Axios npm Supply Chain Attack FAQ: North Korea UNC1069
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access trojan to potentially millions of developer environments during…
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access trojan to potentially millions of developer environments during…
On October 1, 2024, over six thousand people opened the Calculator application on their computer—all at the same time. But they weren’t solving any equations…
Elastic Security Labs released initial triage and detection rules for the Axios supply-chain compromise. This is a detailed analysis of the RAT and payloads. Introduction…
Stop the noise and scale your cloud security. Our latest updates introduce custom policy automation via Explorer, AWS ABAC support for true least privilege, and…
Many of us wait until the holidays to gift our kids a phone, tablet, or gaming console. But getting the right device is just the…
As many security practitioners know, tampering with Endpoint Detection and Response (EDR) products is a deep desire for threat actors and red teamers alike. I…
Elastic Security Labs is releasing an initial triage and detection rules for the Axios supply-chain compromise. We will release a detailed analysis in a future…
Microsoft has come a LONG way with respect to security in the last decade. I really mean a LONG way. When I was at other…
The endpoint team at Huntress is focused on providing telemetry and protections around real adversary threats. One thing we’ve noticed that’s often overlooked is adversaries…
Threat actors are, frankly, rarely original. They share the same playbooks, tactics, and often don’t even bother to rename offensive security tool names. In early…
Welcome to “Truman’s Take,” where Product Marketing Manager James O’Leary sits down with Senior Product Researcher Truman Kain. As one of the leading minds behind…
Unpatched vulnerabilities remain one of the largest drivers of cyber risk, accounting for nearly 60% of cyber compromises. Modern security programs are therefore measured not only by…