CVE-2025-59528 exploited in Flowise for over six months across 12,000+ exposed instances, enabling full system compromise.
Threat actors have started exploiting CVE-2025-59528, a critical Flowise vulnerability leading to remote code execution.
Hackers are exploiting a maximum-severity vulnerability, tracked as CVE-2025-59528, in the open-source platform Flowise for ...
A supply-chain attack backdoored versions of Axios, a popular JavaScript library that's present in many different software ...
The Internet Bug Bounty program has paused new submissions, citing a massive expansion in vulnerability discovery by AI code ...
The biggest story of the week is a new massive supply chain breach, which appears to be unrelated to the previous massive supply chain breaches, this time of the Axios HTTP project. Axios was ...
On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages ...
Wasm, PGlite, OPFS, and other new tech bring robust data storage to the browser, Electrobun brings Bun to desktop apps, ...
Two CISOs dissect the Axios npm attack, revealing a self-erasing RAT, CI/CD compromise risks and why open-source software ...
Security teams are grappling with a major supply chain attack on Axios, a popular JavaScript library with over 100 million ...
Researchers who identify and report bugs in open-source software will no longer be rewarded by the Internet Bug Bounty team.
UNC1069 compromised Axios 1.14.1 and 0.30.4 via social engineering, impacting 100M weekly downloads and exposing supply ...