<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>appsec.fyi — Supply Chain Security</title>
  <link>https://appsec.fyi/supplychain.html</link>
  <description>Curated Supply Chain Security resources from appsec.fyi</description>
  <language>en-us</language>
  <atom:link href="https://appsec.fyi/feeds/supplychain.xml" rel="self" type="application/rss+xml"/>
  <lastBuildDate>Wed, 22 Apr 2026 18:38:42 +0000</lastBuildDate>
  <managingEditor>carl@chs.us (Carl Sampson)</managingEditor>
  <item>
    <title>Axios npm Supply Chain Attack: 83M Downloads Hit</title>
    <link>https://strobes.co/blog/axios-npm-supply-chain-attack-compromised-rat-2026/</link>
    <guid isPermaLink="true">https://strobes.co/blog/axios-npm-supply-chain-attack-compromised-rat-2026/</guid>
    <description>Axios npm Supply Chain Attack: 83M Downloads Hit</description>
    <category>Supply Chain Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:51 +0000</pubDate>
  </item>
  <item>
    <title>Axios npm Hijack 2026: Everything You Need to Know</title>
    <link>https://socradar.io/blog/axios-npm-supply-chain-attack-2026-ciso-guide/</link>
    <guid isPermaLink="true">https://socradar.io/blog/axios-npm-supply-chain-attack-2026-ciso-guide/</guid>
    <description>Axios npm Hijack 2026: Everything You Need to Know</description>
    <category>Supply Chain Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:50 +0000</pubDate>
  </item>
  <item>
    <title>TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files</title>
    <link>https://thehackernews.com/2026/03/teampcp-pushes-malicious-telnyx.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2026/03/teampcp-pushes-malicious-telnyx.html</guid>
    <description>TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files</description>
    <category>Supply Chain Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:49 +0000</pubDate>
  </item>
  <item>
    <title>litellm: Credential Stealer Hidden in PyPI Wheel</title>
    <link>https://www.stepsecurity.io/blog/litellm-credential-stealer-hidden-in-pypi-wheel</link>
    <guid isPermaLink="true">https://www.stepsecurity.io/blog/litellm-credential-stealer-hidden-in-pypi-wheel</guid>
    <description>litellm: Credential Stealer Hidden in PyPI Wheel</description>
    <category>Supply Chain Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:49 +0000</pubDate>
  </item>
  <item>
    <title>What&#x27;s Coming to Our GitHub Actions 2026 Security Roadmap</title>
    <link>https://github.blog/news-insights/product-news/whats-coming-to-our-github-actions-2026-security-roadmap/</link>
    <guid isPermaLink="true">https://github.blog/news-insights/product-news/whats-coming-to-our-github-actions-2026-security-roadmap/</guid>
    <description>What&#x27;s Coming to Our GitHub Actions 2026 Security Roadmap</description>
    <category>Supply Chain Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:48 +0000</pubDate>
  </item>
  <item>
    <title>Shai-Hulud npm Supply Chain Attack: New Compromised Packages Detected</title>
    <link>https://jfrog.com/blog/shai-hulud-npm-supply-chain-attack-new-compromised-packages-detected/</link>
    <guid isPermaLink="true">https://jfrog.com/blog/shai-hulud-npm-supply-chain-attack-new-compromised-packages-detected/</guid>
    <description>Shai-Hulud npm Supply Chain Attack: New Compromised Packages Detected</description>
    <category>Supply Chain Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:47 +0000</pubDate>
  </item>
  <item>
    <title>LiteLLM and Telnyx Compromised on PyPI: Tracing the TeamPCP Supply Chain Campaign</title>
    <link>https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/</link>
    <guid isPermaLink="true">https://securitylabs.datadoghq.com/articles/litellm-compromised-pypi-teampcp-supply-chain-campaign/</guid>
    <description>LiteLLM and Telnyx Compromised on PyPI: Tracing the TeamPCP Supply Chain Campaign</description>
    <category>Supply Chain Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:46 +0000</pubDate>
  </item>
  <item>
