Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

US Thwarts DNS Hijacking Network Controlled by Russian APT28 Hackers

April 8, 2026

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

April 8, 2026

Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploit

April 8, 2026
Facebook X (Twitter) Instagram
Wednesday, April 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account
News

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

Team-CWDBy Team-CWDApril 8, 2026No Comments1 Min Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

The popular HTTP client known as Axios has suffered a supply chain attack after two newly published versions of the npm package introduced a malicious dependency that delivers a trojan capable of targeting Windows, macOS, and Linux systems.
Versions 1.14.1 and 0.30.4 of Axios have been found to inject “plain-crypto-js” version 4.2.1 as a fake dependency.
According to StepSecurity, the two



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploit
Next Article US Thwarts DNS Hijacking Network Controlled by Russian APT28 Hackers
Team-CWD
  • Website

Related Posts

News

US Thwarts DNS Hijacking Network Controlled by Russian APT28 Hackers

April 8, 2026
News

Fortinet Releases Emergency Patch After FortiClient EMS Bug Is Exploit

April 8, 2026
News

OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

April 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

September 5, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Common Apple Pay scams, and how to stay safe

January 22, 2026

Here’s what you should know

February 6, 2026

Mobile app permissions (still) matter more than you may think

February 27, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.