios npm Package Compromised in Supply Chain Attack - InfoQ
Apr 2, 2026 - On March 31, 2026, two versions of the Axios library were compromised and found to contain a Remote Access Trojan. The malicious packages were published...
axios npm packagesupply chain attackcompromisedinfoq
https://simonwillison.net/2026/Apr/3/supply-chain-social-engineering/
The Axios supply chain attack used individually targeted social engineering
The Axios team have published a full postmortem on the supply chain attack which resulted in a malware dependency going out in a release the other day, and it...
axios supply chaintargeted socialattackusedindividually
https://www.bankinfosecurity.co.uk/litellm-hit-in-cascading-supply-chain-attack-a-31210
LiteLLM Hit in Cascading Supply-Chain Attack - BankInfoSecurity
Threat group TeamPCP exploited credentials stolen in the Trivy breach to push malicious versions of LiteLLM to PyPI, exposing developers to credential theft,
supply chain attacklitellmhitcascadingbankinfosecurity
https://www.trendmicro.com/en_gb/research/26/d/vercel-breach-oauth-supply-chain.html
The Vercel Breach: OAuth Supply Chain Attack Exposes the Hidden Risk in Platform Environment...
An OAuth supply chain compromise at Vercel exposed how trusted third party apps and platform environment variables can bypass traditional defences and amplify...
supply chain attackvercel breachexposes hiddenplatform environmentoauth
https://thehackernews.com/2026/04/unc1069-social-engineering-of-axios.html
UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
UNC1069 compromised Axios 1.14.1 and 0.30.4 via social engineering, impacting 100M weekly downloads and exposing supply chains.
npm supply chainsocial engineeringunc1069axiosmaintainer
https://it.slashdot.org/story/26/04/05/0316250/top-npm-maintainers-targeted-with-ai-deepfakes-in-massive-supply-chain-attack-axios-briefly-compromised
Top NPM Maintainers Targeted with AI Deepfakes in Massive Supply-Chain Attack, Axios Briefly...
supply chain attacktopnpmmaintainerstargeted
https://www.infoq.com/news/2026/04/trivy-supply-chain-attack/
Open Source Security Tool Trivy Hit by Supply Chain Attack, Prompting Urgent Industry Response -...
Apr 3, 2026 - A major security incident affecting the widely used open source vulnerability scanner Trivy has exposed critical weaknesses in software supply chain security,...
open source securitysupply chain attackindustry responsetooltrivy
https://blog.securelayer7.net/pypi-litellm-supply-chain-attack/
PyPI litellm Supply Chain Attack Explained: Risks & Prevention
litellm supply chainattack explainedrisks preventionpypi
https://www.paloaltonetworks.com/blog/cloud-security/trivy-supply-chain-attack/
When Security Scanners Become the Weapon: Breaking Down the Trivy Supply Chain Attack
Mar 27, 2026 - The Trivy Supply Chain Attack shows how security tools can be weaponized. Learn how this 2026 breach unfolded and how Cortex Cloud blocks the threat.
trivy supply chainsecurity scannersbecomeweaponbreaking
https://www.securityweek.com/bitwarden-npm-package-hit-in-supply-chain-attack/
Bitwarden NPM Package Hit in Supply Chain Attack - SecurityWeek
Apr 24, 2026 - The Bitwarden CLI NPM package compromise is tied to a Checkmarx supply chain attack and references the Shai-Hulud worm.
supply chain attacknpm packagebitwardenhitsecurityweek
https://www.csoonline.com/article/4028412/supply-chain-attack-compromises-npm-packages-to-spread-backdoor-malware.html
Supply chain attack compromises npm packages to spread backdoor malware | CSO Online
Jul 24, 2025 - Phishing attacks on package maintainer accounts led to infected JavaScript type testing utilities.
supply chain attacknpm packagesbackdoor malwarecso onlinecompromises
https://www.tenable.com/blog/faq-about-the-axios-npm-supply-chain-attack-by-north-korea-nexus-threat-actor-unc1069
Axios npm Supply Chain Attack FAQ: North Korea UNC1069 | Tenable®
Apr 7, 2026 - North Korea-nexus threat actor UNC1069 compromised the axios npm package, delivering the WAVESHAPER.V2 RAT to macOS, Windows, and Linux systems.
axios npm supplychain attackfaq northkoreaunc1069
https://www.f5.com/glossary/supply-chain-attack
Supply Chain Attack | F5
supply chain attackf5
https://phoenix.security/teampcp-litellm-supply-chain-compromise-pypi-credential-stealer-kubernetes/
LiteLLM Backdoored by TeamPCP: PyPI Supply Chain Attack (2026)
Mar 30, 2026 - TeamPCP backdoored LiteLLM v1.82.7 and v1.82.8 on PyPI with a credential stealer, K8s lateral movement, and persistent backdoor. Full IOCs, detection, and...
pypi supply chainattack 2026litellmbackdooredteampcp
https://www.tenable.com/blog/supply-chain-attack-on-axios-npm-package-scope-impact-and-remediations
Axios npm supply chain attack | Tenable®
Apr 7, 2026 - The attacker injected a malicious package called “plain-crypto-js” into the dependency tree of Axios versions 1.14.1 and 0.30.4. Scan your environment now to...
axios npm supplychain attack
https://attack.hr/hr/the-chain-of-music-venues-pluralism
The Chain Of Music (Venues) Pluralism - Attack
music venueschainpluralismattack
https://www.herodevs.com/blog-posts/the-litellm-supply-chain-attack-what-happened-why-it-matters-and-what-to-do-next
HeroDevs Blog | The LiteLLM Supply Chain Attack: What Happened, Why It Matters, and What to Do Next
A deep dive into the LiteLLM supply chain attack, how malicious PyPI packages exposed developer credentials, and the critical steps you need to take to secure...
litellm supply chainherodevs blogattackhappenedmatters
https://www.csoonline.com/video/508779/lessons-from-the-solarwinds-attack-on-securing-the-software-supply-chain.html
Lessons from the SolarWinds attack on securing the software supply chain | CSO Online
software supply chaincso onlinelessonssolarwindsattack
https://www.careersinfosecurity.asia/how-ai-supply-chain-monitor-spotted-unfolding-axios-attack-a-31468
How AI Supply-Chain Monitor Spotted Unfolding Axios Attack
Elastic Security Labs quickly spotted the unfolding supply-chain attack that backdoored the popular JavaScript library Axios, thanks to a lightweight, AI-driven
ai supply chainmonitor spotted unfoldingaxios attack
https://securelist.com/notepad-supply-chain-attack/118708/
Notepad++ supply chain attack breakdown | Securelist
Feb 16, 2026 - Kaspersky GReAT experts discovered previously undocumented infection chains used in the Notepad++ supply chain attacks. The article provides new IoCs related...
supply chain attacknotepadbreakdownsecurelist
https://www.aikido.dev/blog/glassworm-strikes-react-packages-phone-numbers
Glassworm Strikes Popular React Native Phone Number Packages in a New Supply Chain Attack
Mar 18, 2026 - Aikido Security researchers recovered and decrypted the full payload chain from two malicious React Native packages. Here's what the malware does and what to...
new supply chainreact nativephone numberglasswormstrikes
https://netnam.com/thu-vien/blog/supply-chain-attack-lan-song-tan-cong-chuoi-cung-ung-va-chien-luoc-an-toan-thong-tin
Supply Chain Attack: Làn sóng tấn công chuỗi cung ứng và chiến lược an toàn thông tin
Mar 20, 2026 - Phân tích các vấn đề an ninh mạng và giải pháp bảo mật trong bối cảnh tấn công chuỗi cung ứng ngày càng gia tăng. Học hỏi từ vụ vi phạm dữ liệu của Nissan.
supply chain attackcungtin
https://dev.to/jtorchia/bitwarden-cli-comprometido-lo-que-un-supply-chain-attack-sobre-una-herramienta-que-uso-me-obliga-a-453d
Bitwarden CLI comprometido: lo que un supply chain attack sobre una herramienta que uso me obliga a...
Apr 24, 2026 - Checkmarx detectó un supply chain attack sobre el ecosistema de Bitwarden CLI. Yo uso esa herramienta en producción. Esto no es un problema de Bitwarden — es...
lo que unsupply chain attackbitwarden clisobre unacomprometido
https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html
UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
UNC6426 used stolen GitHub tokens from the 2025 nx npm breach to gain AWS admin access in under 72 hours, enabling data theft and cloud destruction.
npm supply chainadmin access72 hoursexploitsnx
https://www.csoonline.com/article/4154176/cert-eu-blames-trivy-supply-chain-attack-for-europa-eu-data-breach.html
CERT-EU blames Trivy supply chain attack for Europa.eu data breach | CSO Online
Apr 3, 2026 - Attackers exploited a vulnerability scanner to steal 350GB of data that they then leaked on the dark web.
cert eu blamestrivy supply chaineuropa data breachcso onlineattack
https://www.pcmag.com/news/ransomware-attack-at-software-supplier-ensnares-starbucks-grocery-chain
Ransomware Attack at Software Supplier Ensnares Starbucks, Grocery Chain | PCMag
Starbucks is tracking employee’s work hours manually after a hack at Blue Yonder.
ransomware attacksoftware suppliergrocery chainensnaresstarbucks
https://securitybrief.co.uk/story/cyber-attack-on-m-s-exposes-uk-food-supply-chain-risks
Cyber attack on M&S exposes UK food supply chain risks
food supply chaincyber attackexposesukrisks
https://www.f5.com.cn/glossary/supply-chain-attack
Supply Chain Attack | F5
supply chain attackf5
https://www.careersinfosecurity.in/how-ai-supply-chain-monitor-spotted-unfolding-axios-attack-a-31468
How AI Supply-Chain Monitor Spotted Unfolding Axios Attack
Elastic Security Labs quickly spotted the unfolding supply-chain attack that backdoored the popular JavaScript library Axios, thanks to a lightweight, AI-driven
ai supply chainmonitor spotted unfoldingaxios attack
https://thehackernews.com/2026/03/trivy-supply-chain-attack-triggers-self.html
Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages
CanisterWorm infects 28 npm packages via ICP-based C2, enabling self-propagation and persistent backdoor access across developer systems.
trivy supply chainattack triggersnpm packagesselfspreading
https://dev.to/pranay_batta/the-litellm-supply-chain-attack-broke-trust-in-python-based-ai-infrastructure-1poi
The LiteLLM Supply Chain Attack Broke Trust in Python-Based AI Infrastructure - DEV Community
Mar 27, 2026 - If you run LiteLLM in production, you probably had a rough week. On March 24, 2026, two backdoored... Tagged with ai, llm, python, security.
litellm supply chaininfrastructure dev communitypython basedattackbroke
https://netrouting.com/axios-npm-attack-ci-cd-security-risk/
Axios npm Supply Chain Attack: CI/CD & Infrastructure Risk Explained
Apr 6, 2026 - Axios npm attack exposes CI/CD risks. Learn how dependency installs can compromise infrastructure and how to secure your pipelines.
axios npm supplychain attackci cdrisk explainedinfrastructure
https://arstechnica.com/security/2026/03/widely-used-trivy-scanner-compromised-in-ongoing-supply-chain-attack/
Widely used Trivy scanner compromised in ongoing supply-chain attack - Ars Technica
Mar 20, 2026 - Admins: Sorry to say, but it's likely a rotate-your-secrets kind of weekend.
supply chain attackwidely usedars technicatrivyscanner