    <title>Keeping Your GitHub Actions Secure Part 1: Preventing Pwn Requests</title>
    <link>https://securitylab.github.com/resources/github-actions-preventing-pwn-requests/</link>
    <guid isPermaLink="true">https://securitylab.github.com/resources/github-actions-preventing-pwn-requests/</guid>
    <description>Keeping Your GitHub Actions Secure Part 1: Preventing Pwn Requests</description>
    <category>Supply Chain Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:45 +0000</pubDate>
  </item>
  <item>
    <title>GitHub Actions Security Pt 1: Attacks &amp; Defenses (Wiz)</title>
    <link>https://www.wiz.io/blog/github-actions-security-threat-model-and-defenses</link>
    <guid isPermaLink="true">https://www.wiz.io/blog/github-actions-security-threat-model-and-defenses</guid>
    <description>GitHub Actions Security Pt 1: Attacks &amp; Defenses (Wiz)</description>
    <category>Supply Chain Security</category>
    <pubDate>Wed, 22 Apr 2026 12:52:44 +0000</pubDate>
  </item>
  <item>
    <title>Shai-Hulud: A Persistent Secret Leaking Campaign — GitGuardian</title>
    <link>https://blog.gitguardian.com/shai-hulud-a-persistent-secret-leaking-campaign/</link>
    <guid isPermaLink="true">https://blog.gitguardian.com/shai-hulud-a-persistent-secret-leaking-campaign/</guid>
    <description>Shai-Hulud: A Persistent Secret Leaking Campaign — GitGuardian</description>
    <category>Supply Chain Security</category>
    <pubDate>Sun, 19 Apr 2026 02:37:08 +0000</pubDate>
  </item>
  <item>
    <title>Defending Against npm Supply Chain Attacks — Splunk</title>
    <link>https://www.splunk.com/en_us/blog/security/npm-supply-chain-attack-detection-analysis.html</link>
    <guid isPermaLink="true">https://www.splunk.com/en_us/blog/security/npm-supply-chain-attack-detection-analysis.html</guid>
    <description>Defending Against npm Supply Chain Attacks — Splunk</description>
    <category>Supply Chain Security</category>
    <pubDate>Sun, 19 Apr 2026 02:22:21 +0000</pubDate>
  </item>
  <item>
    <title>Multiple Supply Chain Attacks against npm Packages — Red Hat</title>
    <link>https://access.redhat.com/security/supply-chain-attacks-NPM-packages</link>
    <guid isPermaLink="true">https://access.redhat.com/security/supply-chain-attacks-NPM-packages</guid>
    <description>Multiple Supply Chain Attacks against npm Packages — Red Hat</description>
    <category>Supply Chain Security</category>
    <pubDate>Sun, 19 Apr 2026 02:22:20 +0000</pubDate>
  </item>
  <item>
    <title>Shai-Hulud Malware: Second-Wave npm Supply Chain Attack</title>
    <link>https://arcticwolf.com/resources/blog/shai-hulud-malware-targets-numerous-npm-packages-second-wave-npm-supply-chain-attack/</link>
    <guid isPermaLink="true">https://arcticwolf.com/resources/blog/shai-hulud-malware-targets-numerous-npm-packages-second-wave-npm-supply-chain-attack/</guid>
    <description>Shai-Hulud Malware: Second-Wave npm Supply Chain Attack</description>
    <category>Supply Chain Security</category>
    <pubDate>Sun, 19 Apr 2026 02:22:20 +0000</pubDate>
  </item>
  <item>
    <title>CISA: Widespread Supply Chain Compromise Impacting npm Ecosystem</title>
    <link>https://www.cisa.gov/news-events/alerts/2025/09/23/widespread-supply-chain-compromise-impacting-npm-ecosystem</link>
    <guid isPermaLink="true">https://www.cisa.gov/news-events/alerts/2025/09/23/widespread-supply-chain-compromise-impacting-npm-ecosystem</guid>
    <description>CISA: Widespread Supply Chain Compromise Impacting npm Ecosystem</description>
    <category>Supply Chain Security</category>
    <pubDate>Sun, 19 Apr 2026 02:22:19 +0000</pubDate>
  </item>
  <item>
    <title>Closing the Chain: How to reduce SolarWinds/Log4j/XZ risk (arXiv)</title>
    <link>https://arxiv.org/abs/2503.12192v1</link>
    <guid isPermaLink="true">https://arxiv.org/abs/2503.12192v1</guid>
    <description>Closing the Chain: How to reduce SolarWinds/Log4j/XZ risk (arXiv)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:56 +0000</pubDate>
  </item>
  <item>
    <title>SolarWinds Supply Chain Attack (Fortinet)</title>
    <link>https://www.fortinet.com/resources/cyberglossary/solarwinds-cyber-attack</link>
    <guid isPermaLink="true">https://www.fortinet.com/resources/cyberglossary/solarwinds-cyber-attack</guid>
    <description>SolarWinds Supply Chain Attack (Fortinet)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:55 +0000</pubDate>
  </item>
  <item>
    <title>ossf/malicious-packages: Reports of malicious open source packages</title>
    <link>https://github.com/ossf/malicious-packages</link>
    <guid isPermaLink="true">https://github.com/ossf/malicious-packages</guid>
    <description>ossf/malicious-packages: Reports of malicious open source packages</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:54 +0000</pubDate>
  </item>
  <item>
    <title>5 Examples of Dependency Confusion Attacks (Spectral)</title>
    <link>https://spectralops.io/blog/5-examples-of-dependency-confusion-attacks/</link>
    <guid isPermaLink="true">https://spectralops.io/blog/5-examples-of-dependency-confusion-attacks/</guid>
    <description>5 Examples of Dependency Confusion Attacks (Spectral)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:53 +0000</pubDate>
  </item>
  <item>
    <title>What Is a Dependency Confusion Attack? (Aqua Security)</title>
    <link>https://www.aquasec.com/cloud-native-academy/supply-chain-security/dependency-confusion/</link>
    <guid isPermaLink="true">https://www.aquasec.com/cloud-native-academy/supply-chain-security/dependency-confusion/</guid>
    <description>What Is a Dependency Confusion Attack? (Aqua Security)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:53 +0000</pubDate>
  </item>
  <item>
    <title>Defender&#x27;s Perspective: Dep Confusion and Typosquatting (SLSA)</title>
    <link>https://slsa.dev/blog/2024/08/dep-confusion-and-typosquatting</link>
    <guid isPermaLink="true">https://slsa.dev/blog/2024/08/dep-confusion-and-typosquatting</guid>
    <description>Defender&#x27;s Perspective: Dep Confusion and Typosquatting (SLSA)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:52 +0000</pubDate>
  </item>
  <item>
    <title>SBOMs in 2026: Some Love, Some Hate, Much Ambivalence</title>
    <link>https://www.darkreading.com/application-security/sboms-in-2026-some-love-some-hate-much-ambivalence</link>
    <guid isPermaLink="true">https://www.darkreading.com/application-security/sboms-in-2026-some-love-some-hate-much-ambivalence</guid>
    <description>SBOMs in 2026: Some Love, Some Hate, Much Ambivalence</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:51 +0000</pubDate>
  </item>
  <item>
    <title>Software Bill of Materials (SBOM) (CISA)</title>
    <link>https://www.cisa.gov/sbom</link>
    <guid isPermaLink="true">https://www.cisa.gov/sbom</guid>
    <description>Software Bill of Materials (SBOM) (CISA)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:50 +0000</pubDate>
  </item>
  <item>
    <title>About SLSA (spec v1.2)</title>
    <link>https://slsa.dev/spec/v1.2/about</link>
    <guid isPermaLink="true">https://slsa.dev/spec/v1.2/about</guid>
    <description>About SLSA (spec v1.2)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:50 +0000</pubDate>
  </item>
  <item>
    <title>What is a Software Bill of Materials (SBOM)? (Snyk)</title>
    <link>https://snyk.io/articles/software-bill-of-materials/</link>
    <guid isPermaLink="true">https://snyk.io/articles/software-bill-of-materials/</guid>
    <description>What is a Software Bill of Materials (SBOM)? (Snyk)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:49 +0000</pubDate>
  </item>
  <item>
    <title>SBOM Literature Review (arXiv)</title>
    <link>https://arxiv.org/html/2506.03507v1</link>
    <guid isPermaLink="true">https://arxiv.org/html/2506.03507v1</guid>
    <description>SBOM Literature Review (arXiv)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:48 +0000</pubDate>
  </item>
  <item>
    <title>SBOM + SLSA: Accelerating SBOM success with SLSA</title>
    <link>https://slsa.dev/blog/2022/05/slsa-sbom</link>
    <guid isPermaLink="true">https://slsa.dev/blog/2022/05/slsa-sbom</guid>
    <description>SBOM + SLSA: Accelerating SBOM success with SLSA</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:47 +0000</pubDate>
  </item>
  <item>
    <title>SLSA - Comprehensive Approach to Supply Chain Security (SBOM Observer)</title>
    <link>https://docs.sbom.observer/learn/topics/slsa</link>
    <guid isPermaLink="true">https://docs.sbom.observer/learn/topics/slsa</guid>
    <description>SLSA - Comprehensive Approach to Supply Chain Security (SBOM Observer)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:47 +0000</pubDate>
  </item>
  <item>
    <title>Understanding SBOM: Transparency &amp; Security in Supply Chains (Cycode)</title>
    <link>https://cycode.com/blog/software-bill-of-materials/</link>
    <guid isPermaLink="true">https://cycode.com/blog/software-bill-of-materials/</guid>
    <description>Understanding SBOM: Transparency &amp; Security in Supply Chains (Cycode)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:46 +0000</pubDate>
  </item>
  <item>
    <title>What We Know About the NPM Supply Chain Attack (Trend Micro)</title>
    <link>https://www.trendmicro.com/en_us/research/25/i/npm-supply-chain-attack.html</link>
    <guid isPermaLink="true">https://www.trendmicro.com/en_us/research/25/i/npm-supply-chain-attack.html</guid>
    <description>What We Know About the NPM Supply Chain Attack (Trend Micro)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:45 +0000</pubDate>
  </item>
  <item>
    <title>New Supply Chain Malware Operation Hits npm and PyPI</title>
    <link>https://thehackernews.com/2025/06/new-supply-chain-malware-operation-hits.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2025/06/new-supply-chain-malware-operation-hits.html</guid>
    <description>New Supply Chain Malware Operation Hits npm and PyPI</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:44 +0000</pubDate>
  </item>
  <item>
    <title>npm Supply Chain Attack: Debug, Chalk + 16 Packages Compromise (Upwind)</title>
    <link>https://www.upwind.io/feed/npm-supply-chain-attack-massive-compromise-of-debug-chalk-and-16-other-packages</link>
    <guid isPermaLink="true">https://www.upwind.io/feed/npm-supply-chain-attack-massive-compromise-of-debug-chalk-and-16-other-packages</guid>
    <description>npm Supply Chain Attack: Debug, Chalk + 16 Packages Compromise (Upwind)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:44 +0000</pubDate>
  </item>
  <item>
    <title>Malicious PyPI, npm, Ruby Packages Exposed (The Hacker News)</title>
    <link>https://thehackernews.com/2025/06/malicious-pypi-npm-and-ruby-packages.html</link>
    <guid isPermaLink="true">https://thehackernews.com/2025/06/malicious-pypi-npm-and-ruby-packages.html</guid>
    <description>Malicious PyPI, npm, Ruby Packages Exposed (The Hacker News)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:43 +0000</pubDate>
  </item>
  <item>
    <title>A Closer Look at Software Supply Chain Attacks 2025 (Xygeni)</title>
    <link>https://xygeni.io/blog/a-closer-look-at-software-supply-chain-attacks-2025/</link>
    <guid isPermaLink="true">https://xygeni.io/blog/a-closer-look-at-software-supply-chain-attacks-2025/</guid>
    <description>A Closer Look at Software Supply Chain Attacks 2025 (Xygeni)</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:42 +0000</pubDate>
  </item>
  <item>
    <title>The PyPI Supply Chain Attacks of 2025: What Python Engineers Should Learn</title>
    <link>https://medium.com/@joyichiro/the-pypi-supply-chain-attacks-of-2025-what-every-python-backend-engineer-should-learn-from-the-875ba4568d10</link>
    <guid isPermaLink="true">https://medium.com/@joyichiro/the-pypi-supply-chain-attacks-of-2025-what-every-python-backend-engineer-should-learn-from-the-875ba4568d10</guid>
    <description>The PyPI Supply Chain Attacks of 2025: What Python Engineers Should Learn</description>
    <category>Supply Chain Security</category>
