axios Backdoored on npm: Compromised Maintainer Account Delivers Cross-Platform RAT to 40M+ Weekly Downloads

Phoenix Security diagram: axios supply chain compromise dependency chain. Main project installs axios npm v1.14.1 which pulls in two clean dependencies (clean-dep-A via npm, clean-dep-B via Node) plus the hidden malicious dependency plain-crypto-js v4.2.1. From plain-crypto-js, red arrows show compromise spreading to developer Mac, CI/CD pipelines, container builds, and production servers — all labelled "Compromised Secrets." Bottom caption: Phantom Dependency Injection — 15s Execution, Zero Assigned CVEs, Bypasses Traditional SCA.

March 31, 2026 | Phoenix Security Vulnerability Intelligence | Supply Chain Incident Report


Executive Summary

On March 31, 2026, two malicious versions of axios were published to npm. The attack compromised the account of jasonsaayman — the primary axios maintainer — changed the account email to an attacker-controlled ProtonMail address, and used stolen credentials to publish axios@1.14.1 and axios@0.30.4 directly via the npm CLI, bypassing the project’s GitHub Actions OIDC-signed CI/CD pipeline entirely.

Neither version contains a single malicious line inside axios itself. Instead, both inject a phantom dependency — plain-crypto-js@4.2.1 — a package that is never imported anywhere in the axios source code. Its only purpose is to execute a postinstall hook that deploys a fully featured, cross-platform remote access trojan within 15 seconds of npm install running. The RAT targets Windows, Linux, and macOS with platform-specific second-stage payloads, encrypts harvested credentials with AES-256-CBC and RSA-4096, and exfiltrates to a live C2 server at sfrclak.com:8000.

With over 300 million weekly npm downloads, axios is present in virtually every JavaScript codebase that makes HTTP requests — from React frontends to CI/CD tooling to production server APIs. The campaign’s blast radius extends far beyond development machines: any CI/CD pipeline that ran npm install during the 3-hour 19-minute exposure window should treat all injected secrets as compromised. No CVE has been assigned. Traditional CVE-based scanners will not flag it.

Malware has been taken down.

TL;DR for Engineering Teams

FieldDetail
What it isSupply chain compromise of axios v1.14.1 and v0.30.4 on npm, injecting a cross-platform RAT via a malicious dependency (plain-crypto-js@4.2.1). No CVE assigned.
Where it bitesAny project that ran npm install or npm update between 00:21 UTC and 03:40 UTC on March 31, 2026 and resolved to either compromised version. Affects Node.js backends, CI/CD pipelines, developer machines, and container builds.
Why it mattersRAT executes in 15 seconds with no user action. Stealer sweeps SSH keys, AWS/GCP/Azure credentials, Kubernetes tokens, .env files, shell history, and crypto wallets.
Patch statusBoth malicious versions removed from npm. Entire plain-crypto-js package removed. Safe versions: axios@1.14.0 (1.x) and axios@0.30.3 (0.x).
Immediate actionPin to axios@1.14.0 or axios@0.30.3. Check for node_modules/plain-crypto-js/ directory (presence = dropper ran). Rotate all secrets on affected machines. Block sfrclak.com and 142.11.206.73:8000.

Vulnerability Overview

FieldValue
Vendor / Maintaineraxios-http / jasonsaayman (account compromised)
Productaxios (npm package)
Vulnerability TypeSupply chain compromise / credential theft / remote access trojan
CWECWE-829: Inclusion of Functionality from Untrusted Control Sphere
CVENot assigned
Attack VectorNetwork (npm package installation)
Active ExploitationConfirmed — live C2 server, platform-specific payloads served
AttributionUnknown; assessed espionage or APT motive based on RAT capabilities and lack of ransomware/mining payload
Exposure Window~3 hours 19 minutes (March 31, 00:21 UTC to 03:40 UTC)
C2 Infrastructuresfrclak.com | 142.11.206.73:8000

Technical Anatomy

Phase 1: Maintainer Account Hijack and Pre-Staging

The attack was staged across roughly 24 hours before the poisoned axios releases appeared. On March 30 at 05:57 UTC, an attacker-controlled account (nrwise, registered nrwise@proton.me) published plain-crypto-js@4.2.0 — a clean decoy containing a full copy of the legitimate crypto-js source with no postinstall hook. This established npm publishing history so the package would not trigger zero-history alerts from automated scanners.

