5 Followers
51 Following
385 Posts

An open-source project called Axios (not the website), which has over 100M downloads weekly, was briefly hijacked overnight to drop remote access malware into two releases, potentially affecting countless developers. Already called "one of the most impactful npm supply chain attacks on record." 👀

by the very excellent @carlypage: https://www.theregister.com/2026/03/31/axios_npm_backdoor_rat/

Supply chain blast: Top npm package backdoored to drop dirty RAT on dev machines

: Hijacked maintainer account let attackers slip cross-platform trojan into 100M-downloads-a-week Axios

The Register
🇪🇺 🚨11 AM #ChatControl vote: They want to crush our privacy. Pirate @marketkag.bsky.social won't surrender, and neither should you. 🏴‍☠️
Call your wavering socialist, liberal and national conservative MEPs right now. Win or lose today, they need to know we will NEVER accept mass surveillance of our private chats. Act:
☎️ https://fightchatcontrol.eu #StopScanningMe
After years of planning a potential collab, I finally got to sit down with fellow cybersecurity YouTuber David Bombal for an in person interview! Below you can check out the video from what will hopefully be the first of many more collaborations 😃 :
https://www.youtube.com/watch?v=KsXzTz5H2QQ
Every Reason Why I Hate AI and You Should Too

YouTube

The GlassWorm supply-chain campaign has returned with a new, coordinated attack that targeted hundreds of packages, repositories, and extensions on GitHub, npm, and VSCode/OpenVSX extensions.

https://www.bleepingcomputer.com/news/security/glassworm-malware-hits-400-plus-code-repos-on-github-npm-vscode-openvsx/

GlassWorm malware hits 400+ code repos on GitHub, npm, VSCode, OpenVSX

The GlassWorm supply-chain campaign has returned with a new, coordinated attack that targeted hundreds of packages, repositories, and extensions on GitHub, npm, and VSCode/OpenVSX extensions.

BleepingComputer

LLM security testing framework for detecting prompt injection, jailbreaks, and adversarial attacks — 190+ probes, 28 providers, single Go binary

https://github.com/praetorian-inc/augustus

#infosec #cybersecurity #redteam #pentest #ai

Here is a fun thing. I work for Vivaldi Browser. Load any of our websites and you see no cookie banner and no mention of partners.

https://vivaldi.com

"But wait" you say, "didn't those terrible Europeans mandate the cookie banner!?"

No, no they did not. We do not need a cookie banner because we are not selling all your shit to every company under the sun.

Also those sites with cookie banners are just doing malicious compliance. This was never about the EU requiring cookie banners!

Vivaldi Browser | Powerful, Personal and Private web browser

It’s a web browser. But fun. It comes with a bunch of clever features built-in. It’s super flexible and does not track you. Get the Vivaldi browser for desktop, mobile, and your car!

Vivaldi Browser

This is just to say that Meta/Instagram are wrong in deprecating encrypted direct messages. This change is setting a dangerous precedent. DMs need to be private (and therefore encrypted).

We should not let them get away with it, otherwise more apps and platforms will follow.

AI is a cognitive ddos; either you've already surrendered your thinking to an LLM or you're forced to slog through swamps of AI slop for real information

@BSidesLuxembourg

@TindrasGrove

so I work at @greynoise which I'm sure has a more fancy and corporate description but, in a nutshell, I take data from honeypots. I identify exploits being sent to these honeypots. I write suricata signatures to match the exploits and add metadata describing what it is, when it was made, etc. That data is then sent as a data feed to SIEMs to give soc analysts another data point to hopefully make alert triage faster and sent to TIPs for intel teams. It's also put on the website to give a historical graph, geoip info, IPs to add to your firewall, things of that sort. I also conduct research in our logs to find things that are either not being talked about or things that are more niche and blog about them (I wrote this https://www.labs.greynoise.io/grimoire/2026-02-24-whats-that-string/ ).

What’s That String? That Time a Weird String Revealed a Whole Operation – GreyNoise Labs

One weird payload turned out to be a loose thread on an active hacking operation.

GreyNoise Labs

Microsoft will turn on hotpatch security updates by default for all eligible Windows devices managed through Microsoft Intune and the Microsoft Graph API, beginning with the May 2026 Windows security update.

https://www.bleepingcomputer.com/news/microsoft/microsoft-to-enable-hotpatch-security-updates-by-default-in-may/

Microsoft to enable Windows hotpatch security updates by default

Microsoft will turn on hotpatch security updates by default for all eligible Windows devices managed through Microsoft Intune and the Microsoft Graph API, beginning with the May 2026 Windows security update.

BleepingComputer