    <pubDate>Fri, 17 Apr 2026 14:50:41 +0000</pubDate>
  </item>
  <item>
    <title>Learnings from Recent npm Supply Chain Compromises - Datadog</title>
    <link>https://securitylabs.datadoghq.com/articles/learnings-from-recent-npm-compromises/</link>
    <guid isPermaLink="true">https://securitylabs.datadoghq.com/articles/learnings-from-recent-npm-compromises/</guid>
    <description>Learnings from Recent npm Supply Chain Compromises - Datadog</description>
    <category>Supply Chain Security</category>
    <pubDate>Thu, 16 Apr 2026 21:05:04 +0000</pubDate>
  </item>
  <item>
    <title>Inside the Axios Supply Chain Compromise - Elastic Security Labs</title>
    <link>https://www.elastic.co/security-labs/axios-one-rat-to-rule-them-all</link>
    <guid isPermaLink="true">https://www.elastic.co/security-labs/axios-one-rat-to-rule-them-all</guid>
    <description>Inside the Axios Supply Chain Compromise - Elastic Security Labs</description>
    <category>Supply Chain Security</category>
    <pubDate>Thu, 16 Apr 2026 21:05:03 +0000</pubDate>
  </item>
  <item>
    <title>Lockfile Poisoning: Introducing Malware in Supply Chain - SafeDep</title>
    <link>https://safedep.substack.com/p/lockfile-poisoning-an-attack-vector</link>
    <guid isPermaLink="true">https://safedep.substack.com/p/lockfile-poisoning-an-attack-vector</guid>
    <description>Lockfile Poisoning: Introducing Malware in Supply Chain - SafeDep</description>
    <category>Supply Chain Security</category>
    <pubDate>Thu, 16 Apr 2026 21:05:02 +0000</pubDate>
  </item>
  <item>
    <title>Shai-Hulud 2.0: Most Aggressive NPM Supply Chain Attack of 2025 - Check Point</title>
    <link>https://blog.checkpoint.com/research/shai-hulud-2-0-inside-the-second-coming-the-most-aggressive-npm-supply-chain-attack-of-2025/</link>
    <guid isPermaLink="true">https://blog.checkpoint.com/research/shai-hulud-2-0-inside-the-second-coming-the-most-aggressive-npm-supply-chain-attack-of-2025/</guid>
    <description>Shai-Hulud 2.0: Most Aggressive NPM Supply Chain Attack of 2025 - Check Point</description>
    <category>Supply Chain Security</category>
    <pubDate>Thu, 16 Apr 2026 21:05:01 +0000</pubDate>
  </item>
  <item>
    <title>Supply Chain Security: Sigstore and Cosign - GitGuardian</title>
    <link>https://blog.gitguardian.com/supply-chain-security-sigstore-and-cosign-part-ii/</link>
    <guid isPermaLink="true">https://blog.gitguardian.com/supply-chain-security-sigstore-and-cosign-part-ii/</guid>
    <description>Supply Chain Security: Sigstore and Cosign - GitGuardian</description>
    <category>Supply Chain Security</category>
    <pubDate>Thu, 16 Apr 2026 21:05:01 +0000</pubDate>
  </item>
  <item>
    <title>GuardDog: CLI Tool to Identify Malicious PyPI and npm Packages</title>
    <link>https://github.com/DataDog/guarddog</link>
    <guid isPermaLink="true">https://github.com/DataDog/guarddog</guid>
    <description>GuardDog: CLI Tool to Identify Malicious PyPI and npm Packages</description>
    <category>Supply Chain Security</category>
    <pubDate>Thu, 16 Apr 2026 21:05:00 +0000</pubDate>
  </item>
  <item>
    <title>tj-actions Supply Chain Attack (CVE-2025-30066) - Sysdig</title>
    <link>https://www.sysdig.com/blog/detecting-and-mitigating-the-tj-actions-changed-files-supply-chain-attack-cve-2025-30066</link>
    <guid isPermaLink="true">https://www.sysdig.com/blog/detecting-and-mitigating-the-tj-actions-changed-files-supply-chain-attack-cve-2025-30066</guid>
    <description>tj-actions Supply Chain Attack (CVE-2025-30066) - Sysdig</description>
    <category>Supply Chain Security</category>
    <pubDate>Thu, 16 Apr 2026 21:04:59 +0000</pubDate>
  </item>
  <item>
    <title>tj-actions/changed-files Compromised - Semgrep</title>
    <link>https://semgrep.dev/blog/2025/popular-github-action-tj-actionschanged-files-is-compromised/</link>
    <guid isPermaLink="true">https://semgrep.dev/blog/2025/popular-github-action-tj-actionschanged-files-is-compromised/</guid>
    <description>tj-actions/changed-files Compromised - Semgrep</description>
