Axios functions as pre-built software that a developer can easily incorporate into a JavaScript project. However, a hacker ...
Attackers stole a long-lived npm token from the lead axios maintainer and published two poisoned versions that drop a ...
Axios, a widely used JavaScript HTTP client, was briefly distributed through npm in two malicious versions after a maintainer account was taken over. Security r ...
Critical digital infrastructure is increasingly maintained by under‑resourced individuals, yet exploits have economic and ...
The spike in oil prices driven by the war in Iran could make it more expensive to pave roads, driveways and parking lots.
The malicious releases were available for about three hours before they were removed, but the brevity of the window has done little to calm alarm because Axios is one of the most heavily used HTTP ...
In 2025, Google fixed a total of eight zero-days exploited in the wild, many of which were discovered and reported by ...
Suspected North Korean hackers are believed to be behind an ongoing compromise of the widely used open-source package Axios, ...
North Korean hackers published backdoored versions of the Axios NPM package using a compromised long-lived access token.
Google links Axios npm supply chain attack to UNC1069 after trojanized versions 1.14.1 and 0.30.4 spread WAVESHAPER.V2, ...
Cybercriminals are increasingly prioritizing speed and scalability over technical sophistication. Rather than crafting highly ...
Axios is published and maintained on npm, the default package registry for JavaScript and Node.js projects. It is used to ...