This from the original discussion perfectly sums how we all feel.

Seventeen hours later at 23:59 UTC, plain-crypto-js@4.2.1 was published from the same account — this time with the malicious postinstall hook and obfuscated dropper (setup.js) added. The attacker then used compromised credentials for jasonsaayman to publish the backdoored axios releases. The account email had been changed to ifstap@proton.me. Both attacker accounts used ProtonMail: a consistent operational pattern.

Critical forensic signal: Every legitimate axios 1.x release since adopting Trusted Publishers carries an OIDC token binding it cryptographically to a specific GitHub Actions workflow. axios@1.14.1 carries no such binding, no gitHead, and no corresponding commit or tag in the GitHub repository. The release exists only on npm. This is the single most reliable detection indicator for the compromise.

Phase 2: The Phantom Dependency Injection

The surgical diff between clean and compromised versions is one line in package.json — the addition of plain-crypto-js: "^4.2.1" as a runtime dependency. This package is never imported, required, or referenced anywhere in the axios source code across all 86 files. Its presence in package.json exists solely to trigger npm’s dependency resolution and execute the postinstall hook.

When a developer runs npm install axios@1.14.1, npm automatically resolves the dependency tree, installs plain-crypto-js@4.2.1, and executes its postinstall script: node setup.js. The hook fires before npm returns control to the terminal. From the developer’s perspective, npm install completed successfully. The backdoor has already run.

The Obfuscated Dropper: setup.js

setup.js is a single minified file using a two-layer obfuscation scheme. All sensitive strings are stored as encoded values in an array (stq[]) and decoded at runtime:

  • Layer 1 — XOR cipher: The key "OrDeR_7077" is parsed through Number(), which coerces alphabetic characters to NaN. In bitwise operations NaN becomes 0, leaving only the digits [7,0,7,7] effective at positions 6–9. Each character at position r is decoded as: charCode XOR key[(7 × r × r) % 10] XOR 333
  • Layer 2 — Outer wrapper: Reverses the encoded string, substitutes underscores for equals signs (base64 padding), base64-decodes, then passes through the XOR cipher

Once decoded, the full C2 URL is: http://sfrclak.com:8000/6202033. The path segment 6202033 is the campaign identifier. After launching the platform-specific payload, setup.js performs three evidence-destruction steps: deletes itself (fs.unlink(__filename)), deletes the real package.json, and renames a pre-staged clean stub (package.md) to package.json. Any post-infection inspection of node_modules/plain-crypto-js/ shows a clean manifest with no postinstall hook.

The directory node_modules/plain-crypto-js/ remaining on disk — even with a clean-looking package.json — is sufficient evidence the dropper executed. axios has no legitimate dependency with this name.

Stage 1: Platform Detection and Payload Delivery

The dropper detects os.platform() and branches into three attack paths. Each sends a distinct POST body to the same C2 URL, allowing the server to return the appropriate second-stage payload. The packages.npm.org/ prefix in the POST body is deliberate — it makes C2 traffic look like routine npm registry communication in network logs.

PlatformPOST BodyDropper MethodPersistent Artifact
macOSpackages.npm.org/product0AppleScript + osascript; temp .scpt file auto-deleted/Library/Caches/com.apple.act.mond
Windowspackages.npm.org/product1VBScript writes hidden cmd.exe → PowerShell; temp .vbs and .ps1 auto-deleted%PROGRAMDATA%\wt.exe
Linuxpackages.npm.org/product2curlpython3 via nohup, detached from parent PID (orphaned to PID 1)/tmp/ld.py

Stage 2: Credential Harvesting

The RAT performs a systematic, exhaustive sweep of the compromised host. On Windows, the PowerShell payload establishes persistence via a HKCU Run registry key named MicrosoftUpdate pointing to %PROGRAMDATA%\system.bat, then uses reflective .NET assembly injection to load the stage-2 binary directly into memory without touching disk. On macOS, the native Mach-O universal binary (supporting both x86_64 and arm64) is deployed to /Library/Caches/com.apple.act.mond — a path mimicking legitimate Apple system cache naming conventions.

