🕳️ Vulnerabilities & CVEs

North Korean Hackers Turn Axios NPM into Malware Machine: Supply Chain's New Frontline

North Korean hackers didn't just breach an npm account—they hijacked Axios, a package pulled 100 million times weekly, and laced it with self-deleting malware. This week's threats expose how attackers are betting big on the software build process.

North Korean hackers compromising Axios NPM package supply chain attack visualization

⚡ Key Takeaways

  • North Korean hackers compromised Axios NPM, turning a 100M-download package into malware via supply chain. 𝕏
  • Chrome's WebGPU 0-day (CVE-2026-5281) and Fortinet EMS exploits highlight active threats in core tools. 𝕏
  • Build pipelines are the new attack surface—audit deps, CI/CD, and dev envs immediately. 𝕏
Published by

Threat Digest

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by The Hacker News

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.