Flux
Toutes les catégories

Cybersécurité

68 articles

Socket Selected for OpenAI's Cybersecurity Grant Program

Socket Selected for OpenAI's Cybersecurity Grant Program

OpenAI has named Socket as one of the initial recipients of its Cybersecurity Grant Program, a new initiative that commits $10 million in API credits to support organizations advancing cybersecurity defense. The grant comes alongside access to more cyber-permissive frontier models through Trusted Access for Cyber, OpenAI's new identity-based framework for defensive acceleration. Both programs select for trusted defenders with a proven track record in identifying and remediating vulnerabilities…

Socket
Feross on the 10 Minutes or Less Podcast: Nobody Reads the Code

Feross on the 10 Minutes or Less Podcast: Nobody Reads the Code

In the past few weeks alone, we’ve seen a surge in supply chain attacks, increasingly sophisticated social engineering, and even nation-state actors targeting maintainers. What used to feel like a niche concern is now a daily reality for teams building with open source. In this conversation, Socket CEO Feross Aboukhadijeh joins 10 Minutes or Less, a podcast by Ali Rohde, General Partner at Outset Capital, to break down what’s happening right now, from how the Axios backdoor attack unfolded to…

Socket
108 Chrome Extensions Linked to Data Exfiltration and Session Theft via Shared C2 Infrastructure

108 Chrome Extensions Linked to Data Exfiltration and Session Theft via Shared C2 Infrastructure

Socket's Threat Research Team identified 108 malicious Chrome extensions operating as a coordinated campaign under a shared C2 infrastructure at cloudapi[.]stream. The extensions are published under five distinct publisher identities (Yana Project, GameGen, SideGames, Rodeo Games, and InterAlt) and collectively account for approximately 20k Chrome Web Store installs. All 108 route stolen credentials, user identities, and browsing data to servers controlled by the same operator. The extensions…

Socket
Axios Supply Chain Attack Reaches OpenAI macOS Signing Pipeline, Forces Certificate Rotation

Axios Supply Chain Attack Reaches OpenAI macOS Signing Pipeline, Forces Certificate Rotation

The recent compromise of the widely used Axios library has now been linked to downstream impact on software distribution pipelines, after OpenAI disclosed that a malicious version of the package was executed inside its macOS app signing workflow. The incident adds a new dimension to the ongoing supply chain campaign that has already targeted high-impact Node.js maintainers through a social engineering campaign attributed to North Korean actors. Malicious Axios Version Executed in CI # According…

Socket
Don't Kill the Goose That Lays the Golden Eggs

Don't Kill the Goose That Lays the Golden Eggs

March 2026 was a bad month. Back-to-back supply chain attacks with incident response teams running nonstop, real damage across ecosystems that millions of developers depend on, and legitimate questions about how we secure critical infrastructure. What it didn't have was an excuse to write an obituary for open source. In the wake of the attacks, familiar criticism has been making the rounds. It's a hot take dressed up as a reckoning. The argument goes something like this: open source is…

Socket
Feross on TBPN: How North Korea Hijacked Axios

Feross on TBPN: How North Korea Hijacked Axios

Socket CEO Feross Aboukhadijeh joined the TBPN podcast today to break down the Axios npm supply chain attack, one of the most significant open source compromises in recent months. TBPN, recently acquired by OpenAI, is a live daily tech show hosted by John Coogan and Jordi Hays. Feross walked through how North Korean state actors socially engineered the lead Axios maintainer over weeks, building a fake company, a fake Slack workspace, and a staged Microsoft Teams call before delivering malware…

Socket
Attackers Are Impersonating a Linux Foundation Leader in Slack to Target Open Source Developers

Attackers Are Impersonating a Linux Foundation Leader in Slack to Target Open Source Developers

A social engineering campaign is actively targeting open source developers through Slack, according to a high-severity advisory posted April 7 to the OpenSSF Siren mailing list. The attacker impersonates a known Linux Foundation community leader to lure victims into a multi-stage attack that ends with malware delivery and potential full system compromise. OpenSSF Siren is a public threat intelligence mailing list run by the Open Source Security Foundation (OpenSSF), a Linux Foundation project.…

Socket
North Korea’s Contagious Interview Campaign Spreads Across 5 Ecosystems, Delivering Staged RAT Payloads