Credential categories swept across all platforms:

CategoryTargets
SSH~/.ssh/id_rsa, id_ed25519, id_ecdsa, authorized_keys, known_hosts; /etc/ssh/ssh_host_*_key
Cloud Credentials~/.aws/, ~/.config/gcloud/, ~/.azure/, EC2 IMDS at 169.254.169.254, ECS metadata
Kubernetes~/.kube/config, service account tokens, all secrets across all namespaces
Environment Files.env, .env.local, .env.production, .env.staging (recursive search)
CI/CD & IaCterraform.tfstate, terraform.tfvars, Jenkinsfile, .gitlab-ci.yml, .travis.yml, ansible.cfg
TLS Private Keys*.pem, *.key, *.p12, *.pfx from /etc/ssl/private and /etc/letsencrypt
Crypto WalletsBitcoin wallet.dat, Ethereum keystores, Solana keypairs, Cardano signing keys, Ledger files
Shell History.bash_history, .zsh_history, .mysql_history (frequently contains exported secrets)
Auth Tokens.npmrc, .vault-token, .netrc, Slack/Discord webhook URLs

Stage 3: Encrypted Exfiltration and C2 Persistence

Collected data is encrypted with AES-256-CBC (key derived via PBKDF2 from 32 random bytes), with the session key wrapped using a hardcoded RSA-4096 public key (OAEP padding). The bundle is packaged as tpcp.tar.gz and POSTed via HTTPS to sfrclak.com:8000/6202033 with header X-Filename: tpcp.tar.gz. Only the holder of the RSA private key can decrypt the bundle.

After the initial exfiltration, the RAT beacons back to C2 every 60 seconds with BaseInfo payloads containing hostname, username, OS version, timezone, hardware fingerprint, and a full process list. The process list reveals running security tools (EDR, AV, monitoring), active development environments, other potential pivot targets on the same host, and which debugging or orchestration tools are active.

Runtime Validation: What Actually Happened

StepSecurity’s Harden-Runner instrumentation confirmed the exact execution chain:

  • C2 contact occurs 1.1 seconds into npm install — before npm has finished resolving all dependencies
  • A second C2 connection fires 36 seconds later, in a completely separate workflow step after npm install has exited, confirming the detached background process survived beyond the installing step
  • Both connections show calledBy: "infra" rather than "runner" because the malware used nohup ... & to orphan itself to PID 1
  • The package.json overwrite is captured as two writes from two separate PIDs, 36 seconds apart — confirming the evidence swap

The process tree: npm install → sh → node setup.js → sh → curl/nohup. Four levels of indirection from installation to C2 callback.

Affected Versions

axios (This Compromise)

PackageVulnerable VersionSafe VersionNotes
axios (npm)1.14.11.14.0Payload in plain-crypto-js dependency; postinstall-time execution
axios (npm)0.30.40.30.3Same payload; targets legacy 0.x user base
plain-crypto-js (npm)4.2.1Package removedNever a legitimate axios dependency; staged from nrwise account

SHA Verification for Safe Versions

PackageVersionSHA (npm tarball)
axios (safe)1.14.07c29f4cf2ea91ef05018d5aa5399bf23ed3120eb
axios (safe)0.30.3ab1be887a2d37dd9ebc219657704180faf2c4920
plain-crypto-js (malicious)4.2.107d889e2dadce6f3910dcbc253317d28ca61c766

Discovery and Disclosure Timeline

Timestamp (UTC)Event
2026-03-27 19:01axios@1.14.0 published via GitHub Actions OIDC — last legitimate release
2026-03-30 05:57plain-crypto-js@4.2.0 created by nrwise account — clean decoy to establish npm history
2026-03-30 18:15jasonsaayman merges PR #10584 — last confirmed legitimate maintainer activity
2026-03-30 23:59plain-crypto-js@4.2.1 published — malicious postinstall hook added
2026-03-31 00:21axios@1.14.1 published by compromised jasonsaayman account via npm CLI — ATTACK BEGINS
2026-03-31 01:00axios@0.30.4 published — legacy 0.x branch also poisoned
2026-03-31 01:42DigitalBrainJS (collaborator) pushes deprecate.yml response workflow — first deprecation attempt fails
2026-03-31 ~02:30Attacker uses admin access to unpin and delete community-filed compromise report issue on GitHub
2026-03-31 03:00Issue #10604 filed by ashishkurmi (StepSecurity) — public compromise report
2026-03-31 03:20DigitalBrainJS escalates to npm administration — unable to revoke jasonsaayman permissions without admin access
2026-03-31 03:40npm administration removes compromised versions and revokes all tokens — ATTACK WINDOW CLOSED (~3h19m)