    <category>Supply Chain Security</category>
    <pubDate>Thu, 16 Apr 2026 21:04:58 +0000</pubDate>
  </item>
  <item>
    <title>Most Notable Supply Chain Attacks of 2025 - Kaspersky</title>
    <link>https://www.kaspersky.com/blog/supply-chain-attacks-in-2025/55522/</link>
    <guid isPermaLink="true">https://www.kaspersky.com/blog/supply-chain-attacks-in-2025/55522/</guid>
    <description>Most Notable Supply Chain Attacks of 2025 - Kaspersky</description>
    <category>Supply Chain Security</category>
    <pubDate>Thu, 16 Apr 2026 21:04:58 +0000</pubDate>
  </item>
  <item>
    <title>GitHub Actions Supply Chain Attacks: tj-actions and reviewdog - Hunters</title>
    <link>https://www.hunters.security/en/blog/github-actions-supply-chain-attack</link>
    <guid isPermaLink="true">https://www.hunters.security/en/blog/github-actions-supply-chain-attack</guid>
    <description>GitHub Actions Supply Chain Attacks: tj-actions and reviewdog - Hunters</description>
    <category>Supply Chain Security</category>
    <pubDate>Thu, 16 Apr 2026 21:04:57 +0000</pubDate>
  </item>
  <item>
    <title>DPRK Threat Actor Compromises Axios NPM Package</title>
    <link>https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package</link>
    <guid isPermaLink="true">https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package</guid>
    <description>DPRK Threat Actor Compromises Axios NPM Package</description>
    <category>Supply Chain Security</category>
    <pubDate>Sat, 11 Apr 2026 16:49:02 +0000</pubDate>
  </item>
  <item>
    <title>16 Minutes to Impact: npm crypto-draining malware</title>
    <link>https://www.sygnia.co/threat-reports-and-advisories/npm-supply-chain-attack-september-2025/</link>
    <guid isPermaLink="true">https://www.sygnia.co/threat-reports-and-advisories/npm-supply-chain-attack-september-2025/</guid>
    <description>16 Minutes to Impact: npm crypto-draining malware</description>
    <category>Supply Chain Security</category>
    <pubDate>Sat, 11 Apr 2026 16:49:01 +0000</pubDate>
  </item>
  <item>
    <title>Widespread npm Supply Chain Attack: Billions at Risk</title>
    <link>https://www.paloaltonetworks.com/blog/cloud-security/npm-supply-chain-attack/</link>
    <guid isPermaLink="true">https://www.paloaltonetworks.com/blog/cloud-security/npm-supply-chain-attack/</guid>
    <description>Widespread npm Supply Chain Attack: Billions at Risk</description>
    <category>Supply Chain Security</category>
    <pubDate>Sat, 11 Apr 2026 16:49:01 +0000</pubDate>
  </item>
  <item>
    <title>npm Supply Chain Attack: debug, chalk, and Beyond</title>
    <link>https://www.wiz.io/blog/widespread-npm-supply-chain-attack-breaking-down-impact-scope-across-debug-chalk</link>
    <guid isPermaLink="true">https://www.wiz.io/blog/widespread-npm-supply-chain-attack-breaking-down-impact-scope-across-debug-chalk</guid>
    <description>npm Supply Chain Attack: debug, chalk, and Beyond</description>
    <category>Supply Chain Security</category>
    <pubDate>Sat, 11 Apr 2026 16:49:00 +0000</pubDate>
  </item>
  <item>
    <title>The Nx s1ngularity Attack: Inside the Credential Leak</title>
    <link>https://blog.gitguardian.com/the-nx-s1ngularity-attack-inside-the-credential-leak/</link>
    <guid isPermaLink="true">https://blog.gitguardian.com/the-nx-s1ngularity-attack-inside-the-credential-leak/</guid>
    <description>The Nx s1ngularity Attack: Inside the Credential Leak</description>
    <category>Supply Chain Security</category>
    <pubDate>Sat, 11 Apr 2026 16:48:59 +0000</pubDate>
  </item>
  <item>
    <title>s1ngularity: Nx supply chain attack leaks secrets</title>
    <link>https://www.wiz.io/blog/s1ngularity-supply-chain-attack</link>
    <guid isPermaLink="true">https://www.wiz.io/blog/s1ngularity-supply-chain-attack</guid>
    <description>s1ngularity: Nx supply chain attack leaks secrets</description>
    <category>Supply Chain Security</category>
    <pubDate>Sat, 11 Apr 2026 16:48:58 +0000</pubDate>
  </item>
</channel>
</rss>