North Korea’s Contagious Interview Campaign Spreads Across 5 Ecosystems, Delivering Staged RAT Payloads

We have been tracking North Korea’s Contagious Interview operation since 2024 and maintain a dedicated campaign page that now tracks more than 1,700 malicious packages linked to the activity. In this newly identified cluster, the threat actors operated under GitHub aliases including golangorg and published malicious packages across five open source ecosystems: npm: dev-log-core, logger-base, logkitx PyPI: logutilkit, apachelicense, fluxhttp, and license-utils-kit Go Modules:…

Socket
Microsoft Releases Open Source Toolkit for AI Agent Runtime Security

Microsoft Releases Open Source Toolkit for AI Agent Runtime Security

Microsoft has published its Agent Governance Toolkit, an open source project that brings runtime policy enforcement to autonomous AI agents. The release lands as the industry grapples with a widening gap between how fast AI agents are being deployed and how little infrastructure exists to govern what they do once they're running. The toolkit is available under the MIT license at the Microsoft GitHub organization and supports Python, TypeScript, Rust, Go, and .NET. Agent Governance Is Getting…

Socket
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign

Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign

Since we published our initial analysis of the axios compromise, a deep dive into its hidden blast radius, and a report on the maintainer confirming it was social engineering, maintainers across the Node.js ecosystem have come out of the woodwork to report that they were targeted by the same social engineering campaign. The accounts now span some of the most widely depended-upon packages in the npm registry and Node.js core itself, and together they confirm that axios was not a one-off target.…

Socket
Axios Maintainer Confirms Social Engineering Attack Behind npm Compromise

Axios Maintainer Confirms Social Engineering Attack Behind npm Compromise

On March 31, two malicious versions of Axios were briefly published to npm, introducing a dependency that installed a remote access trojan across macOS, Windows, and Linux. We covered the initial attack and its scope earlier, as well as a deeper technical analysis of its hidden blast radius and how dependency resolution expanded its impact exponentially. Now, the project’s lead maintainer has shared additional details about how the compromise occurred. A Targeted Social Engineering Attack # In…

Socket
Node.js Drops Bug Bounty Rewards After Funding Dries Up

Node.js Drops Bug Bounty Rewards After Funding Dries Up

The Node.js project has paused its long-running bug bounty program after the funding behind it was discontinued, removing a key security incentive from one of the most widely used JavaScript runtimes. For nearly a decade, Node.js participated in the Internet Bug Bounty (IBB) program through HackerOne, offering monetary rewards to researchers who responsibly disclosed security issues. That program is now on hold, leaving Node.js without a funded bounty structure for the first time since 2016.…

Socket
The Hidden Blast Radius of the Axios Compromise

The Hidden Blast Radius of the Axios Compromise

Yesterday, we reported on a supply chain attack targeting Axios that introduced a malicious dependency (plain-crypto-js) into specific npm releases. At first glance, the scope seemed contained: Two compromised Axios versions A short exposure window A malicious dependency that was quickly removed Over the past 24 hours, we’re seeing many teams focus on checking their lockfiles and node_modules directories, but that only captures part of the picture, especially when tools are executed dynamically…

Socket
Supply Chain Attack on Axios Pulls Malicious Dependency from npm

Supply Chain Attack on Axios Pulls Malicious Dependency from npm

A supply chain attack targeting the widely used HTTP client Axios has introduced a malicious dependency into specific npm releases, including axios@1.14.1 and axios@0.30.4. The latest version pulls in plain-crypto-js@4.2.1, a package that Socket has confirmed as malicious. Our analysis shows the malicious package deploys a multi-stage payload, including a remote access trojan (RAT) capable of executing arbitrary commands, exfiltrating system data, and persisting on infected machines. Axios is…

Socket
TeamPCP Compromises Telnyx Python SDK to Deliver Credential-Stealing Malware

TeamPCP Compromises Telnyx Python SDK to Deliver Credential-Stealing Malware

Socket has identified a supply chain attack affecting the telnyx Python package on PyPI. The telnyx library is the official Python SDK for the Telnyx communications platform, providing developers with programmatic access to APIs for voice calls, SMS/MMS messaging, WhatsApp, fax, IoT connectivity, and SIP trunking. It is commonly used in backend systems to integrate real-time communications and telephony into applications. Because the library is used to authenticate and send requests directly to…

Socket
Esc