Determine If You’re Affected

Exposure by Environment

EnvironmentRiskReason
CI/CD pipelines (npm install during window)CriticalPipeline secrets, cloud tokens, SSH keys all harvested and exfiltrated in real time
Production containers with axiosCriticalIf npm install ran during the window, the container image contains a running RAT
Developer machinesCriticalSSH keys, .env files, shell history, crypto wallets, cloud credentials all targeted
Self-hosted CI runnersCriticalBroadest attack surface; persistent artifacts installed
npm lock file pinned to 1.14.0 or 0.30.3Not affectedExact version pinning prevented resolution to malicious versions

Verification Commands

Run these on any potentially affected machine or in CI artifact inspection:

# Check for compromised axios versions
npm list axios 2>/dev/null | grep -E '1\.14\.1|0\.30\.4'
grep -A1 '"axios"' package-lock.json | grep -E '1\.14\.1|0\.30\.4'

# Check for dropper evidence (directory presence = payload ran)
ls node_modules/plain-crypto-js 2>/dev/null && echo 'DROPPER RAN'

# macOS: check for persistent RAT binary
ls -la /Library/Caches/com.apple.act.mond 2>/dev/null && echo 'COMPROMISED'

# Linux: check for Python RAT
ls -la /tmp/ld.py 2>/dev/null && echo 'COMPROMISED'

# Windows (cmd.exe)
dir "%PROGRAMDATA%\wt.exe" 2>nul && echo COMPROMISED

# Check for OIDC provenance (absence = manual/malicious publish)
npm view axios@1.14.1 dist.attestations 2>/dev/null || echo 'NO PROVENANCE ATTESTATION'

Detection Guidance

Indicators of Compromise

TypeIndicatorContext
C2 Domainsfrclak.comPrimary exfiltration endpoint
C2 IP142.11.206.73Resolves sfrclak.com; block at firewall
C2 Port:8000Non-standard HTTP
C2 Path/6202033Campaign identifier; present in all beacons
Exfil HeaderX-Filename: tpcp.tar.gzPresent in all stealer POST requests
POST Body Patternpackages.npm.org/product[0-2]npm-lookalike pattern to evade log inspection
User-Agentmozilla/4.0 (compatible; msie 8.0 .)IE8 UA string; anomalous in any modern Node.js CI environment
Persistence (macOS)/Library/Caches/com.apple.act.mondMach-O universal binary; disguised as Apple system cache daemon
Persistence (Win)%PROGRAMDATA%\wt.exePowerShell copy; HKCU Run key: MicrosoftUpdate
Persistence (Linux)/tmp/ld.pyPython RAT; detached via nohup, orphaned to PID 1

File Hashes (SHA-256 and npm shasum)

HashArtifact
npm shasum: 2553649f2322049666871cea80a5d0d6adc700caaxios@1.14.1 (malicious)
npm shasum: d6f3f62fd3b9f5432f5782b62d8cfd5247d5ee71axios@0.30.4 (malicious)
npm shasum: 07d889e2dadce6f3910dcbc253317d28ca61c766plain-crypto-js@4.2.1 (RAT dropper)

MITRE ATT&CK Mapping

TechniqueNameCampaign Application
T1195.002Supply Chain Compromise: Software Supply ChainPoisoned npm package via compromised maintainer account
T1552.004Unsecured Credentials: Private KeysSSH keys, TLS certs, cloud service principal files swept
T1552.005Cloud Instance Metadata APIIMDS queries at 169.254.169.254 for IAM role credentials
T1543.003Create/Modify System ProcessHKCU Run registry key (Windows); .act.mond daemon (macOS)
T1048.002Exfiltration Over Alternative ProtocolEncrypted bundle POSTed to C2 over HTTP on port 8000
T1132Data EncodingAES-256-CBC + RSA-4096 session key wrapping
T1036MasqueradingMicrosoftUpdate registry key; com.apple.act.mond; packages.npm.org POST body
T1059.005Command and Scripting Interpreter: VBScriptVBScript dropper on Windows for hidden execution

Temporary Protections

Immediate Actions — Do This Now

  1. Downgrade axios and pin the safe version:
npm install axios@1.14.0  # 1.x users
npm install axios@0.30.3  # 0.x users
  1. Add overrides to prevent transitive resolution:
{
  "overrides": { "axios": "1.14.0" },
  "resolutions":  { "axios": "1.14.0" }
}
  1. Remove plain-crypto-js and reinstall with scripts disabled:
rm -rf node_modules/plain-crypto-js
npm install --ignore-scripts
  1. Block C2 at network/DNS level:
# Linux firewall
iptables -A OUTPUT -d 142.11.206.73 -j DROP
echo '0.0.0.0 sfrclak.com' >> /etc/hosts
  1. Kill running RAT processes and remove persistence:
# macOS
pkill -f com.apple.act.mond && rm -f /Library/Caches/com.apple.act.mond
# Linux
pkill -f ld.py && rm -f /tmp/ld.py
# Windows
Remove-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Run' -Name 'MicrosoftUpdate'
Remove-Item "$env:PROGRAMDATA\wt.exe" -Force
  1. Rotate all credentials on affected machines: GitHub tokens, AWS/GCP/Azure credentials, SSH keys, npm tokens, Docker registry credentials, Kubernetes secrets, Vault tokens, .env files, and anything in shell history.
  2. Audit CI/CD pipeline run logs for any npm install that executed during 00:21–03:40 UTC March 31. Any pipeline that installed axios@1.14.1 or axios@0.30.4 must have all injected secrets rotated.

Long-Term Hardening

  • Use npm ci –ignore-scripts in all CI/CD pipelines as a standing policy. Postinstall hooks are the primary delivery vector for npm supply chain attacks.
  • Verify OIDC provenance attestation on packages from projects that publish via GitHub Actions. The absence of provenance on a new release from a previously OIDC-enabled project is a high-signal indicator of account compromise.
  • Enable StepSecurity Harden-Runner or equivalent CI egress filtering. An allowlisted network policy would have blocked the C2 callback before any credentials left the runner.
  • Add npm Package Cooldown checks to your CI pipeline. Most malicious npm packages are identified within 24 hours of publication; a configurable hold on newly published versions provides a meaningful detection window without blocking critical updates.
  • Monitor npm registry metadata changes for packages your organisation depends on. A change in the publisher field from “GitHub Actions” to a human account name is immediately suspicious for projects using Trusted Publishers.
  • Consider using a private npm registry proxy with package mirroring and a quarantine policy for newly published versions of high-impact dependencies.

Real-World Impact

axios is not a niche utility. It is the default HTTP client for JavaScript. React applications, Express APIs, Next.js backends, CLI tools, and CI/CD automation — virtually every Node.js project that communicates over HTTP has axios in its dependency tree. The npm registry records over 300 million weekly downloads. A 3-hour 19-minute exposure window against that install base means the potential exposure count runs into the tens of thousands of environments.

The targeting is deliberately broad but the intelligence value is specific: developer machines carry SSH keys, cloud credentials, and access to production environments that no endpoint on the public internet can directly reach. A compromised developer workstation is a pre-authenticated foothold inside the perimeter. CI/CD runners carry the most valuable credentials in the organisation — deployment tokens, cloud IAM credentials, registry credentials, and API keys for every downstream service the pipeline touches.

The attack generated no CVE, no CVSS score, and no NVD entry. Traditional CVE-based vulnerability management workflows would not have detected it. Organizations running SCA tools that exclusively scan for known CVEs had zero automated visibility into this compromise during the exposure window.

This is a good conclusion of the discussion.

Phoenix Security Recommendations

The axios compromise is proof that the attack surface for software supply chain threats extends far beyond the CVE feed. This campaign had no vulnerability identifier, no patch, and no CVE-based detection signal. The compromised package was one of the most trusted libraries in the JavaScript ecosystem. If your vulnerability management programme only flags known CVEs, this attack was invisible to it from start to finish.

Attack surface management: Phoenix identifies which environments have axios installed and cross-references installed versions against the known-compromised 1.14.1 and 0.30.4 releases.

Contextual deduplication: Organisations running axios across dozens of services get a single prioritised remediation backlog rather than duplicate alerts per repo.

Reachability analysis: Phoenix distinguishes between environments where axios@1.14.1 was installed and where it actually executed during the 3-hour exposure window.

Remediation campaigns: Create a campaign in Phoenix to track completion of version downgrades, lock-file pinning, plain-crypto-js removal, persistent-artifact cleanup, and credential rotation across all affected environments.

