Incident response determines how quickly and effectively an organization contains, investigates, and recovers from security breaches. These articles cover IR planning, detection and analysis workflows, containment strategies, and post-incident reviews. Learn how proactive pentesting reduces incident frequency and severity by identifying exploitable weaknesses before attackers do.
On March 31, 2026, an attacker hijacked the lead axios maintainer's npm account and published two malicious versions — axios@1.14.1 and axios@0.30.4 — injecting a cross-platform remote access trojan via a fake dependency. Here is the full timeline, technical analysis, IOCs, and what to do if you are affected.
The telnyx Python package was compromised on PyPI this morning. It is the fifth target in a supply chain campaign that has now crossed from vulnerability scanners to CI/CD pipelines to LLM gateways to telecom SDKs in nine days. Here is everything we know, every IOC, and exactly what to do if you are affected.
The Trivy supply chain attack in March 2026 compromised one of the most trusted open-source security scanners, cascading through GitHub Actions, Docker Hub, and downstream projects including Checkmarx KICS and LiteLLM. Here is the full timeline, what was affected, and how to respond.
LiteLLM's March 2026 vulnerability was a critical PyPI supply chain compromise affecting versions 1.82.7 and 1.82.8. Learn what happened, who was affected, and how to respond.