FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Cisco Intel Linux GitHub Rapid7 Check Point Cloudflare Oracle Palo Alto Networks F5 Citrix
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Supply Chain

20 articles

Tenable Blog Supply Chain 20h ago

The developer credential economy: Why exposure data is the new front line in the supply chain war

Recent supply chain attacks have highlighted an urgent need for organizations to shift from a reactive security posture to a preemptive exposure management s...

T1195

Tenable Blog →

GBHackers Supply Chain Apple 1d ago

Axios npm compromise traced to targeted social engineering attack

The recent compromise of the widely used Axios npm package has been confirmed as the result of a targeted social engineering attack. The incident, which brie...

T1204 T1195

GBHackers →

GBHackers Supply Chain Apple 1d ago

North Korea-Linked Hackers Hit Axios npm in Supply Chain Attack

A major software supply chain attack has been uncovered after threat actors compromised the widely used Axios npm package, impacting developers and organizat...

T1195

GBHackers →

SentinelOne Blog Supply Chain Apple SentinelOne 1d ago

Securing the Supply Chain: How SentinelOne®’s AI EDR Stops the Axios Attack Autonomously

Read our blog post to learn how SentinelOne’s AI EDR autonomously stopped a global LiteLLM supply chain attack before execution.

T1195

SentinelOne Blog →

SecurityWeek Supply Chain 2d ago

Mercor Hit by LiteLLM Supply Chain Attack

The AI recruiting firm is investigating the incident as Lapsus$ claimed the theft of 4TB of Mercor data. The post Mercor Hit by LiteLLM Supply Chain Attack a...

T1195

SecurityWeek →

Elastic Security Labs Supply Chain Apple 2d ago

How we caught the Axios supply chain attack

Joe Desimone shares the story of how he caught the Axios supply chain attack with a proof of concept tool built in an afternoon.

T1195

Elastic Security Labs →

The Record Supply Chain 2d ago

Mercor confirms security incident tied to LiteLLM supply chain attack

Although the LiteLLM attack was reportedly tied to a group called TeamPCP, the hacking gang Lapsus$ claimed on its website that it obtained hundreds of gigab...

T1195

The Record →

Unit 42 Supply Chain Apple 2d ago

Threat Brief: Widespread Impact of the Axios Supply Chain Attack

Unit 42 discusses the supply chain attack targeting Axios. Learn about the full attack chain, from the dropper to forensic cleanup.

T1195

Unit 42 →

SC Media Supply Chain 3d ago

AI startup Mercor confirms security incident linked to LiteLLM supply chain attack

The incident at Mercor is believed to stem from malicious code injected into the LiteLLM project, an open-source tool used by numerous companies to manage AI...

T1195

SC Media →

Help Net Security Supply Chain Apple 3d ago

North Korean hackers linked to Axios npm supply chain compromise

The software supply chain attack that resulted in the compromise of npm packages of Axios, an extremely popular HTTP client library, is believed to be the wo...

T1195

Help Net Security →

Security Affairs Supply Chain Apple SentinelOne 3d ago

SentinelOne autonomous detection blocks trojaned LiteLLM triggered by Claude Code

SentinelOne AI stopped a LiteLLM supply chain attack in seconds, blocking malicious code automatically without human intervention. SentinelOne’s AI-based sec...

T1195

Security Affairs →

SecurityWeek Supply Chain Apple GitHub 3d ago

Axios NPM Package Breached in North Korean Supply Chain Attack

A long-lived NPM access token was used to bypass the GitHub Actions OIDC-based CI/CD publishing workflow and push backdoored package versions. The post Axios...

T1195

SecurityWeek →

GBHackers Supply Chain 3d ago

NPM Supply Chain Attack Uses undicy-http to Deploy RAT

A highly sophisticated npm supply chain attack that abuses a fake HTTP client package to deliver both a powerful RAT and a stealthy browser stealer. The mali...

T1195

GBHackers →

Elastic Security Labs Supply Chain Apple 3d ago

Elastic releases detections for the Axios supply chain compromise

Hunting and detection rules for the Elastic-discovered Axios supply chain compromise.

T1195

Elastic Security Labs →

Elastic Security Labs Supply Chain Apple 3d ago

Inside the Axios supply chain compromise - one RAT to rule them all

Elastic Security Labs analyzes a supply chain compromise of the axios npm package delivering a unified cross-platform RAT

T1195

Elastic Security Labs →

Help Net Security Supply Chain Apple Oracle GitHub 4d ago

Axios npm packages backdoored in supply chain attack

An unknown attacker has compromised the GitHub and npm accounts of the main developer of Axios, a widely used HTTP client library, and published npm packages...

T1195

Help Net Security →

The Hacker News Supply Chain Apple 4d ago

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious depend...

T1195

The Hacker News →

SC Media Supply Chain 5d ago

PwC: Identity compromise a supply chain for attackers

PwC's "Cyber threats in motion" report warns that AI is giving attackers added sophistication, speed, and scale, but identity remains the fulcrum of entry, a...

SC Media →

SecurityWeek Supply Chain Microsoft Apple Linux 5d ago

Telnyx Targeted in Growing TeamPCP Supply Chain Attack

Two malicious versions of the popular SDK were uploaded to the PyPI registry, targeting Windows, macOS, and Linux. The post Telnyx Targeted in Growing TeamPC...

T1195

SecurityWeek →

SentinelOne Blog Supply Chain Mar 27

The Good, the Bad and the Ugly in Cybersecurity – Week 13

Alleged RedLine operator faces 30 years, FAUX#ELEVATE compromises enterprises in 30 seconds, and TeamPCP launches cascading supply chain attacks.

T1195

SentinelOne Blog →

1 2 3 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA