Malicious telnyx 4.87.1/4.87.2 on PyPI used audio steganography March 27, 2026, enabling cross-platform credential theft.
Turn Excel into a lightweight data-science tool for cleaning datasets, standardizing dates, visualizing clusters, and ...
IntroductionOn March 31, 2026, Anthropic accidentally exposed the full source code of Claude Code (its flagship ...
Axios 1.14.1 and 0.30.4 injected malicious plain-crypto-js@4.2.1 after npm compromise on March 31, 2026, deploying ...
A cyber attack hit LiteLLM, an open-source library used in many AI systems, carrying malicious code that stole credentials ...
A supply-chain attack backdoored versions of Axios, a popular JavaScript library that's present in many different software ...
Threats actors pounced on the vulnerability within hours of its disclosure, demonstrating that organizations have little time ...
An attacker compromised the npm account of a lead Axios maintainer on March 30, and used it to publish two malicious versions ...
Two versions of the widely used JavaScript library axios were maliciously published on npm on March 31, 2026. A hijacked ...
A newly documented BlankGrabber infection chain is using a bogus “certificate” loader to disguise a multi-stage Windows compromise, adding another layer of deception to a commodity stealer already ...
On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages ...