https://socket.dev/blog/bitwarden-cli-compromised #Bitwarden #SupplyChain #SocketResearch #npmSecurity #HackNews #HackerNews #ngated
Axios npm Account Hijacked, Malware Injected
Axios npm account hijacked, malware injected into popular JavaScript library. Developers using versions 1.14.1 or 0.30.4 are at risk. Learn how to protect your code.
#AxiosAttack, #npmSecurity, #JavaScriptMalware, #CyberSecurity, #SoftwareSupplyChain
https://newsletter.tf/axios-npm-malware-attack-developers-risk/
Malicious code was put into the popular Axios JavaScript library for 3 hours. This is a new risk for developers using npm.
#AxiosAttack, #npmSecurity, #JavaScriptMalware, #CyberSecurity, #SoftwareSupplyChain
https://newsletter.tf/axios-npm-malware-attack-developers-risk/
[Claude Code ์์ค ์ฝ๋๊ฐ npm ๋ ์ง์คํธ๋ฆฌ ๋งต ํ์ผ์ ํตํด ์ ์ถ
Anthropic์ Claude Code CLI ์์ค ์ฝ๋๊ฐ npm ๋ ์ง์คํธ๋ฆฌ ๋ด .map ํ์ผ์ ํตํด ์ ์ถ๋ ์ฌ๋ก๊ฐ ๋ณด๊ณ ๋์๋ค. .map ํ์ผ์ ์์ค ์ฝ๋์ ๋๋ฒ๊น ์ ๋ณด๋ฅผ ํฌํจํ์ฌ ์๋ณธ ์์ค ์ฝ๋๋ฅผ ๋ณต์ ๊ฐ๋ฅํ ํํ๋ก ์ ๊ณตํ ์ ์์ด, ๋ณด์์ ์ฌ๊ฐํ ๋ฌธ์ ๋ก ํ๊ฐ๋๋ค. ์ด ์ฌ๊ฑด์ ์คํ์์ค ํ๋ก์ ํธ๋ ํด๋ผ์ฐ๋ ๊ธฐ๋ฐ AI ๋๊ตฌ ๊ฐ๋ฐ ์ ๋ณด์ ์ทจ์ฝ์ ๊ด๋ฆฌ์ ์์ค ์ฝ๋ ์ ์ถ ๋ฐฉ์ง ์ ๋ต์ ์ค์์ฑ์ ๊ฐ์กฐํ๋ค.
https://news.hada.io/topic?id=28059
#anthropic #claudecode #sourcecodeleak #npmsecurity #aisecurity
A malicious npm package is stealing WhatsApp messages โ a sharp reminder that the software supply chain can betray even trusted platforms. Verify dependencies, always. ๐ฆ๐ #SupplyChainRisk #NPMSecurity
https://www.theregister.com/2025/12/22/whatsapp_npm_package_message_steal/
A malicious npm package factory is churning out contagious code โ proving the software supply chain can be poisoned at the source. Developers must verify every dependency. ๐งฉโ ๏ธ #NPMSecurity #SupplyChainRisk
https://www.darkreading.com/application-security/contagious-interview-malicious-npm-package-factory
Moving Beyond the NPM elliptic Package
If you're in a hurry, head on over to soatok/elliptic-to-noble and follow the instructions in the README in order to remove the elliptic package from your project and all dependencies in node_modules. Art: CMYKat Why replace the elliptic package? Yesterday, the Trail of Bits blog published a post about finding cryptographic bugs in the elliptic library (a Javascript package on NPM) by using the Wycheproof.
http://soatok.blog/2025/11/19/moving-beyond-the-npm-elliptic-package/
#npm #crypto #cryptography #elliptic #security #infosec #cve #mitigation #appsec #javascript #js #npm #npmsecurity #npmpackages
Over 46,000 fake npm packages flood the ecosystem โ attackers are poisoning the software supply chain at scale. Developers must verify before they install. ๐ฆโ ๏ธ #SoftwareSupplyChain #NPMSecurity
https://thehackernews.com/2025/11/over-46000-fake-npm-packages-flood.html
๐จ 10 npm packages found deploying a multi-stage credential harvester.
Fake CAPTCHAs, IP fingerprinting, and PyInstaller malware targeting Windows, macOS, Linux - all under typosquatted names like typescriptjs and etherdjs.
๐ฌ How are you strengthening your open-source dependency vetting?
Follow @technadu for daily infosec intel and malware investigations.
#CyberSecurity #SupplyChainAttack #NPMSecurity #DevSecOps #ThreatIntelligence #CredentialTheftattacks