Systems | Development | Analytics | API | Testing

The Axios Supply Chain Attack Proves Why Server-Side API Credential Management Is Non-Negotiable

On March 31, Axios—the most widely used HTTP client in the JavaScript ecosystem, with approximately 100 million weekly npm downloads and a presence in roughly 80% of cloud environments—was compromised via a hijacked maintainer account. Two malicious versions (1.14.1 and 0.30.4) delivered a cross-platform remote access trojan (RAT) that harvested credentials, SSH keys, cloud tokens, and API secrets from every machine where they were installed.

The Axios npm Supply Chain Attack: A Complete Technical Analysis of the Maintainer Hijack, Cross-Platform RAT, and Enterprise Impact

On March 31, an attacker hijacked the npm account of Axios’s primary maintainer and published two malicious versions of the most popular HTTP client library in the JavaScript ecosystem. The backdoored packages—axios@1.14.1 and axios@0.30.4—injected a trojanized dependency that delivered cross-platform remote access trojans to macOS, Windows, and Linux machines within seconds of installation.

Five Supply Chain Attacks in Twelve Days: How March 2026 Broke Open-Source Trust and What Comes Next

Between March 19 and March 31, five major open-source projects were compromised in rapid succession: Aqua Security’s Trivy vulnerability scanner, Checkmarx’s AST GitHub Actions, the LiteLLM AI proxy on PyPI, the Telnyx communications library, and Axios—the most downloaded HTTP client in the npm registry. Collectively, these projects serve hundreds of millions of installations across virtually every enterprise software environment on earth.

Why Choose OAuth for API Security: A Complete Azure AD Integration Guide for DreamFactory

In an era where API breaches make headlines weekly, choosing the right authentication mechanism isn't just a technical decision—it's a business-critical one. OAuth 2.0 has emerged as the industry standard for securing API access, and when combined with Azure Active Directory and DreamFactory, it creates a robust, enterprise-ready security architecture that protects your data while streamlining user access.

Production Data Access for Developers: RBAC and DLP

If you run a software engineering tools team, you have almost certainly had this conversation: a developer asks for production data access to debug a real incident, and someone in the room says no. Not because the request is unreasonable (it isn’t), but because nobody wants to be the person who said yes when something goes wrong. That instinct is understandable. Production environments carry real risk. But the reflex to lock everything down has a cost that rarely gets accounted for.

The LiteLLM Supply Chain Attack: A Complete Technical Breakdown of What Happened, Who Is Affected, and What Comes Next

In March 2026, security researcher isfinne discovered that LiteLLM version 1.82.8—the most popular open-source LLM proxy in the Python ecosystem, with approximately 97 million monthly downloads—contained credential-stealing malware published to PyPI. Within hours, version 1.82.7 was confirmed to carry a similar payload through a different injection method.

How Enterprises Can Stay Compliant Under the Chile Data Protection Law

Data privacy laws continue to evolve and expand their reach, touching consumers, businesses, and regions of the world. The European Union’s General Data Protection Regulation (GDPR) has inspired many countries to establish their own regulations and set similar parameters for data collection. The Chile Data Protection Law is one of these regulations. While staying compliant isn’t always simple, it’s necessary for your operations and maintaining customer trust.

Identity Passthrough and RBAC for Enterprise LLM Deployments | DreamFactory

Enterprise adoption of large language models introduces a fundamental security challenge: how do you grant AI agents access to internal data without creating a backdoor that bypasses your existing access controls? Traditional database connections rely on service accounts with broad permissions, but when an LLM queries your customer records or financial data on behalf of a user, it must respect that user's specific entitlements.

Enterprise AI Infrastructure Security - 4) Service Accounts & Automation Security

Securing ClearML for the Enterprise — Part 4: Service Accounts & Automation Security In this video we walk through ClearML's service accounts — the identities behind your automated workloads — and how impersonation ensures least-privilege execution across your agents, pipelines, and schedulers.