Ownership attribution: Map each affected service to the owning team. Phoenix automates that mapping, turning a cross-organisation incident into an owned, trackable remediation backlog.

References

  1. 6mile — Dissecting a Sophisticated NPM Supply Chain Attack: The axios + plain-crypto-js Malware Campaign (March 31, 2026)
  2. StepSecurity — axios Compromised on npm: Malicious Versions Drop Remote Access Trojan (ashishkurmi, March 31, 2026)
  3. axios GitHub Issue #10604 — Community tracking of compromise
  4. npm Registry — axios version history and publisher metadata
  5. StepSecurity Harden-Runner — Runtime validation run
  6. Wiz Research — Trivy Compromised by TeamPCP — upstream campaign context
  7. Socket Security — CanisterWorm: npm Publisher Compromise Deploys Backdoor Across 29 Packages

How Phoenix Security Fixes What Actually Matters

Your team doesn’t have a finding problem. They have a fixing problem.

Most platforms hand you a list. Phoenix hands you a plan — ranked by real risk, mapped to the team that owns it, with a clear path to close it.

What remediation looks like with Phoenix:

  • One backlog, not five. Findings from SAST, SCA, containers, and cloud — deduplicated, correlated, and surfaced in a single prioritized queue. No more reconciling lists across tools.
  • Ownership that sticks. Team attribution and inheritance mean the right ticket goes to the right engineer, first time. No routing, no guessing, no back-and-forth.
  • Campaigns that move the needle. Group related findings into targeted remediation campaigns. Track progress, measure closure rates, and report real reduction — not raw counts.
  • AI that does the legwork, not the deciding. Phoenix’s Remediator agent drafts fixes, creates tickets, and opens PRs. Your team reviews, approves, and merges. Every fix is traceable.

Phoenix Security changes the game.

The results are clear:

  • Bazaarvoice saved $6.3M in developer time and for teams removed critical in the first weeks of adoption
  • ClearBank cut critical container vulnerabilities by 96–99% and reclaimed 4 hours per engineer per week.
  • IAS saved an equivalent of 1.5M in development hours and reduced SCA-to-container noise by 82.4%
  • Optimizely has been able to act on vulnerabilities sitting on the backlog.

The pattern is the same every time: teams that move from find and report to analyze and fix close more risk with less effort.

The results are clear:

  • Bazaarvoice saved $6.3M in developer time and for teams removed critical in the first weeks of adoption
  • ClearBank cut critical container vulnerabilities by 96–99% and reclaimed 4 hours per engineer per week.
  • IAS saved an equivalent of 1.5M in development hours and reduced SCA-to-container noise by 82.4%
  • Optimizely has been able to act on vulnerabilities sitting on the backlog.

👉 Book a demo today

Or learn how Phoenix Security slashed millions in wasted dev time for fintech, retail, and adtech leaders.

Fix with remediaiton don’t chase ghost vulnerabilities

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

TeamPCP hid a credential stealer inside a WAV audio file — invisible to static analysis — and used tokens stolen from litellm three days earlier to publish it directly to PyPI, bypassing GitHub entirely.
Francesco Cipollone
Day 6 of TeamPCP Attack. TeamPCP has crossed the Rubicon from CI/CD tooling into production AI infrastructure. LiteLLM versions 1.82.7 and 1.82.8 on PyPI contain a three-stage credential stealer that harvests SSH keys, cloud secrets, and Kubernetes tokens, deploys privileged pods across every node in your cluster, and installs a persistent backdoor polling for additional payloads. If you run LiteLLM in any environment, check your installed version right now.
Francesco Cipollone
In five days, a single stolen GitHub token became a cascading supply chain compromise spanning Trivy, Checkmarx, OpenVSX, and npm. TeamPCP force-pushed 110+ malicious tags, backdoored container images, weaponised VS Code extensions against local coding agents, and launched a self-propagating npm worm using blockchain C2. If your CI/CD pipelines reference any of these tools by version tag, assume compromise.
Francesco Cipollone
Phoenix Security announced the general availability of its AI-powered Remediation Engine, enabling agentless container vulnerability remediation aligned with CTEM principles. By correlating container lineage to build files, the platform reduces SCA noise by up to 91% and generates precise remediation actions engineers and AI agents can execute instantly.
Francesco Cipollone
Contents
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security PRO
This Site Is Protected By
Shield Security PRO